Big Data Analytics for User-Activity Analysis and User-Anomaly Detection in Mobile Wireless Network

The next generation wireless networks are expected to operate in fully automated fashion to meet the burgeoning capacity demand and to serve users with superior quality of experience. Mobile wireless networks can leverage spatio-temporal information about user and network condition to embed the system with end-to-end visibility and intelligence. Big data analytics has emerged as a promising approach to unearth meaningful insights and to build artificially intelligent models with assistance of machine learning tools. Utilizing aforementioned tools and techniques, this paper contributes in two ways. First, we utilize mobile network data (Big Data)—call detail record—to analyze anomalous behavior of mobile wireless network. For anomaly detection purposes, we use unsupervised clustering techniques namely k-means clustering and hierarchical clustering. We compare the detected anomalies with ground truth information to verify their correctness. From the comparative analysis, we observe that when the network experiences abruptly high (unusual) traffic demand at any location and time, it identifies that as anomaly. This helps in identifying regions of interest in the network for special action such as resource allocation, fault avoidance solution, etc. Second, we train a neural-network-based prediction model with anomalous and anomaly-free data to highlight the effect of anomalies in data while training/building intelligent models. In this phase, we transform our anomalous data to anomaly-free and we observe that the error in prediction, while training the model with anomaly-free data has largely decreased as compared to the case when the model was trained with anomalous data.

[1]  Josep Mangues-Bafalluy,et al.  Big Data Empowered Self Organized Networks , 2014 .

[2]  Michael J. Maher,et al.  An Investigation of Performance Analysis of Anomaly Detection Techniques for Big Data in SCADA Systems , 2015, EAI Endorsed Trans. Ind. Networks Intell. Syst..

[3]  Enzo Baccarelli,et al.  Distributed and adaptive resource management in Cloud-assisted Cognitive Radio Vehicular Networks with hard reliability guarantees , 2015, Veh. Commun..

[4]  Enzo Baccarelli,et al.  Energy-Efficient Adaptive Resource Management for Real-Time Vehicular Cloud Services , 2019, IEEE Transactions on Cloud Computing.

[5]  Danda B. Rawat,et al.  Advances on Security Threats and Countermeasures for Cognitive Radio Networks: A Survey , 2015, IEEE Communications Surveys & Tutorials.

[6]  Mennatallah Amer,et al.  Comparison of Unsupervised Anomaly Detection Techniques Bachelor Thesis , 2011 .

[7]  Muhammad Ali Imran,et al.  A SON solution for sleeping cell detection using low-dimensional embedding of MDT measurements , 2014, 2014 IEEE 25th Annual International Symposium on Personal, Indoor, and Mobile Radio Communication (PIMRC).

[8]  Jaime Lloret Mauri,et al.  A smart communication architecture for ambient assisted living , 2015, IEEE Communications Magazine.

[9]  Zhihan Lv,et al.  Empirical Analysis and Modeling of the Activity Dilemmas in Big Social Networks , 2017, IEEE Access.

[10]  Danda B. Rawat,et al.  Vehicular Cyber Physical Systems: Adaptive Connectivity and Security , 2016 .

[11]  Houbing Song,et al.  Range of Influence and Impact of Physical Impairments in Long-Haul DWDM Systems , 2013, Journal of Lightwave Technology.

[12]  Mingjin Yan,et al.  Methods of Determining the Number of Clusters in a Data Set and a New Clustering Criterion , 2005 .

[13]  Georg Carle,et al.  Traffic Anomaly Detection Using K-Means Clustering , 2007 .

[14]  Engin Zeydan,et al.  Anomaly Detection In Cellular Network Data Using Big Data Analytics , 2014 .

[15]  Joel J. P. C. Rodrigues,et al.  Anomaly detection using baseline and K-means clustering , 2010, SoftCOM 2010, 18th International Conference on Software, Telecommunications and Computer Networks.

[16]  Houbing Song,et al.  Internet of Things and Big Data Analytics for Smart and Connected Communities , 2016, IEEE Access.

[17]  Marco Fiore,et al.  Classifying call profiles in large-scale mobile traffic datasets , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[18]  Minas Gjoka,et al.  On the Decomposition of Cell Phone Activity Patterns and their Connection with Urban Ecology , 2015, MobiHoc.

[19]  Víctor Soto,et al.  Automated land use identification using cell-phone records , 2011, HotPlanet '11.

[20]  Danda B. Rawat,et al.  Software Defined Networking Architecture, Security and Energy Efficiency: A Survey , 2017, IEEE Communications Surveys & Tutorials.

[21]  Jaime Lloret,et al.  User's Macro and Micro-mobility Study using WLANs in a University Campus , 2011 .

[22]  Wenjia Li,et al.  ART: An Attack-Resistant Trust Management Scheme for Securing Vehicular Ad Hoc Networks , 2016, IEEE Transactions on Intelligent Transportation Systems.

[23]  Tapani Ristaniemi,et al.  Anomaly Detection Algorithms for the Sleeping Cell Detection in LTE Networks , 2015, 2015 IEEE 81st Vehicular Technology Conference (VTC Spring).