Abstract:
The solution presented herein facilitates the individual and dynamic configuration of each Remote Radio Head (RRH). The RRH comprises at least one hardware component, which comprises one or more performance sensors. The RRH adapts the configuration of its hardware component responsive to one or more performance metrics retrieved from that hardware component's performance sensor(s). In so doing, the RRH accounts for its hardware component's particular performance characteristics, including accounting for tolerance differences that occur at manufacturing and different performance degradations due to different environments. With time, the RRH develops configuration rule sets that account for current operating mode, component age, and environmental conditions. As such, the solution presented herein helps each RRH achieve optimum performance.
Abstract:
A method, a computerized apparatus and a computer program product for automatic generation of security configuration and deployment thereof. The method comprises monitoring programs executed by a device within an organizational network, to identify an attempt to transmit outgoing communications. In response to determining a program executed by the device is attempting to transmit an outgoing communication: checking whether the program is listed in a base list of authorized programs. In response to determining that the program is listed in the base list, adding the program to a list of authorized programs.
Abstract:
A method, node and system for enforcement of rules associated with cloud services are provided. A node for probabilistic action triggering for service level agreement, SLA, management for cloud services is provided. The node includes processing circuitry configured to: monitor cloud service data associated with a cloud network, generate a conditional probability distribution, CPD, of performance metrics of the cloud network based on the monitored data, determine a plurality of predicted future states of the performance metrics based on generated CPD, determine a plurality of transition events where each transition event corresponding to a transition from a first predicted future state that does not meet a predefined rule to a second predicated future state that meets the predefined rule, correlate the plurality of transition events, and trigger at least one management action for execution based on the correlation of the plurality of transition events.
Abstract:
Embodiments of the present invention generate network communication policies by applying machine learning to existing network communications, and without using information that labels such communications as healthy or unhealthy. The resulting policies may be used to validate communication between applications (or services) over a network.
Abstract:
There is provided a method for training a system for data traffic analysis, the system comprising a deep learning algorithm, wherein the deep learning algorithm comprises a prediction model which is trained to take into account the history of data. According to some embodiments, the deep learning algorithm is operated on a graphical processing unit. According to some embodiments, the system for data traffic analysis is configured to detect anomalies in the data, based also on past data. According to some embodiments, the system for data traffic analysis is configured to simultaneously detect anomalies in the data and update its prediction model. Additional methods and systems in the field of data traffic analysis are also provided. According to some embodiments, data of a car are analyzed in order to detect anomalies.
Abstract:
There is provided a method for detecting an anomaly in plurality of data streams originating from a system or network of systems. Data streams are collected from the system or systems and divided into a plurality of time intervals. For each of the plurality of time intervals, a value for a parameter associated with the data stream is determined. A deviation in the determined values is calculated for the parameters associated with the data stream from expected values for the parameters and, if the calculated deviation is above a threshold, an anomaly is detected in the collected data stream.
Abstract:
A method for supporting detection of irregularities in a network, the method comprising: monitoring features of said network using at least one monitoring device in order to collect spatio-temporal measuring data, providing, in an off-line phase, a training matrix where collected measuring data is aggregated in a predetermined time window such that said training matrix includes spatio-temporal correlations, performing, in said off-line phase, non-negative matrix factorization in order to decompose said training matrix into a coefficient matrix and a basis matrix, wherein temporal correlations and spatial correlations are jointly considered, creating, in an on-line phase, a current runtime matrix on the basis of measuring data newly collected in the on-line phase, computing, in said on-line phase, a current runtime coefficient matrix on the basis of said current runtime matrix and said basis matrix, and comparing, in said on-line phase, said current runtime coefficient matrix with at least one coefficient matrix that was computed previously. Furthermore, a corresponding system is disclosed.
Abstract:
A method, system and computer program product for predicting a viewer's quality of experience while watching mobile videos potentially afflicted with network induced impairments. The length of a stall on a video at time t is received as a first input to a model. The number of stalls up to the time t is received as a second input to the model. Furthermore, the time since a preceding rebuffering event is received as a third input to the model. Additionally, a reciprocal stall density at time t is received as a fourth input to the model. The hysteresis effect is captured using a machine-learning-based model with an input that is an aggregate of the outputs of the first, second, third and fourth inputs to nonlinear input blocks of the model, where the hysteresis effect represents an effect that a viewer's recent level of satisfaction/dissatisfaction has on their overall viewing experience.
Abstract:
An optimum configuration of resources in a network function virtualisation data network is identified by assembling candidate configurations of resources (243), each configuration being an arrangement of the resources into clusters selected such that each cluster provides one or more required services, (212, 213) and assessing the candidate configurations (step 400) to identify an optimum configuration, the assessment of each configuration including measurement of latency (195) in physical links between the resources and, for each candidate configuration, determination of the total latency between the resources within each cluster of the configuration, for a predicted level and pattern of traffic associated with the required service to be operated by each cluster.