Near real-time anomaly detection in NFV infrastructures

A Derstepanians, M Vannucci… - … IEEE Conference on …, 2022 - ieeexplore.ieee.org
This paper presents a scalable cloud-based archi-tecture for near real-time anomaly
detection in the Vodafone NFV infrastructure, spanning across multiple data centers in 11 …

Fault Diagnosis in the Network Function Virtualization: A Survey, Taxonomy and Future Directions

J Li, X Qi, J Li, Z Su, Y Su, L Liu - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
The widespread application of ultra-dense and multivariate Internet of Things (IoT) benefits
from Network Function Virtualization (NFV) that provides flexible frameworks and effective …

A 2-Phase Strategy for Intelligent Cloud Operations

G Lanciano, R Andreoli, T Cucinotta, D Bacciu… - IEEE …, 2023 - ieeexplore.ieee.org
When operating large cloud computing infrastructures, ensuring healthiness of physical
resources and software components is of paramount importance to meet the demanding …

[PDF][PDF] Self-organising engine for the Cloud-to-Edge continuum

BRL Faria - FOG, 2023 - researchgate.net
Abstract In the Cloud-to-Edge continuum, heterogeneous devices are distributed in a large
area, which makes it challenging to manage. Furthermore, those devices are prone to …

Data-Driven Methods for Data Center Operations Support

G Lanciano - 2023 - ricerca.sns.it
During the last decade, cloud technologies have been evolving at an impressive pace, such
that we are now living in a cloud-native era where developers can leverage on an …

[图书][B] Anomaly symptom recognition in distributed IT systems

A Acker - 2021 - search.proquest.com
The progressing global digitalization is driving innovative network technologies,
computation platforms, and data-driven services. The number of components such as …

Data Analysis of an Experimental Cloud Virtualization Scenario Using Machine Learning Methods

PRX do Carmo, E Freitas, AT Oliveira Filho… - Available at SSRN … - papers.ssrn.com
The cloud computing paradigm is at the heart of data center and telecommunications
infrastructure. It is driven by virtualization as its main underlying technology. Virtualization …

Detection of Misuse Attack in NFV Networks Using Machine Learning

AK Ali, WS Bhaya - Journal of Physics: Conference Series, 2021 - iopscience.iop.org
Network Function Virtualization (NFV) represents a virtual network whose service is
provided by virtual parts of virtual machines. This type of network is easy to implement and …

Detección de anomalías con Prometheus

D Martínez Baselga, D Taibi - 2020 - zaguan.unizar.es
Prometheus es una aplicación de uso extendido para monitorizar sistemas de Kubernetes.
No obstante, no provee una solución adecuada para detectar anomalías complejas. En este …

[PDF][PDF] Detección de anomalías con Prometheus

JF Caro-Director, D Taibi - 2020 - zaguan.unizar.es
In the recent years, distributed systems have become more important and are the main
option in production environments. They offer reliability, efficiency and scalability, as well as …