Abstract. Today, computer networks are essential not only for businesses but for the whole society, especially with the advent of increasingly powerful devices that are connected and need to communicate larger amounts of data to perform their functionalities. Latency, available bandwidth and packet loss ratio, are generally essential metrics used for monitor the network status. Monitor and control these resources tend to become a chore, but these components are critical to keep scalability, reliability and high availability in the networks. The main idea of this project is to use the various tools of data mining techniques for analyzing error logs of a system Management Network to find which technique is the most suitable to locate patterns...
Identifying anomalies in network traffic logs is a very challenging task for a network analyst. With...
The main objective of network monitoring is to discover the event patterns that happen frequently. I...
Large-scale data center networks are complex - comprising several thousand network devices and sever...
There is an increased demand for higher levels of network availability and reliability. Effective mo...
Internet Service Providers gather vast amounts of data in the form of trouble tickets created from c...
Most intrusion detection approaches rely on the analysis of the packet logs recording each noticeabl...
Abstract. Network Data Mining identifies emergent networks between myriads of individual data items ...
Due to increasing reliance on computer communication networks, it is highly desirable that networks ...
The Internet and associated network technologies are an increasingly integral part of modem day work...
This article proposes a framework to analyse traffic-data processes on a long-haul backbone infrastr...
This paper addressed the impacts of latency on good throughputs of a computer network. The networks ...
In this paper we propose an application of data mining methods in the prediction of the availability...
Many data center applications such as web search, advertising, online retail, social collaboration, ...
Anomaly detection is based on profiles that represent normal behavior of users, hosts or networks an...
It may be difficult to identify root causes of protocol failures or degradations in application traf...
Identifying anomalies in network traffic logs is a very challenging task for a network analyst. With...
The main objective of network monitoring is to discover the event patterns that happen frequently. I...
Large-scale data center networks are complex - comprising several thousand network devices and sever...
There is an increased demand for higher levels of network availability and reliability. Effective mo...
Internet Service Providers gather vast amounts of data in the form of trouble tickets created from c...
Most intrusion detection approaches rely on the analysis of the packet logs recording each noticeabl...
Abstract. Network Data Mining identifies emergent networks between myriads of individual data items ...
Due to increasing reliance on computer communication networks, it is highly desirable that networks ...
The Internet and associated network technologies are an increasingly integral part of modem day work...
This article proposes a framework to analyse traffic-data processes on a long-haul backbone infrastr...
This paper addressed the impacts of latency on good throughputs of a computer network. The networks ...
In this paper we propose an application of data mining methods in the prediction of the availability...
Many data center applications such as web search, advertising, online retail, social collaboration, ...
Anomaly detection is based on profiles that represent normal behavior of users, hosts or networks an...
It may be difficult to identify root causes of protocol failures or degradations in application traf...
Identifying anomalies in network traffic logs is a very challenging task for a network analyst. With...
The main objective of network monitoring is to discover the event patterns that happen frequently. I...
Large-scale data center networks are complex - comprising several thousand network devices and sever...