Trustworthy Internet 2011
DOI: 10.1007/978-88-470-1818-1_19
|View full text |Cite
|
Sign up to set email alerts
|

Towards Monitoring Programmability in Future Internet: Challenges and Solutions

Abstract: Internet is becoming a global IT infrastructure serving interactive and real-time services ubiquitously accessible by heterogeneous network-enabled devices. In the Internet of Services (IoS) era, monitoring infrastructures must provide to network operators fine-grained service-specific information which can be derived by dissecting application level protocols. To accommodate these new monitoring requirements network probes must be flexible, easy to extend and still be capable of analyzing high-speed network st… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2013
2013
2017
2017

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 6 publications
(6 reference statements)
0
1
0
Order By: Relevance
“…The sheer volume of networked information, in conjunction with the complexity and polymorphous nature of modern cyberthreats, calls for scalable, accurate, and, at the same time, flexible and programmable monitoring systems [13,11]. The challenge is to promptly react to fastly mutating needs by deploying custom traffic analyses, capable of tracking event chains and multistage attacks, and efficiently handle the many heterogeneous features, events, and conditions which characterize an operational failure, a network application mis-behavior, an anomaly or an incoming attack.…”
Section: Introductionmentioning
confidence: 99%
“…The sheer volume of networked information, in conjunction with the complexity and polymorphous nature of modern cyberthreats, calls for scalable, accurate, and, at the same time, flexible and programmable monitoring systems [13,11]. The challenge is to promptly react to fastly mutating needs by deploying custom traffic analyses, capable of tracking event chains and multistage attacks, and efficiently handle the many heterogeneous features, events, and conditions which characterize an operational failure, a network application mis-behavior, an anomaly or an incoming attack.…”
Section: Introductionmentioning
confidence: 99%