IEEE Local Computer Network Conference 2010
DOI: 10.1109/lcn.2010.5735702
|View full text |Cite
|
Sign up to set email alerts
|

Joint optimization of monitor location and network anomaly detection

Abstract: Abstract-Achieving cost-effective systems for network performance monitoring has been the subject of many research works over the last few years. Most of them adopt a two-step approach. The first step assigns optimal locations to monitoring devices, whereas the second step selects a minimal set of paths to be monitored. However, such an approach does not consider the trade-off between the optimization objectives of each step, and hence may lead to sub-optimal usage of network resources and biased measurements.… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
20
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
4
1

Relationship

3
2

Authors

Journals

citations
Cited by 7 publications
(20 citation statements)
references
References 11 publications
0
20
0
Order By: Relevance
“…The aim of the evaluation is to investigate the efficiency of our heuristics. Namely, we 1) implemented the two proposed algorithms and compared the solutions they delivered in order to verify their scalability with respect to the network size, and the impact of the selective heuristics on the quality of the solutions; 2) compared the solutions delivered by the algorithms to the exact solutions delivered by the path-based ILP [1], in order to investigate the gap of the greedy solutions to the optimal; and also 3) relaxed the path-based ILP formulation to a linear program, solved the LP, performed a random rounding of the LP results and then took the results as an input for the exhaustive greedy algorithm. The LP results constitutes a good starting point for the greedy algorithm and reduces the number of candidate paths and candidate monitors, that is why we consider the use of the LP results in combination with the greedy algorithm.…”
Section: A Evaluation Methodologymentioning
confidence: 99%
See 4 more Smart Citations
“…The aim of the evaluation is to investigate the efficiency of our heuristics. Namely, we 1) implemented the two proposed algorithms and compared the solutions they delivered in order to verify their scalability with respect to the network size, and the impact of the selective heuristics on the quality of the solutions; 2) compared the solutions delivered by the algorithms to the exact solutions delivered by the path-based ILP [1], in order to investigate the gap of the greedy solutions to the optimal; and also 3) relaxed the path-based ILP formulation to a linear program, solved the LP, performed a random rounding of the LP results and then took the results as an input for the exhaustive greedy algorithm. The LP results constitutes a good starting point for the greedy algorithm and reduces the number of candidate paths and candidate monitors, that is why we consider the use of the LP results in combination with the greedy algorithm.…”
Section: A Evaluation Methodologymentioning
confidence: 99%
“…The aim is to find largescale heuristics that achieve low-cost solutions and reduce the computation time. The two algorithms will be compared to each other, and to the exact solution of the problem formulated in [1], in order the assess their efficiency.…”
Section: Problem Formulationmentioning
confidence: 99%
See 3 more Smart Citations