Abstract
This paper proposes an anomaly detection framework that utilizes key performance indicators (KPIs) and traffic measurements to identify in real-time misbehaving mobile devices that contribute to signaling overloads in cellular networks. The detection algorithm selects the devices to monitor and adjusts its own parameters based on KPIs, then computes various features from Internet traffic that capture both sudden and long term changes in behavior, and finally combines the information gathered from the individual features using a random neural network in order to detect anomalous users. The approach is validated using data generated by a detailed mobile network simulator.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
3GPP TR 23.887: Machine-type and other mobile data applications communications enhancements (release 12) Technical report (2013). http://www.3gpp.org/DynaReport/23887.htm
Abdelbaki, H.: Random neural network simulator (RNNSIM v.2). Technical report,University of Central Florida (1999). http://www.cs.ucf.edu/~ahossam/rnnsimv2/rnnsimv2.pdf
Abdelrahman, O.H., Gelenbe, E.: Signalling storms in 3G mobile networks. In: Proceedings of IEEE International Conference on Communications (ICC), Sydney, pp. 1017–1022 (2014). doi:10.1109/ICC.2014.6883453
Abdelrahman, O.H., Gelenbe, E., Gorbil, G., Oklander, B.: Mobile network anomaly detection and mitigation: the NEMESYS approach. In: Gelenbe, E., Lent, R. (eds.) Information Sciences and Systems 2013. Lecture Notes in Electrical Engineering, vol. 264, pp. 429–438. Springer, Switzerland (2013). doi:10.1007/978-3-319-01604-7_42
AT&T: Best practices for 3G and 4G app development. Whitepaper (2012). http://developer.att.com/static-assets/documents/library/best-practices-3g-4g-app-development.pdf
Coluccia, A., D’Alconzo, A., Ricciato, F.: Distribution-based anomaly detection via generalized likelihood ratio test: a general maximum entropy approach. Comput. Netw. 57(17), 3446–3462 (2013). doi:10.1016/j.comnet.2013.07.028
Ericsson: High availability is more than five nines (2014). http://www.ericsson.com/real-performance/wp-content/uploads/sites/3/2014/07/high-avaialbility.pdf
Ericsson: A smartphone app developers guide: Optimizing for mobile networks. Whitepaper (2014). http://www.ericsson.com/res/docs/2014/smartphone-app-dev-guide.pdf
Francois, F., Abdelrahman, O.H., Gelenbe, E.: Impact of signaling storms on energy consumption and latency of LTE user equipment. In: Proceedings of 7th IEEE International Symposium on Cyberspace safety and security (CSS), New York, 1248–1255 (2015). doi:10.1109/HPCC-CSS-ICESS.2015.84
Gabriel, C.: DoCoMo demands Google’s help with signalling storm (2012). http://www.rethink-wireless.com/2012/01/30/docomo-demands-googles-signalling-storm.htm
Gelenbe, E.: Random neural networks with negative and positive signals and product form solution. Neural Comput. 1(4), 502–510 (1989)
Gelenbe, E.: Learning in the recurrent random neural network. Neural Comput. 5(1), 154–164 (1993)
Gelenbe, E., Abdelrahman, O.H.: Countering mobile signaling storms with counters. In: Mandler, B., et al. (eds.) IoT 360\(^\circ \) 2015, Part I. LNICST, vol. 169, pp. 199–209. Springer, Heidelberg (2016)
Gelenbe, E., Loukas, G.: A self-aware approach to denial of service defence. Comput. Netw. 51(5), 1299–1314 (2007)
Gorbil, G., Abdelrahman, O.H., Pavloski, M., Gelenbe, E.: Modeling and analysis of RRC-based signalling storms in 3G networks. IEEE Trans. Emerg. Topics Comput. 4(1), 113–127 (2016). doi:10.1109/TETC.2015.2389662
GSMA: Smarter apps for smarter phones, version 4.0 (2014). http://www.gsma.com/newsroom/wp-content/uploads//TS-20-v4-0.pdf
Gupta, A., Verma, T., Bali, S., Kaul, S.: Detecting MS initiated signaling DDoS attacks in 3G/4G wireless networks. In: Proceeedings of 5th International Conference on Communication Systems and Networks (COMSNETS), Bangalore, pp. 1–6 (2013). doi:10.1109/COMSNETS.2013.6465568
Jiantao, S.: Analyzing the network friendliness of mobile applications. Technical report, Huawei (2012). http://www.huawei.com/ilink/en/download/HW_146595
Lee, P.P., Bu, T., Woo, T.: On the detection of signaling DoS attacks on 3G wireless networks. In: Proceedings of 26th IEEE International Conference on Computer Communications (INFOCOM), pp. 1289–1297 (2007). doi:10.1109/INFCOM.2007.153
Oke, G., Loukas, G., Gelenbe, E.: Detecting denial of service attacks with Bayesian classifiers and the random neural network. In: Proceedings of Fuzzy Systems Conference (Fuzz-IEEE), London, pp. 1964–1969 (2007)
Redding, G.: OTT service blackouts trigger signaling overload in mobile networks (2013). https://blog.networks.nokia.com/mobile-networks/2013/09/16/ott-service-blackouts-trigger-signaling-overload-in-mobile-networks/
Ricciato, F.: Unwanted traffic in 3G networks. ACM SIGCOMM Comput. Commun. Rev. 36(2), 53–56 (2006). doi:10.1145/1129582.1129596
Telesoft Technologies: Mobile data monitoring. White paper (2012)
Timotheou, S.: The random neural network: a survey. Comput. J. 53(3), 251–267 (2010). doi:10.1093/comjnl/bxp032
Acknowledgments
This work was supported in part by the EU FP7 project NEMESYS under grant agreement no. 317888.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Abdelrahman, O.H., Gelenbe, E. (2016). A Data Plane Approach for Detecting Control Plane Anomalies in Mobile Networks. In: Mandler, B., et al. Internet of Things. IoT Infrastructures. IoT360 2015. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 169. Springer, Cham. https://doi.org/10.1007/978-3-319-47063-4_19
Download citation
DOI: https://doi.org/10.1007/978-3-319-47063-4_19
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-47062-7
Online ISBN: 978-3-319-47063-4
eBook Packages: Computer ScienceComputer Science (R0)