Using network traffic to passively detect under utilized resources in high performance cluster grid computing environments.
Lanier A. WatkinsRaheem A. BeyahCherita L. CorbettPublished in: GridNets (2007)
Keyphrases
- computing environments
- network traffic
- grid computing
- computational grids
- detecting anomalous
- normal traffic
- network bandwidth
- grid systems
- intrusion detection
- grid environment
- computing resources
- anomaly detection
- resource sharing
- network security
- traffic data
- detect anomalies
- network resources
- computer networks
- grid services
- mobile agents
- mobile environments
- network management
- intrusion detection system
- mobile computing
- network intrusion detection
- clustering algorithm
- internet traffic
- data grids
- network traffic data
- detection mechanism
- data points
- traffic patterns
- distributed computing environment