[HTML][HTML] A survey on network data collection
D Zhou, Z Yan, Y Fu, Z Yao - Journal of Network and Computer …, 2018 - Elsevier
Networks have dramatically changed our daily life and infiltrated all aspects of human
society. At the same time when we enjoy the convenience and benefits brought by the …
society. At the same time when we enjoy the convenience and benefits brought by the …
Packet-level telemetry in large datacenter networks
Debugging faults in complex networks often requires capturing and analyzing traffic at the
packet level. In this task, datacenter networks (DCNs) present unique challenges with their …
packet level. In this task, datacenter networks (DCNs) present unique challenges with their …
A survey on information visualization for network and service management
Network and service management encompasses a set of activities, methods, procedures,
and tools, whose ultimate goal is to guarantee the proper functioning of a networked system …
and tools, whose ultimate goal is to guarantee the proper functioning of a networked system …
Autocog: Measuring the description-to-permission fidelity in android applications
The booming popularity of smartphones is partly a result of application markets where users
can easily download wide range of third-party applications. However, due to the open nature …
can easily download wide range of third-party applications. However, due to the open nature …
[HTML][HTML] System log clustering approaches for cyber security applications: A survey
Log files give insight into the state of a computer system and enable the detection of
anomalous events relevant to cyber security. However, automatically analyzing log data is …
anomalous events relevant to cyber security. However, automatically analyzing log data is …
An empirical investigation of practical log anomaly detection for online service systems
Log data is an essential and valuable resource of online service systems, which records
detailed information of system running status and user behavior. Log anomaly detection is …
detailed information of system running status and user behavior. Log anomaly detection is …
Length matters: Clustering system log messages using length of words
K Shima - arxiv preprint arxiv:1611.03213, 2016 - arxiv.org
The analysis techniques of system log messages (syslog messages) have a long history
from when the syslog mechanism was invented. Typically, the analysis consists of two parts …
from when the syslog mechanism was invented. Typically, the analysis consists of two parts …
System log parsing: A survey
Modern information and communication systems have become increasingly challenging to
manage. The ubiquitous system logs contain plentiful information and are thus widely …
manage. The ubiquitous system logs contain plentiful information and are thus widely …
Prefix: Switch failure prediction in datacenter networks
In modern datacenter networks (DCNs), failures of network devices are the norm rather than
the exception, and many research efforts have focused on dealing with failures after they …
the exception, and many research efforts have focused on dealing with failures after they …
Syslog processing for switch failure diagnosis and prediction in datacenter networks
Syslogs on switches are a rich source of information for both post-mortem diagnosis and
proactive prediction of switch failures in a datacenter network. However, such information …
proactive prediction of switch failures in a datacenter network. However, such information …