Ieee Infocom 2009 2009
DOI: 10.1109/infcom.2009.5061959
|View full text |Cite
|
Sign up to set email alerts
|

Towards Efficient Large-Scale VPN Monitoring and Diagnosis under Operational Constraints

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
29
0

Year Published

2010
2010
2022
2022

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 18 publications
(30 citation statements)
references
References 17 publications
0
29
0
Order By: Relevance
“…We adopt the most common approach of anomaly detection that is monitoring a covering path set that do not distinguish link anomalies 1 (e.g. [1], [2], [6]). The aim of such an approach is to minimize the monitoring overhead when the network is operational.…”
Section: Problem Formulationmentioning
confidence: 99%
See 4 more Smart Citations
“…We adopt the most common approach of anomaly detection that is monitoring a covering path set that do not distinguish link anomalies 1 (e.g. [1], [2], [6]). The aim of such an approach is to minimize the monitoring overhead when the network is operational.…”
Section: Problem Formulationmentioning
confidence: 99%
“…In the second scenario ( Fig.1), we locate three monitoring devices on nodes 1, 6 and 8. S2 = {P3 (1,4,6), P4 (1,3,6,7,8), P5 (1,2,5,4,7,8)} is an optimal corresponding path set. In the first scenario, the links (1, 3), (3,6) and (7,8) are monitored twice; they belong each to two monitored paths.…”
Section: Problem Formulationmentioning
confidence: 99%
See 3 more Smart Citations