Skip to main content

Big Data Analysis for Anomaly Detection in Telecommunication Using Clustering Techniques

  • Conference paper
  • First Online:
Information Systems Design and Intelligent Applications

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 862))

Abstract

The recent development with respect to Information and Communication Technology (ICT) has a very high impact on the social well-being, economic-growth as well as national security. The ICT includes all the recent technologies like computers, mobile-devices and networks. This also includes few people who have the intent to attack maliciously and they are generally called as network intruders, cybercriminals, etc. Confronting these detrimental cyber activities has become the highest priority internationally and hence the focused research area. For this kind of confront, anomaly detection plays a major role. This is an important task in data analysis which helps in detecting these kinds of intrusions. It helps in identifying the abnormal patterns in various domains like finance, computer networks, human behaviour, gene expression etc. This paper focuses on detecting the abnormalities in the telecommunication domain using the Call Detail Records (CDR). The abnormalities are identified using the clustering techniques namely k-means clustering, hierarchical clustering and PAM clustering. The results obtained are discussed and the clustering technique which is suited better in identifying the anomaly accurately is suggested.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. E.E. Papalexakis, A. Beutel, P. Steenkiste, Network anomaly detection using co-clustering, in IEEE International Conference on Advances in Social Networks Analysis and Mining, pp. 403–410. Washington, DC, USA (2012)

    Google Scholar 

  2. M. Ahmed, A. Mahmood, Clustering based semantic data summarization technique: a new approach, in 9th IEEE Conference on Industrial Electronics and Applications, pp. 1780–1785. Hangzhou, China (2014)

    Google Scholar 

  3. D. Naboulsi, R. Stanica, M. Fiore, Classifying call profiles in largescale mobile traffic datasets, in IEEE Conference on Computer Communications, pp. 1806–1814. Toronto, ON, Canada (2014)

    Google Scholar 

  4. M. Ahmed, A. Anwar, A.N. Mahmood, Z. Shah, M.J. Maher, An investigation of performance analysis of anomaly detection techniques for big data in SCADA systems. EAI Endorsed Trans. Ind. Netw. Intell. Syst. 15(3), 1–16 (2015)

    Article  Google Scholar 

  5. V. Soto, E. Frías-Martínez, Automated land use identification using cell-phone records, in 3rd ACM International Workshop on MobiArch, pp. 17–22. (2011)

    Google Scholar 

  6. M. Amer, Comparison of Unsupervised Anomaly Detection Techniques. Bachelor Thesis (2011)

    Google Scholar 

  7. A. Zoha, A. Saeed, A. Imran, M.A. Imran, A. Abu-Dayya, A SON solution for sleeping cell detection using low-dimensional embedding of MDT measurements, in IEEE 25th Annual International Symposium on Personal, Indoor, and Mobile Radio Communication, pp. 1626–1630 (2014)

    Google Scholar 

  8. G. Münz, S. Li, G. Carle, Traffic anomaly detection using k-means clustering, in GI/ITG Workshop MMBnet, pp. 13–14 (2007)

    Google Scholar 

  9. M.F. Lima, B.B. Zarpelao, L.D. Sampaio, J.J. Rodrigues, T. Abrao, M.L. Proença, Anomaly detection using baseline and k-means clustering, in IEEE International Conference on Software, Telecommunications and Computer Networks, pp. 305–309 (2010)

    Google Scholar 

  10. B. Cici, M. Gjoka, A. Markopoulou, C.T. Butts, On the decomposition of cell phone activity patterns and their connection with urban ecology, in 16th ACM International Symposium on Mobile Ad Hoc Networking and Computing, pp. 317–326 (2015)

    Google Scholar 

  11. I.A. Karatepe, E. Zeydan, Anomaly detection in cellular network data using big data analytics, in 20th European Wireless Conference, pp. 1–5 (2014)

    Google Scholar 

  12. Y. Sun, H. Song, A.J. Jara, R. Bie, Internet of things and big data analytics for smart and connected communities. IEEE Access 4, 766–773 (2016)

    Article  Google Scholar 

  13. D.B. Rawat, S.R. Reddy, Software defined networking architecture, security and energy efficiency: a survey. Environment 3(5), 325–346 (2017)

    Google Scholar 

  14. R.K. Sharma, D.B. Rawat, Advances on security threats and countermeasures for cognitive radio networks: a survey. IEEE Commun. Surv. Tutorials 17(2), 1023–1043 (2015)

    Article  Google Scholar 

  15. X. Xiong, D. Jiang, Y. Wu, L. He, H. Song, Z. Lv, Empirical analysis and modeling of the activity dilemmas in big social networks. IEEE Access 5, 967–974 (2017)

    Article  Google Scholar 

  16. N. Cordeschi, D. Amendola, M. Shojafar, E. Baccarelli, Distributed and adaptive resource management in cloud-assisted cognitive radio vehicular networks with hard reliability guarantees. Veh. Commun. 2(1), 1–12 (2015)

    Google Scholar 

  17. M. Shojafar, N. Cordeschi, E. Baccarelli, Energy-efficient adaptive resource management for real-time vehicular cloud services. IEEE Trans. Cloud Comput. 99, 1–14 (2016)

    Article  Google Scholar 

  18. W. Li, H. Song, ART: an attack-resistant trust management scheme for securing vehicular ad-hoc networks. IEEE Trans. Intell. Transp. Syst. 17(4), 960–969 (2016)

    Article  Google Scholar 

  19. H. Song, M. Brandt-Pearce, Range of influence and impact of physical impairments in long-haul DWDM systems. J. Lightwave Technol. 31(6), 846–854 (2013)

    Article  Google Scholar 

  20. A.K. Jain, M.N. Murty, P.J. Flynn, Data clustering: a review. ACM Comput. Surv. 31(3), 264–323 (1999)

    Article  Google Scholar 

  21. CDR dataset information, https://dandelion.eu

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to C. Gunavathi or R. M. Swarna Priya .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Gunavathi, C., Swarna Priya, R.M., Aarthy, S.L. (2019). Big Data Analysis for Anomaly Detection in Telecommunication Using Clustering Techniques. In: Satapathy, S., Bhateja, V., Somanah, R., Yang, XS., Senkerik, R. (eds) Information Systems Design and Intelligent Applications. Advances in Intelligent Systems and Computing, vol 862. Springer, Singapore. https://doi.org/10.1007/978-981-13-3329-3_11

Download citation

Publish with us

Policies and ethics