Efficient Generative Wireless Anomaly Detection for Next Generation Networks

被引:2
作者
Rathinavel, Gopikrishna [1 ]
Muralidhar, Nikhil [2 ]
Ramakrishnan, Naren [3 ]
O'Shea, Timothy [3 ,4 ]
机构
[1] Virginia Tech, Blacksburg, VA 24061 USA
[2] Stevens Inst Technol, Hoboken, NJ USA
[3] Virginia Tech, Arlington, VA USA
[4] DeepSig Inc, Arlington, VA USA
来源
2022 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM) | 2022年
基金
美国国家科学基金会;
关键词
Wireless; Multi-Sensor Data Fusion; Anomaly Detection; Security; Generative Adversarial Network; Machine Learning; Variational Networks; Radio Access Network; Spectrum Sharing; B5G; 6G;
D O I
10.1109/MILCOM55135.2022.10017520
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Anomaly detection in wireless signals through multisensor fusion has numerous real-world applications including spectrum monitoring and awareness, fault detection, and spectrum security. As networks, multi-user access schemes, and spectral density increase beyond 5G and into 6G, especially in difficult shared-spectrum and unlicensed-spectrum bands, monitoring of activity and anomalies on the air interface is a critical enabler for optimizing spectrum access, ensuring the quality of service, and automating orchestration. In this paper, we describe the problem of high-level spectrum anomaly monitoring using metadata derived from high-rate radio signals in a scalable, unsupervised, and bandwidth-friendly system, and we introduce several baselines and generative methods for interpreting this metadata into a high-level view of the air interface environment. We utilize three different anomaly detection methods, each making use of the advantages of different state-of-the-art deep learning techniques, in order to detect a set of anomalous activities in these metadata feeds caused by underlying activities in several radio bands. We evaluate performance by looking at the receiver operating characteristics of the anomaly detectors, and each of the three methods produces an AUROC and AUPRC score of >0.8 on average on different anomaly datasets.
引用
收藏
页数:6
相关论文
共 24 条
[1]  
Abdelnasser H, 2015, IEEE INFOCOM SER
[2]  
An J., 2015, Spec. Lect. IE, V2, P1
[3]  
Arjovsky M, 2017, PR MACH LEARN RES, V70
[4]   Generative Adversarial Networks [J].
Goodfellow, Ian ;
Pouget-Abadie, Jean ;
Mirza, Mehdi ;
Xu, Bing ;
Warde-Farley, David ;
Ozair, Sherjil ;
Courville, Aaron ;
Bengio, Yoshua .
COMMUNICATIONS OF THE ACM, 2020, 63 (11) :139-144
[5]  
Gulrajani I, 2017, Arxiv, DOI arXiv:1704.00028
[6]   Deep Residual Learning for Image Recognition [J].
He, Kaiming ;
Zhang, Xiangyu ;
Ren, Shaoqing ;
Sun, Jian .
2016 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2016, :770-778
[7]  
Hilburn B., 2018, Proceedings of the GNU Radio Conference, V3
[8]  
O'Shea TJ, 2016, Arxiv, DOI arXiv:1611.00301
[9]   Isolation Forest [J].
Liu, Fei Tony ;
Ting, Kai Ming ;
Zhou, Zhi-Hua .
ICDM 2008: EIGHTH IEEE INTERNATIONAL CONFERENCE ON DATA MINING, PROCEEDINGS, 2008, :413-+
[10]   ALDO: An Anomaly Detection Framework for Dynamic Spectrum Access Networks [J].
Liu, Song ;
Chen, Yingying ;
Trappe, Wade ;
Greenstein, Larry J. .
IEEE INFOCOM 2009 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-5, 2009, :675-+