KISS Methodologies for Network Management and Anomaly Detection

Carlos Vega, Javier Aracil, Eduardo Magana

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Citations (Scopus)

Abstract

Current networks are increasingly growing in size, complexity and the amount of monitoring data that they produce, which requires complex data analysis pipelines to handle data collection, centralization and analysis tasks. Literature approaches, include the use of custom agents to harvest information and large data centralization systems based on clusters to achieve horizontal scalability, which are expensive and difficult to deploy in real scenarios. In this paper we propose and evaluate a series of methodologies, deployed in real industrial production environments, for network management, from the architecture design to the visualization system as well as for the anomaly detection methodologies, that intend to squeeze the vertical resources and overcome the difficulties of data collection and centralization.

Original languageEnglish
Title of host publication2018 26th International Conference on Software, Telecommunications and Computer Networks, SoftCOM 2018
EditorsDinko Begusic, Matko Saric, Josko Radic, Nikola Rozic
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages181-186
Number of pages6
ISBN (Electronic)9789532900873
DOIs
Publication statusPublished - 30 Nov 2018
Externally publishedYes
Event26th International Conference on Software, Telecommunications and Computer Networks, SoftCOM 2018 - Split - Supetar, Croatia
Duration: 13 Sept 201815 Sept 2018

Publication series

Name2018 26th International Conference on Software, Telecommunications and Computer Networks, SoftCOM 2018

Conference

Conference26th International Conference on Software, Telecommunications and Computer Networks, SoftCOM 2018
Country/TerritoryCroatia
CitySplit - Supetar
Period13/09/1815/09/18

Keywords

  • Network management
  • anomaly detection

Fingerprint

Dive into the research topics of 'KISS Methodologies for Network Management and Anomaly Detection'. Together they form a unique fingerprint.

Cite this