APPLICATION-BASED NETWORK ANOMALY MANAGEMENT

作者: Nataraj Harish , Kondapalli Naveen , Kaligotla Prakash , Chandel Ajay

DOI:

关键词:

摘要: In one embodiment, techniques herein monitor activity of or more applications in a computer network, and identify individual business transactions occurring within the applications. Additionally, network traffic metrics may be determined, particular can correlated to each transactions. By developing baseline based on transactions, trigger detected perform root cause analysis As such, initiate, response trigger, applications, where leverages correlation anomalous

参考文章(38)
Peter Roberts, Kin Yee Wong, Network timing topology via network manager ,(2009)
John M. Cagle, Mark R. Potter, Thomas L. Buske, John M. Hemphill, Automated power management system for a network of computers ,(2001)
Jeffrey Maurice Heisz, Gregory Paul Ferguson, Ariff Kassam, Muhammad Mansoor Jamal, David Tung, Method and system for load balancing a distributed database ,(2007)
Dieter Gawlick, Eric S. Chan, Adel Ghoneimy, Zhen Hua Liu, Knowledge-intensive data processing system ,(2015)
Hector Reyes, Timothy William Oborne, Armen Beylerian, Paul J Orleman, Nahendran Srinivasan, Amar Inder Singh Bansal, Eric Cheukfung Lam, Michael Manowski, Ronald T Welf, Michael Lloyd H Davies, Vincent Di Cross, John Tsang, See Christopher Von, Method and system for delivering multiple services electronically to customers via a centralized portal architecture ,(2002)