About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Internet of Things. IoT Infrastructures. Second International Summit, IoT 360° 2015, Rome, Italy, October 27-29, 2015. Revised Selected Papers, Part I

Research Article

A Data Plane Approach for Detecting Control Plane Anomalies in Mobile Networks

Download(Requires a free EAI acccount)
325 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-319-47063-4_19,
        author={Omer Abdelrahman and Erol Gelenbe},
        title={A Data Plane Approach for Detecting Control Plane Anomalies in Mobile Networks},
        proceedings={Internet of Things. IoT Infrastructures. Second International Summit, IoT 360° 2015, Rome, Italy, October 27-29, 2015. Revised Selected Papers, Part I},
        proceedings_a={IOT360},
        year={2017},
        month={1},
        keywords={Mobile security Random neural network M2M IoT Signaling overload Radio resource control Key performance indicators},
        doi={10.1007/978-3-319-47063-4_19}
    }
    
  • Omer Abdelrahman
    Erol Gelenbe
    Year: 2017
    A Data Plane Approach for Detecting Control Plane Anomalies in Mobile Networks
    IOT360
    Springer
    DOI: 10.1007/978-3-319-47063-4_19
Omer Abdelrahman1,*, Erol Gelenbe1,*
  • 1: Imperial College
*Contact email: o.abd06@imperial.ac.uk, e.gelenbe@imperial.ac.uk

Abstract

This paper proposes an anomaly detection framework that utilizes key performance indicators (KPIs) and traffic measurements to identify in real-time misbehaving mobile devices that contribute to signaling overloads in cellular networks. The detection algorithm selects the devices to monitor and adjusts its own parameters based on KPIs, then computes various features from Internet traffic that capture both sudden and long term changes in behavior, and finally combines the information gathered from the individual features using a random neural network in order to detect anomalous users. The approach is validated using data generated by a detailed mobile network simulator.

Keywords
Mobile security Random neural network M2M IoT Signaling overload Radio resource control Key performance indicators
Published
2017-01-05
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-319-47063-4_19
Copyright © 2015–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL