Traditional Methods and Machine Learning for Anomaly Detection in Self-Organizing Networks
DOI:
https://doi.org/10.32628/IJSRSET2310662Keywords:
Machine Learning, Anomaly Detection, Self-organizing networks, MIMO, wireless sensor networks.Abstract
The motivation behind exploring anomaly detection in self-organizing networks lies in the evolving landscape of telecommunications and network management. Conventional methods for identifying network anomalies often struggle to adapt to the dynamic and complex nature of modern self-organizing networks. The problem addressed in this research is the efficacy of anomaly detection methods in self-organizing networks (SONs) within the context of telecommunications and network management. As SONs become increasingly prevalent to meet the demands of modern, highly dynamic wireless communication systems, the need for robust anomaly detection mechanisms is paramount. Conventional anomaly detection approaches in SONs are often based on predefined rules and thresholds, which may struggle to adapt to the intricate and rapidly evolving network behaviors. These methods can result in false alarms, missed anomalies, and inefficient resource allocation. Furthermore, emerging SONs incorporate a multitude of diverse technologies, including 5G, IoT, and edge computing, compounding the complexity of anomaly detection. Contemporary machine learning techniques hold promise in addressing these challenges by enabling the automatic and adaptive detection of anomalies, leveraging the abundance of data generated in SONs. However, the suitability, performance, and scalability of these methods in dynamic and large-scale SON environments remain critical concerns. This research aims to compare and evaluate conventional anomaly detection methods against contemporary machine learning approaches in SONs to assess their accuracy, efficiency, and adaptability. The goal is to provide insights into the most effective anomaly detection strategies, ultimately enhancing network stability, minimizing downtime, and ensuring the secure and efficient operation of modern telecommunications systems.
References
- F. Boccardi, R. W. Heath, A. Lozano, T. L. Marzetta, and P. Popovski, ‘‘Five disruptive technology directions for 5G,’’ IEEE Commun. Mag., vol. 52, no. 2, pp. 74–80, Feb. 2014
- J. G. Andrews, S. Buzzi, W. Choi, S. V. Hanly, A. Lozano, A. C. Soong, and J. C. Zhang, ‘‘What will 5G be?’’ IEEE J. Sel. Areas Commun., vol. 32, no. 6, pp. 1065–1082, Jun. 2014.
- A. S. Bana, E. de Carvalho, B. Soret, T. Abrão, J. C. Marinello, E. G. Larsson, and P. Popovski, ‘‘Massive MIMO for Internet of Things (IoT) connectivity,’’ Phys. Commun., vol. 37, Dec. 2019, Art. no. 100859.
- D. Ciuonzo, P. S. Rossi, and S. Dey, ‘‘Massive MIMO channel-aware decision fusion,’’ IEEE Trans. Signal Process., vol. 63, no. 3, pp. 604–619, Feb. 2015.
- Airhop. Accessed: Jun. 18, 2021. [Online]. Available: http://www. airhopcomm.com
- I. de-la-Bandera, R. Barco, P. Muñoz, and I. Serrano, ‘‘Cell outage detection based on handover statistics,’’ IEEE Commun. Lett., vol. 19, no. 7, pp. 1189–1192, Jul. 2015.
- Ericson. Network Outage. Accessed: Jun. 18, 2021. [Online]. Available: http://telecoms.com/494091/
- M. Z. Asghar, M. Abbas, K. Zeeshan, P. Kotilainen, and T. Hämäläinen, ‘‘Assessment of deep learning methodology for self-organizing 5G networks,’’ Appl. Sci., vol. 9, no. 15, p. 2975, Jul. 2019.
- S. Rajendran, W. Meert, V. Lenders, and S. Pollin, ‘‘Unsupervised wireless spectrum anomaly detection with interpretable features,’’ IEEE Trans. Cognit. Commun. Netw., vol. 5, no. 3, pp. 637–647, Sep. 2019.
- J. Burgueño, I. de-la-Bandera, J. Mendoza, D. Palacios, C. Morillas, and R. Barco, ‘‘Online anomaly detection system for mobile networks,’’ Sensors, vol. 20, no. 24, p. 7232, Dec. 2020.
- F. Boccardi, R. W. Heath, A. Lozano, T. L. Marzetta and P. Popovski, "Five disruptive technology directions for 5G", IEEE Commun. Mag., vol. 52, no. 2, pp. 74-80, Feb. 2014.
- J. G. Andrews, S. Buzzi, W. Choi, S. V. Hanly, A. Lozano, A. C. Soong, et al., "What will 5G be?", IEEE J. Sel. Areas Commun., vol. 32, no. 6, pp. 1065-1082, Jun. 2014.
- P. Krishna Kishore, S. Ramamoorthy, V.N. Rajavarman, ARTP: Anomaly based real time prevention of Distributed Denial of Service attacks on the web using machine learning approach, International Journal of Intelligent Networks, Volume 4, 2023, Pages 38-45, ISSN 2666-6030, https://doi.org/10.1016/j.ijin.2022.12.001.
- M. Z. Asghar, M. Abbas, K. Zeeshan, P. Kotilainen and T. Hämäläinen, "Assessment of deep learning methodology for self-organizing 5G networks", Appl. Sci., vol. 9, no. 15, pp. 2975, Jul. 2019.
- P. Krishna Kishore, S. Ramamoorthy, V.N. Rajavarman, "Mitigation of HTTP Flood DDoS Attack in Application Layer Using Machine Learning and Isolation Forest," SSRG International Journal of Electrical and Electronics Engineering, vol. 10, no. 10, pp. 6-19, 2023. Crossref, https://doi.org/10.14445/23488379/IJEEE-V10I10P102
- Krishna Kishore, P., Prathima, K., Eswari, D.S., Goud, K.S. (2023). Bidirectional LSTM-Based Sentiment Analysis of Context-Sensitive Lexicon for Imbalanced Text. In: Bhateja, V., Sunitha, K.V.N., Chen, YW., Zhang, YD. (eds) Intelligent System Design. Lecture Notes in Networks and Systems, vol 494. Springer, Singapore. https://doi.org/10.1007/978-981-19-4863-3_27
Downloads
Published
Issue
Section
License
Copyright (c) IJSRSET

This work is licensed under a Creative Commons Attribution 4.0 International License.