2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM) 2017
DOI: 10.23919/inm.2017.7987460
|View full text |Cite
|
Sign up to set email alerts
|

A decentralized approach for adaptive workload estimation in virtualized environments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2018
2018

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 34 publications
0
2
0
Order By: Relevance
“…Hence we adopt the notation ψ t,v (i) instead of ψ T . Since the updates of the principal axes described in Equations (6)- (7) are performed for all virtual hosts of all tenants, the latter should have very similar estimations at the end of the gossip process. This is represented as step 3 in Figure 1.…”
Section: Decentralized Estimation Of Legitimate Activitiesmentioning
confidence: 99%
See 1 more Smart Citation
“…Hence we adopt the notation ψ t,v (i) instead of ψ T . Since the updates of the principal axes described in Equations (6)- (7) are performed for all virtual hosts of all tenants, the latter should have very similar estimations at the end of the gossip process. This is represented as step 3 in Figure 1.…”
Section: Decentralized Estimation Of Legitimate Activitiesmentioning
confidence: 99%
“…This paper further extends prior work by the authors. It leverages the workload estimation engine presented in [7] and the dataset presented in [8] (other previous works in that field such as [9] are out of the scope of this contribution since they do not follow the same research methodology). The original contributions presented in this paper are: (1) a statistical method for the detection of infected virtual hosts executing a malicious activity potentially scattered over several tenants; (2) the theoretical assessment of the method performance; (3) its validation in terms of performance on a real dataset integrating a botnet perpetrating a DDoS attack and (4) its scalability support by leveraging a large-scale realistic dataset generated from the real data.…”
Section: Introductionmentioning
confidence: 99%