2021
DOI: 10.1016/j.eij.2021.01.001
|View full text |Cite
|
Sign up to set email alerts
|

Anomaly Detection and Bottleneck Identification of The Distributed Application in Cloud Data Center using Software–Defined Networking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
10
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 16 publications
(10 citation statements)
references
References 57 publications
0
10
0
Order By: Relevance
“…For example, a forwarding loop is considered the first bug that would stay until it is related to the rule expires. Writing of additional rules (excess restrictions may decrease the network performance [26]. 12_multi, a POX platform component, involves maintaining the mapping of hosts at a switch and port for every control in the network.…”
Section: The Considerable Packets Loss In Sdnmentioning
confidence: 99%
“…For example, a forwarding loop is considered the first bug that would stay until it is related to the rule expires. Writing of additional rules (excess restrictions may decrease the network performance [26]. 12_multi, a POX platform component, involves maintaining the mapping of hosts at a switch and port for every control in the network.…”
Section: The Considerable Packets Loss In Sdnmentioning
confidence: 99%
“…As such, anomaly detection is not just a feature of SDN-it is essential for its sustained operation and reliability [4]. The complexity of network interactions in SDN environments, coupled with the sheer volume of data, necessitates the integration of machine learning [5]. Traditional statistical methods are often inadequate in parsing the nuanced patterns that may signal a network anomaly.…”
Section: Introductionmentioning
confidence: 99%
“…While cloud has a strong and safe server, there are amounts of external and internal risks that use vulnerabilities in the cloud. This may jeopardize the confidentiality of information, data integrity and information accessibility (25). Untrusted service suppliers always conceal their system's weakness to preserve their reputations.…”
Section: Introductionmentioning
confidence: 99%