2018
DOI: 10.1007/978-3-030-05057-3_5
|View full text |Cite
|
Sign up to set email alerts
|

An Approach of Collecting Performance Anomaly Dataset for NFV Infrastructure

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 11 publications
0
3
0
Order By: Relevance
“…In [14], the authors evaluate several supervised learning approaches for Anomaly Detection (AD) by injecting faults in a Kubernetes cluster. Similarly, in [13], the authors also evaluate supervised learning techniques for off-line AD in an NFV environment.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In [14], the authors evaluate several supervised learning approaches for Anomaly Detection (AD) by injecting faults in a Kubernetes cluster. Similarly, in [13], the authors also evaluate supervised learning techniques for off-line AD in an NFV environment.…”
Section: Related Workmentioning
confidence: 99%
“…Given the abundance of operational data, it is natural to seek for data-driven approaches like ML, that can augment the capabilities of operators to ''navigate'' the zillions of available time-series and logs. For instance, considering the AD problem, many works in the literature leverage on either supervised [13], [14] or unsupervised [15]- [17] ML algorithms to detect early symptoms of anomalous conditions at different levels of a cloud infrastructure. Similarly, many recent works [18]- [20] propose time-series forecasting techniques to anticipate the evolution of workloads and scale compute resources (e.g., VMs or containers) accordingly.…”
Section: Introductionmentioning
confidence: 99%
“…Anomaly detection has been widely studied in the context of NFV and cloud operations, often with the help of fault injection techniques. For example, in [18], researchers have built a data set injecting faults in a Kubernetes cluster, and evaluating different techniques for anomaly detection based on supervised machine learning (ML), including support vector machines (SVMs), nearest neighbor, naive Bayes and random forests. SVMs have also been used in [19] for on-line detection of anomalies in data from transmissions in Wireless Sensor Networks.…”
Section: Related Workmentioning
confidence: 99%