2020
DOI: 10.1002/nem.2138
|View full text |Cite
|
Sign up to set email alerts
|

Graph theoretical approach for automated IP lifecycle management in telco networks

Abstract: Summary IP address management (IPAM) systems are commonly used in the telecommunication industry to serve resource management for large‐scaled IP networks. In resource management, IPAM provides network operators a live IP lifecycle support with an easier use on IP inventory while providing the scaling and high performance. Throughout the management of IP lifecycle, having up‐to‐date topology information plays a key role because of the rapidly changing usage of the IP addresses. Furthermore, if the usage inform… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 8 publications
0
1
0
Order By: Relevance
“…O. Rahman et al evaluated J48, Random Forest (RF), SVM, and K-NN algorithms to detect and block the DDoS attack in an SDN network and the results showed that J48 has better performance than others [17]. K. Duran et al proposed an automated attribute-based IP management module with the three engines and they succeeded in a more accurate anomaly detection method by decreasing the anomaly scoring rate compared to IPAMv1 [18]. SVM, Naive Bayes, Decision Tree, and Logistic Regression techniques were evaluated to detect DDoS attacks in SDN and the results showed that SVM has better performance [19].…”
Section: Related Workmentioning
confidence: 99%
“…O. Rahman et al evaluated J48, Random Forest (RF), SVM, and K-NN algorithms to detect and block the DDoS attack in an SDN network and the results showed that J48 has better performance than others [17]. K. Duran et al proposed an automated attribute-based IP management module with the three engines and they succeeded in a more accurate anomaly detection method by decreasing the anomaly scoring rate compared to IPAMv1 [18]. SVM, Naive Bayes, Decision Tree, and Logistic Regression techniques were evaluated to detect DDoS attacks in SDN and the results showed that SVM has better performance [19].…”
Section: Related Workmentioning
confidence: 99%