Machine-Learning Based Approaches for Anomaly Detection and Classification in Cellular Networks
نویسندگان
چکیده
Despite the long literature and assorted list of proposed systems for performing detection and classification of anomalies in operational networks, Internet Service Providers (ISPs) are still looking for effective means to manage the ever-growing number of network traffic anomalies they face in their daily business. In this paper we address the problem of automatic network traffic anomaly detection and classification using Machine Learning (ML) based techniques, for the specific case of traffic anomalies observed in cellular network measurements. We devise a simple detection and classification technique based on decision tress, and compare its performance to that achieved by other supervised learning classifiers well known in the ML literature (e.g., SVM, neuronal networks, etc.). The proposed solution is evaluated using syntheticallygenerated data from an operational cellular ISP, drawn from real traffic statistics to resemble the real cellular network traffic. Furthermore, we compare the achieved performance against other well-known detectors in the literature (e.g., distribution-based, entropy-based), and propose a multi-detector approach to increase the overall system performance in a number of case studies.
منابع مشابه
A Novel Ensemble Approach for Anomaly Detection in Wireless Sensor Networks Using Time-overlapped Sliding Windows
One of the most important issues concerning the sensor data in the Wireless Sensor Networks (WSNs) is the unexpected data which are acquired from the sensors. Today, there are numerous approaches for detecting anomalies in the WSNs, most of which are based on machine learning methods. In this research, we present a heuristic method based on the concept of “ensemble of classifiers” of data minin...
متن کاملA Survey of Anomaly Detection Approaches in Internet of Things
Internet of Things is an ever-growing network of heterogeneous and constraint nodes which are connected to each other and the Internet. Security plays an important role in such networks. Experience has proved that encryption and authentication are not enough for the security of networks and an Intrusion Detection System is required to detect and to prevent attacks from malicious nodes. In this ...
متن کاملAssessment Methodology for Anomaly-Based Intrusion Detection in Cloud Computing
Cloud computing has become an attractive target for attackers as the mainstream technologies in the cloud, such as the virtualization and multitenancy, permit multiple users to utilize the same physical resource, thereby posing the so-called problem of internal facing security. Moreover, the traditional network-based intrusion detection systems (IDSs) are ineffective to be deployed in the cloud...
متن کاملFeature-based Malicious URL and Attack Type Detection Using Multi-class Classification
Nowadays, malicious URLs are the common threat to the businesses, social networks, net-banking etc. Existing approaches have focused on binary detection i.e. either the URL is malicious or benign. Very few literature is found which focused on the detection of malicious URLs and their attack types. Hence, it becomes necessary to know the attack type and adopt an effective countermeasure. This pa...
متن کاملماشین بینایی تشخیصگر باروری تخممرغ و ارزیابی کارایی شبکههای عصبی و ماشین بردار پشتیبان در آن
In this research, a system is proposed for detecting fertility of eggs. The system is composed of two parts: hardware and software. The fabricated hardware provides a platform to obtain accurate images from inner side of the eggs, without harming their embryos. The software part includes a set of image processing and machine vision processes, which is able to detect the fertility of eggs from c...
متن کامل