Comprehensive IoT SIM Card Anomaly Detection Algorithm Based on Big Data

The mobile Internet of Things (IoT) industry in China has developed rapidly and is expected to maintain rapid growth in the next decade. For the three mobile operators in China, IoT gradually becomes the new/key engine for profit growth. However, at the early stage of IoT development, due to the low cost of IoT SIM card, some illegal organizations and individuals take advantage of this loophole to earn illegal profits, which cause huge losses for mobile operators. In this paper, we explore comprehensive abnormal IoT SIM card detection algorithm based on IoT big data. For different IoT scenarios, this paper proposes two kinds of algorithms, including various rule-based detection algorithm (RDA) and AI-based detection algorithm (AIDA). The result of use case also shows that RDA and AIDA can greatly improve the anomaly detection accuracy and can benefit both of the telecommunication operators and enterprise customers.

[1]  Tao Zhang,et al.  A novel LTE network deployment scheme using telecom big data , 2016 .

[2]  Yue Chen,et al.  Self-optimised Coordinated Traffic Shifting Scheme for LTE Cellular Systems , 2015, ICSON.

[3]  Tao Zhang,et al.  A novel Big Data based Telecom Operation architecture , 2016 .

[4]  Tao Zhang,et al.  Telecom Big Data Based User Analysis and Application in Telecom Industry , 2017, 5GWN.

[5]  Tianqi Chen,et al.  XGBoost: A Scalable Tree Boosting System , 2016, KDD.

[6]  Nawaz Mohamudally,et al.  Building An Anomaly Detection Engine (ADE) For IoT Smart Applications , 2018, FNC/MobiSPC.

[7]  Taghi M. Khoshgoftaar,et al.  A survey of open source tools for machine learning with big data in the Hadoop ecosystem , 2015, Journal of Big Data.

[8]  Marco Mancini,et al.  Anomaly Detection Models for IoT Time Series Data , 2018, ArXiv.

[9]  Yu Liu,et al.  Mobility load balancing aware radio resource allocation scheme for LTE-Advanced cellular networks , 2015, 2015 IEEE 16th International Conference on Communication Technology (ICCT).

[10]  Thiemo Voigt,et al.  SVELTE: Real-time intrusion detection in the Internet of Things , 2013, Ad Hoc Networks.

[11]  Christopher Leckie,et al.  Unsupervised Anomaly Detection in Network Intrusion Detection Using Clusters , 2005, ACSC.

[12]  M. Palaniswami,et al.  Distributed Anomaly Detection in Wireless Sensor Networks , 2006, 2006 10th IEEE Singapore International Conference on Communication Systems.

[13]  Tao Zhang,et al.  Mining target users for mobile advertising based on telecom big data , 2016, 2016 16th International Symposium on Communications and Information Technologies (ISCIT).