Mobile device-centric approach for identifying problem spot in network using deep learning

These days, mobile devices usually have multiple network interfaces and there are many usable access networks around the devices. To utilize a wide range of network options properly and make decisions more intelligently, the mobile devices should be able to understand networks' situations autonomously. The current mobile devices have powerful computing power and are able to collect various network information, and people nowadays almost always carry their mobile devices. Thus, the mobile devices can be utilized to figure out practical quality of service/experience and infer the network situation/context. However, networks have become not only larger but also more complex and dynamic than in the past, so it is hard to devise models, algorithms, or system platforms for mobile devices to understand such complex and diverse networks. To overcome this limitation, we leverage deep learning to devise a mobile device-centric approach to identifying problem spot having the most likely cause of network quality degradation, MoNPI. By using MoNPI, mobile devices are able to identify the network problem spot, which is like a black box to end nodes heretofore. Mobile devices with MoNPI are able to understand networks' situations and thus take a more proper action.

[1]  Hwangnam Kim,et al.  Devising Mobile Sensing and Actuation Infrastructure with Drones , 2018, Sensors.

[2]  Yoshua Bengio,et al.  Understanding the difficulty of training deep feedforward neural networks , 2010, AISTATS.

[3]  Yuan Yu,et al.  TensorFlow: A system for large-scale machine learning , 2016, OSDI.

[4]  Zhenlong Yuan,et al.  Droid-Sec: deep learning in android malware detection , 2015, SIGCOMM 2015.

[5]  Mounir Ghogho,et al.  Deep learning approach for Network Intrusion Detection in Software Defined Networking , 2016, 2016 International Conference on Wireless Networks and Mobile Communications (WINCOM).

[6]  Jimmy Ba,et al.  Adam: A Method for Stochastic Optimization , 2014, ICLR.

[7]  Nitish Srivastava,et al.  Dropout: a simple way to prevent neural networks from overfitting , 2014, J. Mach. Learn. Res..

[8]  Vrizlynn L. L. Thing,et al.  IEEE 802.11 Network Anomaly Detection and Attack Classification: A Deep Learning Approach , 2017, 2017 IEEE Wireless Communications and Networking Conference (WCNC).

[9]  Ed Warnicke,et al.  Wireshark User’s Guide - For Wireshark 2.1 , 2016 .

[10]  Christian Diedrich,et al.  Accelerated deep neural networks for enhanced Intrusion Detection System , 2016, 2016 IEEE 21st International Conference on Emerging Technologies and Factory Automation (ETFA).

[11]  Hwangnam Kim,et al.  Designing interference‐aware network selection protocol for WLAN mobile devices , 2017, Trans. Emerg. Telecommun. Technol..

[12]  Mansoor Alam,et al.  A Deep Learning Approach for Network Intrusion Detection System , 2016, EAI Endorsed Trans. Security Safety.

[13]  Kymie M. C. Tan,et al.  Detection and classification of TCP/IP network services , 1997, Proceedings 13th Annual Computer Security Applications Conference.

[14]  Jiri Matas,et al.  All you need is a good init , 2015, ICLR.

[15]  Satyajit Yadav,et al.  Detection of Application Layer DDoS attack by feature learning using Stacked AutoEncoder , 2016, 2016 International Conference on Computational Techniques in Information and Communication Technologies (ICCTICT).

[16]  Behnaz Arzani,et al.  Taking the Blame Game out of Data Centers Operations with NetPoirot , 2016, SIGCOMM.

[17]  Luciana S. Buriol,et al.  How physical network topologies affect virtual network embedding quality: A characterization study based on ISP and datacenter networks , 2016, J. Netw. Comput. Appl..

[18]  Hwangnam Kim,et al.  AVSS: Airborne Video Surveillance System , 2018, Sensors.

[19]  Eryk Dutkiewicz,et al.  Cyberattack detection in mobile cloud computing: A deep learning approach , 2017, 2018 IEEE Wireless Communications and Networking Conference (WCNC).

[20]  Xue Wang,et al.  Comparison deep learning method to traditional methods using for network intrusion detection , 2016, 2016 8th IEEE International Conference on Communication Software and Networks (ICCSN).

[21]  Yuefei Zhu,et al.  A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks , 2017, IEEE Access.

[22]  Jian Sun,et al.  Delving Deep into Rectifiers: Surpassing Human-Level Performance on ImageNet Classification , 2015, 2015 IEEE International Conference on Computer Vision (ICCV).

[23]  Yuhong Wang,et al.  Transmission Line Fault Identification Based on BP Neural Network , 2019, 2019 IEEE Innovative Smart Grid Technologies - Asia (ISGT Asia).

[24]  Tara N. Sainath,et al.  Improving deep neural networks for LVCSR using rectified linear units and dropout , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.

[25]  Zhitang Chen,et al.  Online flow size prediction for improved network routing , 2016, 2016 IEEE 24th International Conference on Network Protocols (ICNP).

[26]  Prajakta Kulkarni,et al.  mPHASiS: Mobile patient healthcare and sensor information system , 2011, J. Netw. Comput. Appl..

[27]  Hwangnam Kim,et al.  Drone Detection and Identification System using Artificial Intelligence , 2018, 2018 International Conference on Information and Communication Technology Convergence (ICTC).

[28]  Namita Tiwari,et al.  Survey Of DDoS Attacks Based On TCP / IP Protocol Vulnerabilities , 2016 .

[29]  Luca Salgarelli,et al.  Support Vector Machines for TCP traffic classification , 2009, Comput. Networks.

[30]  George F. Riley,et al.  The ns-3 Network Simulator , 2010, Modeling and Tools for Network Simulation.

[31]  Hwangnam Kim,et al.  Energy-Efficient Topology Control for UAV Networks , 2019 .

[32]  Insoo Sohn,et al.  Robustness enhancement of complex networks via No-Regret learning , 2019, ICT Express.