Big Data Analysis for Anomaly Detection in Telecommunication Using Clustering Techniques

The recent development with respect to Information and Communication Technology (ICT) has a very high impact on the social well-being, economic-growth as well as national security. The ICT includes all the recent technologies like computers, mobile-devices and networks. This also includes few people who have the intent to attack maliciously and they are generally called as network intruders, cybercriminals, etc. Confronting these detrimental cyber activities has become the highest priority internationally and hence the focused research area. For this kind of confront, anomaly detection plays a major role. This is an important task in data analysis which helps in detecting these kinds of intrusions. It helps in identifying the abnormal patterns in various domains like finance, computer networks, human behaviour, gene expression etc. This paper focuses on detecting the abnormalities in the telecommunication domain using the Call Detail Records (CDR). The abnormalities are identified using the clustering techniques namely k-means clustering, hierarchical clustering and PAM clustering. The results obtained are discussed and the clustering technique which is suited better in identifying the anomaly accurately is suggested.

[1]  Engin Zeydan,et al.  Anomaly Detection In Cellular Network Data Using Big Data Analytics , 2014 .

[2]  Houbing Song,et al.  Range of Influence and Impact of Physical Impairments in Long-Haul DWDM Systems , 2013, Journal of Lightwave Technology.

[3]  Joel J. P. C. Rodrigues,et al.  Anomaly detection using baseline and K-means clustering , 2010, SoftCOM 2010, 18th International Conference on Software, Telecommunications and Computer Networks.

[4]  Danda B. Rawat,et al.  Software Defined Networking Architecture, Security and Energy Efficiency: A Survey , 2017, IEEE Communications Surveys & Tutorials.

[5]  Jemal H. Abawajy,et al.  Adaptive Computing-Plus-Communication Optimization Framework for Multimedia Processing in Cloud Systems , 2020, IEEE Transactions on Cloud Computing.

[6]  Marco Fiore,et al.  Classifying call profiles in large-scale mobile traffic datasets , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[7]  Wenjia Li,et al.  ART: An Attack-Resistant Trust Management Scheme for Securing Vehicular Ad Hoc Networks , 2016, IEEE Transactions on Intelligent Transportation Systems.

[8]  Minas Gjoka,et al.  On the Decomposition of Cell Phone Activity Patterns and their Connection with Urban Ecology , 2015, MobiHoc.

[9]  Enzo Baccarelli,et al.  Energy-Efficient Adaptive Resource Management for Real-Time Vehicular Cloud Services , 2019, IEEE Transactions on Cloud Computing.

[10]  Enzo Baccarelli,et al.  Distributed and adaptive resource management in Cloud-assisted Cognitive Radio Vehicular Networks with hard reliability guarantees , 2015, Veh. Commun..

[11]  Faiez Zalila,et al.  Model-Driven Elasticity Management with OCCI , 2019, IEEE Transactions on Cloud Computing.

[12]  Víctor Soto,et al.  Automated land use identification using cell-phone records , 2011, HotPlanet '11.

[13]  Peter Steenkiste,et al.  Network Anomaly Detection Using Co-clustering , 2012, 2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining.

[14]  Anil K. Jain,et al.  Data clustering: a review , 1999, CSUR.

[15]  Houbing Song,et al.  Internet of Things and Big Data Analytics for Smart and Connected Communities , 2016, IEEE Access.

[16]  Muhammad Ali Imran,et al.  A SON solution for sleeping cell detection using low-dimensional embedding of MDT measurements , 2014, 2014 IEEE 25th Annual International Symposium on Personal, Indoor, and Mobile Radio Communication (PIMRC).

[17]  Danda B. Rawat,et al.  Advances on Security Threats and Countermeasures for Cognitive Radio Networks: A Survey , 2015, IEEE Communications Surveys & Tutorials.

[18]  Zhihan Lv,et al.  Empirical Analysis and Modeling of the Activity Dilemmas in Big Social Networks , 2017, IEEE Access.

[19]  Mohiuddin Ahmed,et al.  Clustering based semantic data summarization technique: A new approach , 2014, 2014 9th IEEE Conference on Industrial Electronics and Applications.

[20]  Michael J. Maher,et al.  An Investigation of Performance Analysis of Anomaly Detection Techniques for Big Data in SCADA Systems , 2015, EAI Endorsed Trans. Ind. Networks Intell. Syst..