Mostrar el registro sencillo del ítem

dc.creatorVega, Carloses_ES
dc.creatorAracil Rico, Javieres_ES
dc.creatorMagaña Lizarrondo, Eduardoes_ES
dc.date.accessioned2019-08-26T11:13:31Z
dc.date.available2019-12-03T00:00:17Z
dc.date.issued2018
dc.identifier.citationC. Vega, J. Aracil and E. Magana, 'KISS Methodologies for Network Management and Anomaly Detection,' 2018 26th International Conference on Software, Telecommunications and Computer Networks (SoftCOM), Split, 2018, pp. 1-6. doi: 10.23919/SOFTCOM.2018.8555785en
dc.identifier.isbn9789532900873
dc.identifier.issn1847-358X
dc.identifier.urihttps://hdl.handle.net/2454/34676
dc.descriptionTrabajo presentado al 26th International Conference on Software, Telecommunications and Computer Networks, SoftCOM 2018. Croacia, 13-15 de septiembre de 2018en
dc.description.abstractCurrent networks are increasingly growing in size, complexity and the amount of monitoring data that they produce, which requires complex data analysis pipelines to handle data collection, centralization and analysis tasks. Literature approaches, include the use of custom agents to harvest information and large data centralization systems based on clusters to achieve horizontal scalability, which are expensive and difficult to deploy in real scenarios. In this paper we propose and evaluate a series of methodologies, deployed in real industrial production environments, for network management, from the architecture design to the visualization system as well as for the anomaly detection methodologies, that intend to squeeze the vertical resources and overcome the difficulties of data collection and centralization.en
dc.description.sponsorshipThe authors would like to thank MINECO, received through grant TEC2015-69417 (TRAFICA).en
dc.format.extent6 p.
dc.format.mimetypeapplication/pdfen
dc.language.isoengen
dc.publisherIEEEen
dc.relation.ispartof2018 26th International Conference on Software, Telecommunications and Computer Networks, Softcom 2018, pp. 181-186en
dc.rights© 2018 University of Split, FESB.en
dc.subjectAnomaly detectionen
dc.subjectNetwork managementen
dc.subjectComputer network securityen
dc.subjectKISS methodologiesen
dc.subjectCcomplex data analysis pipelinesen
dc.subjectHorizontal scalabilityen
dc.titleKISS methodologies for network management and anomaly detectionen
dc.typeinfo:eu-repo/semantics/conferenceObjecten
dc.typeContribución a congreso / Biltzarrerako ekarpenaes
dc.contributor.departmentIngeniería Eléctrica, Electrónica y de Comunicaciónes_ES
dc.contributor.departmentIngeniaritza Elektrikoa, Elektronikoa eta Telekomunikazio Ingeniaritzaeu
dc.rights.accessRightsinfo:eu-repo/semantics/openAccessen
dc.rights.accessRightsAcceso abierto / Sarbide irekiaes
dc.embargo.terms2019-12-03
dc.identifier.doi10.23919/SOFTCOM.2018.8555785
dc.relation.projectIDinfo:eu-repo/grantAgreement/MINECO//TEC2015-69417-C2-2-R/ES/en
dc.relation.publisherversionhttps://doi.org/10.23919/SOFTCOM.2018.8555785
dc.type.versioninfo:eu-repo/semantics/acceptedVersionen
dc.type.versionVersión aceptada / Onetsi den bertsioaes


Ficheros en el ítem

Thumbnail

Este ítem aparece en la(s) siguiente(s) colección(ones)

Mostrar el registro sencillo del ítem


El Repositorio ha recibido la ayuda de la Fundación Española para la Ciencia y la Tecnología para la realización de actividades en el ámbito del fomento de la investigación científica de excelencia, en la Línea 2. Repositorios institucionales (convocatoria 2020-2021).
Logo MinisterioLogo Fecyt