Anomaly detection for fault detection in wireless community networks using machine learning

被引:14
作者
Cerda-Alabern, Llorenc [1 ]
Iuhasz, Gabriel [2 ]
Gemmi, Gabriele [1 ,3 ]
机构
[1] Univ Politecn Cataluna, Barcelona, Spain
[2] West Univ, Timisoara, Romania
[3] Univ Venice Ca Foscari, Venice, Italy
关键词
Fault detection; Anomaly detection; Machine learning; Wireless network dataset; Wireless community networks; INTRUSION DETECTION SYSTEMS; OUTLIER DETECTION; FEATURE-SELECTION; PCA;
D O I
10.1016/j.comcom.2023.02.019
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Machine learning has received increasing attention in computer science in recent years and many types of methods have been proposed. In computer networks, little attention has been paid to the use of ML for fault detection, the main reason being the lack of datasets. This is motivated by the reluctance of network operators to share data about their infrastructure and network failures. In this paper, we attempt to fill this gap using anomaly detection techniques to discern hardware failure events in wireless community networks. For this purpose we use 4 unsupervised machine learning, ML, approaches based on different principles. We have built a dataset from a production wireless community network, gathering traffic and non-traffic features, e.g. CPU and memory. For the numerical analysis we investigated the ability of the different ML approaches to detect an unprovoked gateway failure that occurred during data collection. Our numerical results show that all the tested approaches improve to detect the gateway failure when non-traffic features are also considered. We see that, when properly tuned, all ML methods are effective to detect the failure. Nonetheless, using decision boundaries and other analysis techniques we observe significant different behavior among the ML methods.
引用
收藏
页码:191 / 203
页数:13
相关论文
共 83 条
[1]  
Aggarwal Charu, 2013, ACM SIGKDD Explorations Newsletter, V14, P49, DOI DOI 10.1145/2481244.2481252
[2]  
Aggarwal Charu, 2017, Outlier Analysis, V2nd, DOI DOI 10.1007/978-3-319-47578-3
[3]  
Aggarwal Charu C., 2015, Acm sigkdd explorations newsletter, V17, P24
[4]  
Ahmed M., 2015, Annals of Data Science, V2, P111, DOI [10.1007/s40745-015-0035-y, DOI 10.1007/S40745-015-0035-Y]
[5]   A survey of network anomaly detection techniques [J].
Ahmed, Mohiuddin ;
Mahmood, Abdun Naser ;
Hu, Jiankun .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 60 :19-31
[6]  
Aizenbud Y, 2022, Arxiv, DOI arXiv:2110.00494
[7]   Analysis and generalization of fault diagnosis methods for process monitoring [J].
Alcala, Carlos F. ;
Qin, S. Joe .
JOURNAL OF PROCESS CONTROL, 2011, 21 (03) :322-330
[8]   An adapting soft computing model for intrusion detection system [J].
Alsaadi, Husam Ibrahiem Husain ;
ALmuttari, Rafah M. ;
Ucan, Osman Nuri ;
Bayat, Oguz .
COMPUTATIONAL INTELLIGENCE, 2022, 38 (03) :855-875
[9]  
Alshammari H, 2018, INT WIREL COMMUN, P506, DOI 10.1109/IWCMC.2018.8450421
[10]   Explaining anomalies detected by autoencoders using Shapley Additive Explanations [J].
Antwarg, Liat ;
Miller, Ronnie Mindlin ;
Shapira, Bracha ;
Rokach, Lior .
EXPERT SYSTEMS WITH APPLICATIONS, 2021, 186