{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,5]],"date-time":"2025-07-05T11:23:21Z","timestamp":1751714601334},"reference-count":25,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"10","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Commun."],"published-print":{"date-parts":[[2021,10,1]]},"DOI":"10.1587\/transcom.2020ebp3177","type":"journal-article","created":{"date-parts":[[2021,3,31]],"date-time":"2021-03-31T22:06:54Z","timestamp":1617228414000},"page":"1288-1298","source":"Crossref","is-referenced-by-count":3,"title":["DeepSIP: A System for Predicting Service Impact of Network Failure by Temporal Multimodal CNN"],"prefix":"10.23919","volume":"E104.B","author":[{"given":"Yoichi","family":"MATSUO","sequence":"first","affiliation":[{"name":"NTT Network Service System Laboratories, NTT Corp."}]},{"given":"Tatsuaki","family":"KIMURA","sequence":"additional","affiliation":[{"name":"Department of Information and Communications Technology, Graduate School of Engineerin, Osaka University"}]},{"given":"Ken","family":"NISHIMATSU","sequence":"additional","affiliation":[{"name":"NTT Network Service System Laboratories, NTT Corp."}]}],"member":"263","reference":[{"key":"1","doi-asserted-by":"crossref","unstructured":"[1] Y. Matsuo, T. Kimura, and K. Nishimatsu, \u201cDeepSIP: A system for predicting service impact of network failure by temporal multimodal CNN,\u201d AnNet, pp.1-6, 2020.","DOI":"10.1109\/NOMS47738.2020.9110471"},{"key":"2","doi-asserted-by":"publisher","unstructured":"[2] G. Phillipa, J. Navendu, and N. Nachiappan, \u201cUnderstanding network failures in data centers: Measurement, analysis, and implications,\u201d ACM SIGCOMM Comput. Commun. Rev., vol.41, no.4, pp.350-361, ACM, 2011. 10.1145\/2043164.2018477","DOI":"10.1145\/2043164.2018477"},{"key":"3","doi-asserted-by":"crossref","unstructured":"[3] R. Govindan, I. Minei, M. Kallahalla, B. Koley, and A. Vahdat, \u201cEvolve or die: High-availability design principles drawn from googles network infrastructure,\u201d Proc. 2016 ACM SIGCOMM Conference, pp.58-72, 2016. 10.1145\/2934872.2934891","DOI":"10.1145\/2934872.2934891"},{"key":"4","doi-asserted-by":"crossref","unstructured":"[4] A. Mahimkar, Z. Ge, J. Wang, J. Yates, Y. Zhang, J. Emmons, B. Huntley, and M. Stockert, \u201cRapid detection of maintenance induced changes in service performance,\u201d Proc. ACM CoNEXT, 2011. 10.1145\/2079296.2079309","DOI":"10.1145\/2079296.2079309"},{"key":"5","doi-asserted-by":"publisher","unstructured":"[5] M. Ahmed, A.N. Mahmood, and J. Hu, \u201cA survey of network anomaly detection techniques,\u201d J. Netw. Comput. Appl., vol.60, pp.19-31, 2016. 10.1016\/j.jnca.2015.11.016","DOI":"10.1016\/j.jnca.2015.11.016"},{"key":"6","doi-asserted-by":"crossref","unstructured":"[6] R.C. Aygun and A.G. Yavuz, \u201cNetwork anomaly detection with stochastically improved autoencoder based models,\u201d 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud), pp.193-198, IEEE, 2017. 10.1109\/cscloud.2017.39","DOI":"10.1109\/CSCloud.2017.39"},{"key":"7","doi-asserted-by":"crossref","unstructured":"[7] W. Meng, Y. Liu, Y. Zhu, S. Zhang, D. Pei, Y. Liu, Y. Chen, R. Zhang, S. Tao, P. Sun, and R. Zhou, \u201cLoganomaly: Unsupervised detection of sequential and quantitative anomalies in unstructured logs.,\u201d IJCAI, pp.4739-4745, 2019. 10.24963\/ijcai.2019\/658","DOI":"10.24963\/ijcai.2019\/658"},{"key":"8","doi-asserted-by":"crossref","unstructured":"[8] S. Kandula, D. Katabi, and J.P. Vasseur, \u201cShrink: A tool for failure diagnosis in IP networks,\u201d Proc. 2005 ACM SIGCOMM Workshop on Mining Network Data, pp.173-178, 2005. 10.1145\/1080173.1080178","DOI":"10.1145\/1080173.1080178"},{"key":"9","doi-asserted-by":"publisher","unstructured":"[9] H. Yan, L. Breslau, Z. Ge, D. Massey, D. Pei, and J. Yates, \u201cG-RCA: A generic root cause analysis platform for service quality management in large IP networks,\u201d IEEE Trans. Netw., vol.20, no.6, pp.1734-1747, 2012. 10.1109\/tnet.2012.2188837","DOI":"10.1109\/TNET.2012.2188837"},{"key":"10","doi-asserted-by":"crossref","unstructured":"[10] Y. Matsuo, Y. Nakano, A. Watanabe, K. Watanabe, K. Ishibashi, and R. Kawahara, \u201cRoot-cause diagnosis for rare failures using bayesian network with dynamic modification,\u201d Proc. ICC, 2018. 10.1109\/icc.2018.8422955","DOI":"10.1109\/ICC.2018.8422955"},{"key":"11","doi-asserted-by":"publisher","unstructured":"[11] L. Bennacer, Y. Amirat, A. Chibani, A. Mellouk, and L. Ciavaglia, \u201cSelf-diagnosis technique for virtual private networks combining bayesian networks and case-based reasoning,\u201d IEEE Trans. Automat Sci. Eng., vol.12, no.1, pp.354-366, 2015. 10.1109\/tase.2014.2321011","DOI":"10.1109\/TASE.2014.2321011"},{"key":"12","unstructured":"[12] D. Min, L. Feifei, Z. Guineng, and V. Srikumar, \u201cDeepLog: Anomaly detection and diagnosis from system logs through deep learning,\u201d Proc. SIGSAC, pp.1285-1298, 2017. 10.1145\/3133956.3134015"},{"key":"13","unstructured":"[13] J. Rafal, Z. Wojciech, and S. Ilya, \u201cAn empirical exploration of recurrent network architectures,\u201d Proc. ICML, pp.2342-2350, 2015."},{"key":"14","doi-asserted-by":"publisher","unstructured":"[14] S. Yang, Y. He, Z. Ge, D. Wang, and J. Xu, \u201cPredictive impact analysis for designing a resilient cellular backhaul network,\u201d SIGMETRICS, vol.1, no.2, pp.1-33, 2017. 10.1145\/3154488","DOI":"10.1145\/3154488"},{"key":"15","unstructured":"[15] J. Bradbury, S. Merity, C. Xiong, and R. Socher, \u201cQuasi-recurrent neural networks,\u201d Proc. ICLR, 2017."},{"key":"16","unstructured":"[16] A. van den Oord, S. Dieleman, H. Zen, K. Simonyan, O. Vinyals, A. Graves, N. Kalchbrenner, A. Senior, and K. Kavukcuoglu, \u201cWaveNet: A generative model for raw audio,\u201d arXiv:1609.03499, 2016."},{"key":"17","doi-asserted-by":"publisher","unstructured":"[17] C. Zhang, P. Patras, and H. Haddadi, \u201cDeep learning in mobile and wireless networking: A survey,\u201d IEEE Commun. Surveys Tuts., vol.21, no.3, pp.2224-2287, 2019. 10.1109\/comst.2019.2904897","DOI":"10.1109\/COMST.2019.2904897"},{"key":"18","doi-asserted-by":"crossref","unstructured":"[18] J. Wang, J. Tang, Z. Xu, Y. Wang, G. Xue, X. Zhang, and D. Yang, \u201cSpatiotemporal modeling and prediction in cellular networks: A big data enabled deep learning approach,\u201d IEEE INFOCOM 2017-IEEE Conference on Computer Communications, pp.1-9, IEEE, 2017. 10.1109\/infocom.2017.8057090","DOI":"10.1109\/INFOCOM.2017.8057090"},{"key":"19","doi-asserted-by":"crossref","unstructured":"[19] X. Wang, Z. Zhou, F. Xiao, K. Xing, Z. Yang, Y. Liu, and C. Peng, \u201cSpatio-temporal analysis and prediction of cellular traffic in metropolis,\u201d IEEE Trans. Mobile Comput., vol.18, no.9, pp.2190-2202, 2018. 10.1109\/TMC.2018.2870135","DOI":"10.1109\/TMC.2018.2870135"},{"key":"20","doi-asserted-by":"publisher","unstructured":"[20] M. Chen, Y. Miao, H. Gharavi, L. Hu, and I. Humar, \u201cIntelligent traffic adaptive resource allocation for edge computing-based 5G networks,\u201d IEEE Trans. Cogn. Commun. Netw., vol.6, no.2, pp.499-508, 2019. 10.1109\/tccn.2019.2953061","DOI":"10.1109\/TCCN.2019.2953061"},{"key":"21","doi-asserted-by":"crossref","unstructured":"[21] S. Yao, S. Hu, Y. Zhao, A. Zhang, and T. Abdelzaher, \u201cDeepsense: A unified deep learning framework for timeseries mobile sensing data processing,\u201d Proc. WWW, pp.351-360, 2017. 10.1145\/3038912.3052577","DOI":"10.1145\/3038912.3052577"},{"key":"22","doi-asserted-by":"crossref","unstructured":"[22] T. Kimura, A. Watanabe, T. Toyono, and K. Ishibashi, \u201cProactive failure detection learning generation patterns of large-scale network logs,\u201d Proc. CNSM, pp.8-14, 2015. 10.1109\/cnsm.2015.7367332","DOI":"10.1109\/CNSM.2015.7367332"},{"key":"23","doi-asserted-by":"crossref","unstructured":"[23] T. Kimura, K. Ishibashi, T. Mori, H. Sawada, T. Toyono, K. Nishimatsu, A. Watanabe, A. Shimoda, and K. Shiomoto, \u201cSpatio-temporal factorization of log data for understanding network events,\u201d Proc. INFOCOM, pp.610-618, 2014. 10.1109\/infocom.2014.6847986","DOI":"10.1109\/INFOCOM.2014.6847986"},{"key":"24","doi-asserted-by":"publisher","unstructured":"[24] U. Steve, Q. Bruno, B. Simon, and L. Jean, \u201cProviding public intradomain traffic matrices to the research community,\u201d ACM SIGCOMM Comput. Commun. Rev., vol.36, no.1, pp.83-86, 2006. 10.1145\/1111322.1111341","DOI":"10.1145\/1111322.1111341"},{"key":"25","unstructured":"[25] Pytorch, https:\/\/pytorch.org\/, 2019.08.29."}],"container-title":["IEICE Transactions on Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transcom\/E104.B\/10\/E104.B_2020EBP3177\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,10]],"date-time":"2024-01-10T14:59:01Z","timestamp":1704898741000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transcom\/E104.B\/10\/E104.B_2020EBP3177\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,1]]},"references-count":25,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2021]]}},"URL":"https:\/\/doi.org\/10.1587\/transcom.2020ebp3177","relation":{},"ISSN":["0916-8516","1745-1345"],"issn-type":[{"value":"0916-8516","type":"print"},{"value":"1745-1345","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,10,1]]},"article-number":"2020EBP3177"}}