2018
DOI: 10.1587/bplus.12.29
|View full text |Cite
|
Sign up to set email alerts
|

Application of AI to Network Operation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 25 publications
(8 reference statements)
0
5
0
Order By: Relevance
“…NFV works in a virtualized environment that has various vulnerabilities. We categorized it into two main types, performance-related vulnerabilities and security-related vulnerabilities [33]. Performance-related vulnerabilities occur due to weakness in the network architecture, lack of data flow control and backup devices, the poor configuration of software and security devices, etc.…”
Section: Nfv Security Issuesmentioning
confidence: 99%
“…NFV works in a virtualized environment that has various vulnerabilities. We categorized it into two main types, performance-related vulnerabilities and security-related vulnerabilities [33]. Performance-related vulnerabilities occur due to weakness in the network architecture, lack of data flow control and backup devices, the poor configuration of software and security devices, etc.…”
Section: Nfv Security Issuesmentioning
confidence: 99%
“…NTT Network Technology Laboratories is making headway in the development of an autoencoder (AE)based network anomaly detection system designed to achieve early detection of changes in network conditions [2][3][4]. An AE is a kind of neural network capable of unsupervised learning of the intrinsic complex structure of data and is currently drawing a great deal of interest for anomaly detection applications.…”
Section: Network Anomaly Detection Technologymentioning
confidence: 99%
“…Recently, the use of artificial intelligence (AI) in network operations has attracted attention [1]. Although research is progressing in areas such as anomaly detection, root cause analysis, and control recovery, research on estimating failure scales is limited thus far.…”
Section: Introductionmentioning
confidence: 99%