Efficient Generative Wireless Anomaly Detection for Next Generation Networks

被引:2
作者
Rathinavel, Gopikrishna [1 ]
Muralidhar, Nikhil [2 ]
Ramakrishnan, Naren [3 ]
O'Shea, Timothy [3 ,4 ]
机构
[1] Virginia Tech, Blacksburg, VA 24061 USA
[2] Stevens Inst Technol, Hoboken, NJ USA
[3] Virginia Tech, Arlington, VA USA
[4] DeepSig Inc, Arlington, VA USA
来源
2022 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM) | 2022年
基金
美国国家科学基金会;
关键词
Wireless; Multi-Sensor Data Fusion; Anomaly Detection; Security; Generative Adversarial Network; Machine Learning; Variational Networks; Radio Access Network; Spectrum Sharing; B5G; 6G;
D O I
10.1109/MILCOM55135.2022.10017520
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Anomaly detection in wireless signals through multisensor fusion has numerous real-world applications including spectrum monitoring and awareness, fault detection, and spectrum security. As networks, multi-user access schemes, and spectral density increase beyond 5G and into 6G, especially in difficult shared-spectrum and unlicensed-spectrum bands, monitoring of activity and anomalies on the air interface is a critical enabler for optimizing spectrum access, ensuring the quality of service, and automating orchestration. In this paper, we describe the problem of high-level spectrum anomaly monitoring using metadata derived from high-rate radio signals in a scalable, unsupervised, and bandwidth-friendly system, and we introduce several baselines and generative methods for interpreting this metadata into a high-level view of the air interface environment. We utilize three different anomaly detection methods, each making use of the advantages of different state-of-the-art deep learning techniques, in order to detect a set of anomalous activities in these metadata feeds caused by underlying activities in several radio bands. We evaluate performance by looking at the receiver operating characteristics of the anomaly detectors, and each of the three methods produces an AUROC and AUPRC score of >0.8 on average on different anomaly datasets.
引用
收藏
页数:6
相关论文
共 24 条
  • [1] Abdelnasser H, 2015, IEEE INFOCOM SER
  • [2] An J., 2015, SPECIAL LECT IE, V2, ppp 1
  • [3] Arjovsky M, 2017, PR MACH LEARN RES, V70
  • [4] Generative Adversarial Networks
    Goodfellow, Ian
    Pouget-Abadie, Jean
    Mirza, Mehdi
    Xu, Bing
    Warde-Farley, David
    Ozair, Sherjil
    Courville, Aaron
    Bengio, Yoshua
    [J]. COMMUNICATIONS OF THE ACM, 2020, 63 (11) : 139 - 144
  • [5] Gulrajani I, 2017, Arxiv, DOI arXiv:1704.00028
  • [6] Deep Residual Learning for Image Recognition
    He, Kaiming
    Zhang, Xiangyu
    Ren, Shaoqing
    Sun, Jian
    [J]. 2016 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2016, : 770 - 778
  • [7] Hilburn B., 2018, Proceedings of the GNU Radio Conference, V3
  • [8] O'Shea TJ, 2016, Arxiv, DOI arXiv:1611.00301
  • [9] Isolation Forest
    Liu, Fei Tony
    Ting, Kai Ming
    Zhou, Zhi-Hua
    [J]. ICDM 2008: EIGHTH IEEE INTERNATIONAL CONFERENCE ON DATA MINING, PROCEEDINGS, 2008, : 413 - +
  • [10] ALDO: An Anomaly Detection Framework for Dynamic Spectrum Access Networks
    Liu, Song
    Chen, Yingying
    Trappe, Wade
    Greenstein, Larry J.
    [J]. IEEE INFOCOM 2009 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-5, 2009, : 675 - +