2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft) 2018
DOI: 10.1109/netsoft.2018.8460031
|View full text |Cite
|
Sign up to set email alerts
|

NFV-compliant Traffic Monitoring and Anomaly Detection based on Dispersed Vantage Points in Shared Network Infrastructures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
3
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 14 publications
0
3
0
Order By: Relevance
“…The differentiation between normal and abnormal behavior is a difficult task; there is a chance that an anomalous event may occur close to normal behavior, and a normal event may occur close to anomalous behavior [67]. In both cases, we have a false alarm.…”
Section: (B) Reducing False Alarmmentioning
confidence: 99%
“…The differentiation between normal and abnormal behavior is a difficult task; there is a chance that an anomalous event may occur close to normal behavior, and a normal event may occur close to anomalous behavior [67]. In both cases, we have a false alarm.…”
Section: (B) Reducing False Alarmmentioning
confidence: 99%
“…The proposed VNF presents auto‐scaling properties and is empirically shown to be able to process up to 5 million messages per second. Another work that uses NFV technology to implement network monitoring architecture is presented in Reference . A set of monitoring agents is distributed across the network implemented as VNFs.…”
Section: Related Workmentioning
confidence: 99%
“…SPE's have been applied to sensor networks, the analysis of TCP flows, network intrusion detection . Multiple, diverse strategies for traffic anomaly detection have been proposed: machine learning, expert systems, rule mining, NFV technology, besides the strategy implemented in the present work which is the usage of entropy and PCA to detect traffic anomalies by monitoring the network traffic as a whole . It is possible to say that the major contribution of the present work is to employ an SPE extended with the operators to compute traffic entropy and PCA of the network as a whole in real time.…”
Section: Related Workmentioning
confidence: 99%
“…In contrast, anomaly detection in NFV networks has attracted limited attention so far. Pavlidis et al [28] have proposed a management-plane monitoring and anomaly detection services in a monitoring architecture. These services applied within customized analytics module learning mechanisms based on average entropy values from normal traces, alerting if entropy values deviate from established references threshold.…”
Section: Related Workmentioning
confidence: 99%