Sciweavers

1291 search results - page 78 / 259
» Intrusion Detection for Distributed Applications
Sort
View
NOMS
2010
IEEE
251views Communications» more  NOMS 2010»
13 years 8 months ago
Online detection of utility cloud anomalies using metric distributions
—The online detection of anomalies is a vital element of operations in data centers and in utility clouds like Amazon EC2. Given ever-increasing data center sizes coupled with th...
Chengwei Wang, Vanish Talwar, Karsten Schwan, Part...
CCR
2006
76views more  CCR 2006»
13 years 9 months ago
Secure distributed data-mining and its application to large-scale network measurements
The rapid growth of the Internet over the last decade has been startling. However, efforts to track its growth have often fallen afoul of bad data -- for instance, how much traffi...
Matthew Roughan, Yin Zhang
MINENET
2006
ACM
14 years 3 months ago
Toward sophisticated detection with distributed triggers
Recent research has proposed efficient protocols for distributed triggers, which can be used in monitoring infrastructures to maintain system-wide invariants and detect abnormal ...
Ling Huang, Minos N. Garofalakis, Joseph M. Heller...
SIGMOD
2003
ACM
123views Database» more  SIGMOD 2003»
14 years 9 months ago
Distributed deviation detection in sensor networks
Sensor networks have recently attracted much attention, because of their potential applications in a number of different settings. The sensors can be deployed in large numbers in ...
Themistoklis Palpanas, Dimitris Papadopoulos, Vana...
GRID
2007
Springer
14 years 3 months ago
Log summarization and anomaly detection for troubleshooting distributed systems
— Today’s system monitoring tools are capable of detecting system failures such as host failures, OS errors, and network partitions in near-real time. Unfortunately, the same c...
Dan Gunter, Brian Tierney, Aaron Brown, D. Martin ...