skip to main content
research-article

Plan-based complex event detection across distributed sources

Published:01 August 2008Publication History
Skip Abstract Section

Abstract

Complex Event Detection (CED) is emerging as a key capability for many monitoring applications such as intrusion detection, sensor-based activity & phenomena tracking, and network monitoring. Existing CED solutions commonly assume centralized availability and processing of all relevant events, and thus incur significant overhead in distributed settings. In this paper, we present and evaluate communication efficient techniques that can efficiently perform CED across distributed event sources.

Our techniques are plan-based: we generate multi-step event acquisition and processing plans that leverage temporal relationships among events and event occurrence statistics to minimize event transmission costs, while meeting application-specific latency expectations. We present an optimal but exponential-time dynamic programming algorithm and two polynomial-time heuristic algorithms, as well as their extensions for detecting multiple complex events with common sub-expressions. We characterize the behavior and performance of our solutions via extensive experimentation on synthetic and real-world data sets using our prototype implementation.

References

  1. Eric N. Hanson, et al. Scalable Trigger Processing. ICDE 1999.Google ScholarGoogle Scholar
  2. S. Madden, M. J. Franklin, J. M. Hellerstein, and W. Hong. Tinydb. TODS 2005.Google ScholarGoogle Scholar
  3. Peter R. Pietzuch. "Hermes: A Scalable Event-Based Middleware". Ph.D. Thesis, University of Cambridge, 2004.Google ScholarGoogle Scholar
  4. S. Gatziu and K. R. Dittrich. Detecting composite events in active database systems using petri nets. In Proc. 4. Intl. Workshop on Research Issues in Data Engineering, 1994.Google ScholarGoogle ScholarCross RefCross Ref
  5. S. Chakravarthy, et al. Composite Events for Active Databases: Semantics, Contexts and Detection, VLDB 1994. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. S. Chakravarthy and D. Mishra. Snoop: An Expressive Event Specification Language for Active Databases. Data and Knowledge Engineering, 14(10): 1--26, 1994. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Eugene Wu, et al. High-Performance Complex Event Processing over Streams. SIGMOD 2006 Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. N. Paton and O. Diaz, 'Active Database Systems', ACM Comp. Surveys, Vol. 31, No. 1, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Zimmer, D. and Unland, R. On the Semantics of Complex Events in Active Database Management Systems. ICDE '99. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. The Power of Events. David Luckham, May 2002.Google ScholarGoogle Scholar
  11. Sellis, T. K. Multiple-query optimization. TODS Mar. 1988. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Zhou, J., et al. Efficient exploitation of similar subexpressions for query processing. SIGMOD '07. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Pattern Recognition and Machine Learning. Bishop, Christopher M. 2006, ISBN: 978-0-387-31073-2.Google ScholarGoogle Scholar
  14. Combinatorial optimization: algorithms and complexity. Christos H. Papadimitriou, Kenneth Steiglitz. 1998.Google ScholarGoogle Scholar
  15. S. V. Amaria and R. B. Misra, Closed-form expressions for distribution of sum of exponential random variables, IEEE Trans. Reliability, vol. 46, no. 4, pp. 519--522, Dec. 1997.Google ScholarGoogle ScholarCross RefCross Ref
  16. Amol Deshpande, et al. Model-based approximate querying in sensor networks. VLDB J. 14(4): 417--443 (2005)Google ScholarGoogle ScholarCross RefCross Ref
  17. Daniel Abadi, et al. The Design of the Borealis Stream Processing Engine. CIDR '05.Google ScholarGoogle Scholar
  18. S. Chandrasekaran, et al. TelegraphCQ: Continuous Dataflow Processing. In ACM SIGMOD Conference, June 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. R. Motwani, et al. Query Processing, Approximation, and Resource Management in a Data Stream Management System. In CIDR Conference, January 2003.Google ScholarGoogle Scholar
  20. http://planetflow.planet-lab.orgGoogle ScholarGoogle Scholar
  21. Selinger, P. G., et al. 1979. Access path selection in a relational database management system. SIGMOD '79. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. SNORT Network Intrusion Detection. http://www.snort.orgGoogle ScholarGoogle Scholar
  23. S. Li, et al. Event Detection Services Using Data Service Middleware in Distributed Sensor Networks. IPSN 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Plan-based complex event detection across distributed sources

              Recommendations

              Comments

              Login options

              Check if you have access through your login credentials or your institution to get full access on this article.

              Sign in

              Full Access

              PDF Format

              View or Download as a PDF file.

              PDF

              eReader

              View online with eReader.

              eReader