2016
DOI: 10.1016/j.procs.2016.08.076
|View full text |Cite
|
Sign up to set email alerts
|

A System Architecture for Real-time Anomaly Detection in Large-scale NFV Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
12
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
3
3
1

Relationship

1
6

Authors

Journals

citations
Cited by 27 publications
(14 citation statements)
references
References 4 publications
0
12
0
Order By: Relevance
“…Gulenko et al [2] described an analysis pipeline and architecture to provide self-healing to cloud systems. The system is build upon the open-source stream processing framework Bitflow 6 in order to enable the sending of monitoring data as well as analysis results between machine learning algorithms.…”
Section: Background Self-healing Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…Gulenko et al [2] described an analysis pipeline and architecture to provide self-healing to cloud systems. The system is build upon the open-source stream processing framework Bitflow 6 in order to enable the sending of monitoring data as well as analysis results between machine learning algorithms.…”
Section: Background Self-healing Analysismentioning
confidence: 99%
“…During previous work we have developed a self-healing pipeline which was extensively tested in cloud computing environments [2]. It consists of detecting autonomously anomalies, find the root cause, and plan and execute appropriate actions to resolve or mitigate the occurred problem.…”
Section: Introductionmentioning
confidence: 99%
“…For what concerns NFV applications, the existing literature reports that ML techniques have been effectively used to solve different problems. In particular, in [13] a set of ML techniques are tested for an anomaly detection application. In this case, though, only supervised methods are considered and their performance is compared on data sets containing NFV features associated to different types of faults.…”
Section: Related Workmentioning
confidence: 99%
“…For what concerns NFV applications, the existing literature reports that ML techniques have been effectively used to solve different problems. In particular, in (Gulenko et al, 2016b) a set of ML techniques are tested for an anomaly detection application. In this case, though, only supervised methods are considered and their performance is compared on data sets containing NFV features associated to different types of faults.…”
Section: Related Workmentioning
confidence: 99%