[1]杜佳*,樊琳卓.基于特征提取的设备日志分析系统设计与实现[J].计算机技术与发展,2025,(07):207-213.[doi:10.20165/j.cnki.ISSN1673-629X.2025.0079]
 DU Jia*,FAN Lin-zhuo.Design and Implementation of Device Log Analysis System Based on Feature Extraction[J].,2025,(07):207-213.[doi:10.20165/j.cnki.ISSN1673-629X.2025.0079]
点击复制

基于特征提取的设备日志分析系统设计与实现

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
期数:
2025年07期
页码:
207-213
栏目:
新型计算应用系统
出版日期:
2025-07-10

文章信息/Info

Title:
Design and Implementation of Device Log Analysis System Based on Feature Extraction
文章编号:
1673-629X(2025)07-0207-07
作者:
杜佳*樊琳卓
中国电信股份有限公司陕西分公司 智能云网调度运营中心,陕西 西安 710075
Author(s):
DU Jia*FAN Lin-zhuo
Intelligent Cloud Network Operation Center,China Telecom Corporation Limited Shaanxi Branch,Xi’an 710075,China
关键词:
云网设备特征提取日志分析先验知识无监督学习设备操作合规性检查
Keywords:
cloud network device feature extraction log analysis priori knowledge unsupervised learning compliance checking of device operation
分类号:
TP311;TP391
DOI:
10.20165/j.cnki.ISSN1673-629X.2025.0079
摘要:
为了及时发现云网设备运维过程中的不合规操作,保障云网设备安全稳定,设备日志分析技术备受关注,特征提取是该技术的基本方法,特征质量直接影响着最终结果。 针对电信场景,提出了一种将先验知识和无监督学习相融合的特征提取方法。 该方法首先以华为、中兴通讯、烽火通信、新华三等市场主流通信设备制造商的产品手册,中国电信云网设备变更操作管理办法,运维案例库为基础,人工筛选出符合目标要求的特征;然后为日志中的每个操作条目提取操作摘要,即主题词,以 TF-IDF 思想为基础,计算出每个操作摘要的权重值,从而实现无监督学习的特征提取;最后将先验知识和无监督学习两种方法提取的特征相融合,组成变更操作特征库,增强了特征在电信企业管理要求和未知场景预测两方面的代表性。 测试结果表明,该方法能对设备操作日志进行高效分析,实现合规性检查,用户自定义特征的日志信息提取,子日志划分等功能,且对机器硬件要求低,部署便捷、成本低廉,为电信运营商的设备运维安全检查提供支持。
Abstract:
To promptly detect non - compliant operations during cloud - network device operation and maintenance and ensure cloud -network security and stability,device log analysis technology has garnered significant attention,where feature extraction serves as a foun-dational methodology,with feature quality directly impacting final outcomes. A feature extraction method integrating prior knowledge and unsupervised learning is proposed for telecommunication scenarios. Firstly, by referencing product manuals from mainstream communication device manufacturers ( e. g. , Huawei, ZTE, FiberHome, H3C), China Telecom Cloud - Network Device Operation Management Regulations, and operation and maintenance case repositories, features aligning with target requirements are manually filtered. Subsequently,for each operational command in the logs,an operation abstract (keywords) is extracted. Based on the TF-IDF (Term Frequency - Inverse Document Frequency ) framework, weight values for each operation abstract are calculated, enabling unsupervised feature extraction. Finally,manually filtered features and unsupervised- learned features are combined to construct a change operation feature library,enhancing the representativeness of features in both telecom enterprise management requirements and unknown scenario prediction. The test results show that the proposed method can conduct efficient analysis of equipment operation logs,achieve functions such as compliance check,log information extraction of user-defined features, sub-log division,etc. Moreover, it has low re-quirements for machine hardware,is easy to deploy and has low cost,providing support for the security check of equipment operation and maintenance of telecommunications operators.

相似文献/References:

[1]田昕辉 李成基.带有短语切分的中文文本分类方法[J].计算机技术与发展,2010,(01):5.
 TIAN Xin-hui,LEE Sung-kee.Phrase Segmentation for Chinese Text Classification[J].,2010,(07):5.
[2]何小娜 逄焕利.基于二维直方图和改进蚁群聚类的图像分割[J].计算机技术与发展,2010,(03):128.
 HE Xiao-na,PANG Huan-li.Image Segmentation Based on Improved Ant Colony Clustering and Two- Dimensional Histogram[J].,2010,(07):128.
[3]罗林波 陈绮.氨基酸序列特征提取方法研究[J].计算机技术与发展,2010,(02):206.
 LUO Lin-bo,CHEN Qi.Research of Feature Extraction Methods of Amino Acid Sequence[J].,2010,(07):206.
[4]姜鹤 陈丽亚.SVM文本分类中一种新的特征提取方法[J].计算机技术与发展,2010,(03):17.
 JIANG He,CHEN Li-ya.A New Feature Selection Method in SVM Text Categorization[J].,2010,(07):17.
[5]毛雁明 兰美辉 王运琼 冯乔生.一种改进的基于Harris的角点检测方法[J].计算机技术与发展,2009,(05):130.
 MAO Yan-ming,LAN Mei-hui,WANG Yun-qiong,et al.An Improved Corner Detection Method Based on Harris[J].,2009,(07):130.
[6]赵辉 张鹏.网络异常的主动检测与特征分析[J].计算机技术与发展,2009,(08):159.
 ZHAO Hui,ZHANG Peng.Active Detection and Feature Analysis About Network Anomaly[J].,2009,(07):159.
[7]汤婷 吴小培 项明.指纹图像增强与特征提取[J].计算机技术与发展,2009,(01):81.
 TANG Ting,WU Xiao-pei,XIANG Ming.Fingerprint Image Enhancement and Minutiae Extraction[J].,2009,(07):81.
[8]张国富 凌捷 彭辉 谷保平.基于支持向量机的手写签名研究[J].计算机技术与发展,2008,(05):57.
 ZHANG Guo-fu,LING Jie,PENG Hui,et al.Research of Handwritten Signature Based on SVM[J].,2008,(07):57.
[9]黄国宏 刘刚.一种新的基于Fisher准则的线性特征提取方法[J].计算机技术与发展,2008,(05):227.
 HUANG Guo-hong,LIU Gang.A New Linear Feature Extraction Method Based on Fisher Criterion[J].,2008,(07):227.
[10]黄国宏 刘刚.一种新的基于DCT变换的线性判别分析[J].计算机技术与发展,2008,(06):97.
 HUANG Guo-hong,LIU Gang.A Novel Linear Discriminant Analysis Based on DCT[J].,2008,(07):97.

更新日期/Last Update: 2025-07-10