[HTML][HTML] A survey on network data collection

D Zhou, Z Yan, Y Fu, Z Yao - Journal of Network and Computer …, 2018 - Elsevier
Networks have dramatically changed our daily life and infiltrated all aspects of human
society. At the same time when we enjoy the convenience and benefits brought by the …

Packet-level telemetry in large datacenter networks

Y Zhu, N Kang, J Cao, A Greenberg, G Lu… - Proceedings of the …, 2015 - dl.acm.org
Debugging faults in complex networks often requires capturing and analyzing traffic at the
packet level. In this task, datacenter networks (DCNs) present unique challenges with their …

A survey on information visualization for network and service management

VT Guimaraes, CMDS Freitas, R Sadre… - … Surveys & Tutorials, 2015 - ieeexplore.ieee.org
Network and service management encompasses a set of activities, methods, procedures,
and tools, whose ultimate goal is to guarantee the proper functioning of a networked system …

Autocog: Measuring the description-to-permission fidelity in android applications

Z Qu, V Rastogi, X Zhang, Y Chen, T Zhu… - Proceedings of the 2014 …, 2014 - dl.acm.org
The booming popularity of smartphones is partly a result of application markets where users
can easily download wide range of third-party applications. However, due to the open nature …

[HTML][HTML] System log clustering approaches for cyber security applications: A survey

M Landauer, F Skopik, M Wurzenberger, A Rauber - Computers & Security, 2020 - Elsevier
Log files give insight into the state of a computer system and enable the detection of
anomalous events relevant to cyber security. However, automatically analyzing log data is …

An empirical investigation of practical log anomaly detection for online service systems

N Zhao, H Wang, Z Li, X Peng, G Wang, Z Pan… - Proceedings of the 29th …, 2021 - dl.acm.org
Log data is an essential and valuable resource of online service systems, which records
detailed information of system running status and user behavior. Log anomaly detection is …

Length matters: Clustering system log messages using length of words

K Shima - arxiv preprint arxiv:1611.03213, 2016 - arxiv.org
The analysis techniques of system log messages (syslog messages) have a long history
from when the syslog mechanism was invented. Typically, the analysis consists of two parts …

System log parsing: A survey

T Zhang, H Qiu, G Castellano, M Rifai… - … on Knowledge and …, 2023 - ieeexplore.ieee.org
Modern information and communication systems have become increasingly challenging to
manage. The ubiquitous system logs contain plentiful information and are thus widely …

Prefix: Switch failure prediction in datacenter networks

S Zhang, Y Liu, W Meng, Z Luo, J Bu, S Yang… - Proceedings of the …, 2018 - dl.acm.org
In modern datacenter networks (DCNs), failures of network devices are the norm rather than
the exception, and many research efforts have focused on dealing with failures after they …

Syslog processing for switch failure diagnosis and prediction in datacenter networks

S Zhang, W Meng, J Bu, S Yang, Y Liu… - 2017 IEEE/ACM 25th …, 2017 - ieeexplore.ieee.org
Syslogs on switches are a rich source of information for both post-mortem diagnosis and
proactive prediction of switch failures in a datacenter network. However, such information …