Anomaly Detection for Mobile Network Management

##plugins.themes.academic_pro.article.main##

MingXue Wang
Sidath Handurukande

Abstract

With emerging Network Functions Virtualization (NFV) and Software Defined Networking (SDN) paradigms in Network Management (NM), new network devices and features can immediately become available. Available network resources and services can be altered and optimized in real time to gain the maximum benefit. However, this requires real time analytics information sent to SDN controllers rather than traditional manual offline or batch analytic outputs which are delivered on hourly or monthly basis in NM Systems. As a result, real time stream analytics is becoming a critical element for NM. In this paper, we describe a anomaly detection analytic engine for NM system development. We describe the design principles, innovative algorithm design, architecture and implementation of the engine in relation to streaming data and mobile NM. Finally, we present use cases and evaluation results.

##plugins.themes.academic_pro.article.details##

How to Cite
MingXue Wang, & Sidath Handurukande. (2018). Anomaly Detection for Mobile Network Management. International Journal of Next-Generation Computing, 9(2), 80–98. https://doi.org/10.47164/ijngc.v9i2.141

References

  1. GPP. 2011. 3gpp ts 32.426 v10.3.0 (2011-03). technical speci cation. 3rd generation partnership project.
  2. Amirijoo, M., Jorguseski, L., Litjens, R., and Schmelz, L. C. 2011. Cell outage compensa- tion in lte networks algorithms and performance assessment. In IEEE Vehicular Technology Conference.
  3. Apache-spark. 2017. Apache spark. http://spark.apache.org/.
  4. Bedson, P. and Farrant, T. J. D. 2009. Practical Statistics for the Analytical Scientist: A Bench Guide. Royal Society of Chemistry.
  5. Bifet, A., Holmes, G., Kirkby, R., and Pfahringer, B. 2010. Moa: Massive online analysis. Journal of Machine Learning Research 11, 1601-1604.
  6. Bifet, A. and Morales, G. D. F. 2014. Big data stream learning with samoa. In IEEE International Conference on Data Mining Workshop.
  7. Cao, L. and Yu, P. S. 2012. Behavior Computing: Modeling, Analysis, Mining and Decision. Springer. pages 319-320.
  8. Chandola, V., Banerjee, A., and Kumar, V. 2009. Anomaly detection: A survey. ACM Computing Surveys 4, 3, Article No. 15.
  9. Chen, C. and Liu, L.-M. 1993. Joint estimation of model parameters and outlier e ects in time series. Journal of the American Statistical Association. 88, 421, 284-297.
  10. Ciocarlie, G., Lindqvist, U., Nitz, K., Novaczki, S., and Sanneck, H. 2014. Dcad: Dynamic cell anomaly detection for operational cellular networks. In Network Operations and Management Symposium.
  11. Ciocarlie, G. F., Lindqvist, U., Novaczki, S., and Sanneck, H. 2013. Detecting anomalies in cellular networks using an ensemble method. In International Conference on Network and Service Management.
  12. Cleveland, R. B., Cleveland, W. S., McRae, J. E., and Terpenning, I. 1990. Stl: A seasonal-trend decomposition procedure based on loess. Journal of Official Statistics 6, 1, 373.
  13. Georgiadis, D., Kontaki, M., Gounaris, A., Papadopoulos, A. N., Tsichlas, K., and Manolopoulos, Y. 2013. Continuous outlier detection in data streams: An extensible framework and state-of-the-art algorithms. In ACM SIGMOD International Conference on Management of Data. 1061-1064.
  14. Hyndman, R. J. and Shang, H. L. 2010. Rainbow plots, bagplots and boxplots for functional data. Journal of Computational and Graphical Statistics 19, 1, 29-45.
  15. ISP-traffic. 2017. Internet traffic data (in bits) from an isp. https://datamarket.com/data/ set/232h/#!ds=232h&display=line.
  16. Jiang, N., Jiang, G., Chen, H., and Yoshihira, K. 2008. Correlating real-time monitoring data for mobile network management. In International Symposium on a World of Wireless, Mobile and Multimedia Networks.
  17. Kontaki, M., Gounaris, A., Papadopoulos, A. N., Tsichlas, K., and Manolopoulos, Y. 2011. Continuous monitoring of distance-based outliers over data streams. In Interna- tional Conference on Data Engineering. 135-146.
  18. Miyazawa, M. and Hayashi, M. 2014. In-network real-time performance monitoring with distributed event processing. In IEEE Network Operations and Management Symposium.
  19. MLlib-project. 2017. Mllib. http://spark.apache.org/mllib/.
  20. R-project. 2017. R project. https://www.r-project.org/.
  21. Tongke, F. 2013. Hadoop-based data analysis system architecture for telecom enterprises. In International Conference on Computational and Information Sciences.
  22. Traynor, P., Lin, M., Ongtang, M., Rao, V., Jaeger, T., McDaniel, P., and Porta, T. L. 2009. On cellular botnets: Measuring the impact of malicious devices on a cellular network core. In ACM conference on Computer and communications security.
  23. Vallis, O., Hochenbaum, J., and Kejariwal, A. 2014. A novel technique for long-term anomaly detection in the cloud. In 6th USENIX Workshop on Hot Topics in Cloud Com- puting.
  24. Vu, A. T., Morales, G. D. F., Gama, J., and Bifet, A. 2014. Distributed adaptive model rules for mining big data streams. In IEEE International Conference on Big Data.
  25. Wang, M. and Handurukande, S. B. 2016. A streaming data anomaly detection analytic engine for mobile network management. In IEEE International Conference on Cloud and Big Data Computing.
  26. Wang, M., Handurukande, S. B., and Nassar, M. 2012. Rpig: A scalable framework for machine learning and advanced statistical functionalities.
  27. Zhang, R., Zhang, S., Lan, Y., and Jiang, J. 2008. Network anomaly detection using one class support vector machine. In International MultiConference of Engineers and Computer Scientists.