Since the 1960s, when automation became essential to productivity, methods for the detection and identification of faults have been proposed. Physical systems are diversified and can be mechanical, electrical, pneumatic, electronic, or a combination of these. In addition, real plants have a large number of these devices, which are for its own operation, sensoring or control. Therefore the solutions given for detection of faults are generally very specific or particular. This paper aims to describe and analyze two hybrid methods of detection and fault identification based on residue and to check whether their inclusion with other methods, combining different techniques, can produce a better fault detection and identification system. The methods use the state observers for the generation of residues, which serve for the detection and identification and the set called the bank of signatures to identify the faults. Thereafter, the methods use different approaches to diagnose the fault: the first uses the approach of the mean square error, and the second uses a decision tree.
In this paper, we propose an approach to automatic detection of attacks on computer networks using data that combine the traffic generated with 'live' intra-cloud virtual-machine (VM) migration. The method used in this work is the recently introduced typicality and eccentricity data analytics (TEDA) framework. We compare the results of applying TEDA with the traditionally used methods such as statistical analysis, such as k-means clustering. One of the biggest challenges in computer network analysis using statistical or numerical methods is the fact that the protocol information is composed of integer/string values and, thus, not easy to handle by traditional pattern recognition methods that deal with real values. In this study we consider as features the tuple {IP source, IP destination, Port source and Port destination} extracted from the network flow data in addition to the traditionally used real values that represent the number of packets per time or quantity of bytes per time. Using entropy of the IP data helps to convert the integer raw data into real valued signatures. The proposed solution permit to build a real-time anomaly detection system and reduce the number of information that is necessary for evaluation. In general, the systems based on traffic are fast and are used in real time but they do not produce good results in attacks that produce a flow hidden within the background traffic or within a high traffic that is produced by other application. We validate our approach an a dataset which includes attacks on the network port scan (NPS) and network scan (NS) that permit hidden flow within the normal traffic and see this attacks together with live migration which produces a higher traffic flow.
Diante do crescimento de empresas que adotam a tecnologia da informação como ferramenta estratégica e de controle, o gerenciamento de redes surge como necessidade em um ambiente que o número de dispositivos de redes aumenta com o decorrer do tempo. Visando a centralização da gerência de redes e o baixo custo para implementação, esse artigo propõe a utilização da ferramenta Zabbix e do protocolo SNMP, não somente para monitoramento e controle, mas para resolução e antecipação de problemas relacionados a equipamentos de rede.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.