Anomaly detection using LSTM neural networks: an application to VoIP traffic

被引:2
作者
Cecchinato, Fabio [1 ]
Vangelista, Lorenzo [2 ]
Biondo, Giulio [1 ]
Franchin, Mauro [1 ]
机构
[1] Mida Solut, R&D Dept, Padua, Italy
[2] Univ Padua, Dept Informat Engn, Padua, Italy
来源
IEEE INTERNATIONAL CONFERENCE ON RECENT ADVANCES IN SYSTEMS SCIENCE AND ENGINEERING (IEEE RASSE 2021) | 2021年
关键词
LSTM networks; VoIP; anomaly detection;
D O I
10.1109/RASSE53195.2021.9686840
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Voice communications nowadays are largely dominated by VoIP, which substituted the Plain Old Telephone Network over the years. Telephone exchanges are thus software-based rather than electromechanical, and a whole set of new methods for analyzing anomalies has been introduced. This paper addresses the implementation of an AI application, based on the LSTM model, whose aim is to learn to predict the VoIP traffic shape given what happened in the past, to compare it with the normal or expected traffic, and eventually state whether the system is going to fall into an anomalous situation or not. In the paper we use data from a real working system instead of synthetic data or pre-built datasets. We consider a system in a real production environment, and we deployed the model we developed on the system itself, comparing its forecasts with the actual VoIP traffic flow. We verified that the forecasts and the actual traffic do not significantly differ in the general case. In one case, however, our model contributed to find a configuration problem in the system, allowing to correct it before it could generate further issues. These results confirm the usefulness of the model in detecting malfunctions or anomalies in VoIP based systems. Further applications of the proposed methodology include video conferencing and other IP-based communication systems.
引用
收藏
页数:7
相关论文
共 24 条
[1]  
[Anonymous], 2003, RFC 3550
[2]  
[Anonymous], 2616 RFC
[3]  
[Anonymous], 2002, RFC 3261
[4]   Evaluating time series forecasting models: an empirical study on performance estimation methods [J].
Cerqueira, Vitor ;
Torgo, Luis ;
Mozetic, Igor .
MACHINE LEARNING, 2020, 109 (11) :1997-2028
[5]  
Chalapathy R., 2019, ARXIV190103407
[6]  
Chang-Yong Lee, 2008, 2008 Second International Conference on Future Generation Communication and Networking (FGCN), P178, DOI 10.1109/FGCN.2008.95
[7]   Voice over IP performance monitoring [J].
Cole, RG ;
Rosenbluth, JH .
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2001, 31 (02) :9-24
[8]  
de Lima Ana Flavia M, 2005, MONITORING BASED STA
[9]   On the Use of SVMs to Detect Anomalies in a Stream of SIP Messages [J].
Ferdous, Raihana ;
Lo Cigno, Renato ;
Zorat, Alessandro .
2012 11TH INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA 2012), VOL 1, 2012, :592-597
[10]   SURVEY OF SECURITY VULNERABILITIES IN SESSION INITIATION PROTOCOL [J].
Geneiatakis, Dimitris ;
Dagiuklas, Tasos ;
Kambourakis, Georgios ;
Lambrinoudakis, Costas ;
Gritzalis, Stefanos ;
Ehlert, Sven ;
Sisalem, Dorgham .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2006, 8 (03) :68-81