Data mining algorithms for communication networks control: concepts, survey and guidelines

The control of communication networks is an important aspect from both the service provider and user points of view. There are several approaches to communication network control including game theory, genetic algorithms and Markov decision processes. Data mining methods have been successfully used to discover optimized solutions to this problem, and have the capability to learn the network behavior under different network conditions and during operation so that complete knowledge of the network behavior is not required a priori. This article identifies the concepts behind the idea of using data mining for communication network control, provides a structured survey of the results in this area, and discusses the guidelines for future applications.

[1]  Kayhan Zrar Ghafoor,et al.  A smart handover prediction system based on curve fitting model for Fast Mobile IPv6 in wireless networks , 2012, Int. J. Commun. Syst..

[2]  Tao Liu,et al.  Foresee (4C): Wireless link prediction using link features , 2011, Proceedings of the 10th ACM/IEEE International Conference on Information Processing in Sensor Networks.

[3]  Kavé Salamatian,et al.  Anomaly extraction in backbone networks using association rules , 2009, IMC '09.

[4]  Y. Watanabe,et al.  Visualizing Network Status , 2007, 2007 International Conference on Machine Learning and Cybernetics.

[5]  Jun Zhang,et al.  Internet Traffic Classification Using Constrained Clustering , 2014, IEEE Transactions on Parallel and Distributed Systems.

[6]  Philippe Owezarski,et al.  Knowledge-independent traffic monitoring: Unsupervised detection of network attacks , 2012, IEEE Network.

[7]  J. Cid-Sueiro,et al.  Q-Probabilistic Routing in Wireless Sensor Networks , 2007, 2007 3rd International Conference on Intelligent Sensors, Sensor Networks and Information.

[8]  Anni Cai,et al.  SVM-based loss differentiation mechanism in mobile ad hoc networks , 2009, 2009 Global Mobile Congress.

[9]  Andrew W. Moore,et al.  Internet traffic classification using bayesian analysis techniques , 2005, SIGMETRICS '05.

[10]  Xiaojun Wang,et al.  Pattern Mining Model for Automatic Network Monitoring in Heterogeneous Wireless Communication Networks , 2014 .

[11]  Zhuo Yang,et al.  MAC protocol identification using support vector machines for cognitive radio networks , 2014, IEEE Wireless Communications.

[12]  Sherif Rashad,et al.  PAC-WHN: Predictive Admission Control for Wireless Heterogeneous Networks , 2007, 2007 12th IEEE Symposium on Computers and Communications.

[13]  D. Wolpert The Supervised Learning No-Free-Lunch Theorems , 2002 .

[14]  Satinder Singh,et al.  Unsupervised Anomaly Detection in Network Intrusion Detection Using Clusters , 2005, ACSC.

[15]  Mingyan Liu,et al.  Mining Spectrum Usage Data: A Large-Scale Spectrum Measurement Study , 2009, IEEE Transactions on Mobile Computing.

[16]  Renata Teixeira,et al.  Traffic classification on the fly , 2006, CCRV.

[17]  Luca Salgarelli,et al.  Support Vector Machines for TCP traffic classification , 2009, Comput. Networks.

[18]  Pierre Geurts,et al.  A machine learning approach to improve congestion control over wireless computer networks , 2004, Fourth IEEE International Conference on Data Mining (ICDM'04).

[19]  Dongjoon Kong,et al.  A differentiated one-class classification method with applications to intrusion detection , 2012, Expert Syst. Appl..

[20]  D. Edwards Data Mining: Concepts, Models, Methods, and Algorithms , 2003 .

[21]  Aldebaro Klautau,et al.  A Front End for Discriminative Learning in Automatic Modulation Classification , 2011, IEEE Communications Letters.

[22]  Robert W. Heath,et al.  A Supervised Learning Approach to Adaptation in Practical MIMO-OFDM Wireless Systems , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[23]  Sebastian Zander,et al.  A preliminary performance comparison of five machine learning algorithms for practical IP traffic flow classification , 2006, CCRV.