Big Data Analysis for Anomaly Detection in Telecommunication Using Clustering Techniques

  • C. GunavathiEmail author
  • R. M. Swarna PriyaEmail author
  • S. L. Aarthy
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 862)


The recent development with respect to Information and Communication Technology (ICT) has a very high impact on the social well-being, economic-growth as well as national security. The ICT includes all the recent technologies like computers, mobile-devices and networks. This also includes few people who have the intent to attack maliciously and they are generally called as network intruders, cybercriminals, etc. Confronting these detrimental cyber activities has become the highest priority internationally and hence the focused research area. For this kind of confront, anomaly detection plays a major role. This is an important task in data analysis which helps in detecting these kinds of intrusions. It helps in identifying the abnormal patterns in various domains like finance, computer networks, human behaviour, gene expression etc. This paper focuses on detecting the abnormalities in the telecommunication domain using the Call Detail Records (CDR). The abnormalities are identified using the clustering techniques namely k-means clustering, hierarchical clustering and PAM clustering. The results obtained are discussed and the clustering technique which is suited better in identifying the anomaly accurately is suggested.


Big data analytics Anomaly detection Clustering User behaviour analysis 


  1. 1.
    E.E. Papalexakis, A. Beutel, P. Steenkiste, Network anomaly detection using co-clustering, in IEEE International Conference on Advances in Social Networks Analysis and Mining, pp. 403–410. Washington, DC, USA (2012)Google Scholar
  2. 2.
    M. Ahmed, A. Mahmood, Clustering based semantic data summarization technique: a new approach, in 9th IEEE Conference on Industrial Electronics and Applications, pp. 1780–1785. Hangzhou, China (2014)Google Scholar
  3. 3.
    D. Naboulsi, R. Stanica, M. Fiore, Classifying call profiles in largescale mobile traffic datasets, in IEEE Conference on Computer Communications, pp. 1806–1814. Toronto, ON, Canada (2014)Google Scholar
  4. 4.
    M. Ahmed, A. Anwar, A.N. Mahmood, Z. Shah, M.J. Maher, An investigation of performance analysis of anomaly detection techniques for big data in SCADA systems. EAI Endorsed Trans. Ind. Netw. Intell. Syst. 15(3), 1–16 (2015)CrossRefGoogle Scholar
  5. 5.
    V. Soto, E. Frías-Martínez, Automated land use identification using cell-phone records, in 3rd ACM International Workshop on MobiArch, pp. 17–22. (2011)Google Scholar
  6. 6.
    M. Amer, Comparison of Unsupervised Anomaly Detection Techniques. Bachelor Thesis (2011)Google Scholar
  7. 7.
    A. Zoha, A. Saeed, A. Imran, M.A. Imran, A. Abu-Dayya, A SON solution for sleeping cell detection using low-dimensional embedding of MDT measurements, in IEEE 25th Annual International Symposium on Personal, Indoor, and Mobile Radio Communication, pp. 1626–1630 (2014)Google Scholar
  8. 8.
    G. Münz, S. Li, G. Carle, Traffic anomaly detection using k-means clustering, in GI/ITG Workshop MMBnet, pp. 13–14 (2007)Google Scholar
  9. 9.
    M.F. Lima, B.B. Zarpelao, L.D. Sampaio, J.J. Rodrigues, T. Abrao, M.L. Proença, Anomaly detection using baseline and k-means clustering, in IEEE International Conference on Software, Telecommunications and Computer Networks, pp. 305–309 (2010)Google Scholar
  10. 10.
    B. Cici, M. Gjoka, A. Markopoulou, C.T. Butts, On the decomposition of cell phone activity patterns and their connection with urban ecology, in 16th ACM International Symposium on Mobile Ad Hoc Networking and Computing, pp. 317–326 (2015)Google Scholar
  11. 11.
    I.A. Karatepe, E. Zeydan, Anomaly detection in cellular network data using big data analytics, in 20th European Wireless Conference, pp. 1–5 (2014)Google Scholar
  12. 12.
    Y. Sun, H. Song, A.J. Jara, R. Bie, Internet of things and big data analytics for smart and connected communities. IEEE Access 4, 766–773 (2016)CrossRefGoogle Scholar
  13. 13.
    D.B. Rawat, S.R. Reddy, Software defined networking architecture, security and energy efficiency: a survey. Environment 3(5), 325–346 (2017)Google Scholar
  14. 14.
    R.K. Sharma, D.B. Rawat, Advances on security threats and countermeasures for cognitive radio networks: a survey. IEEE Commun. Surv. Tutorials 17(2), 1023–1043 (2015)CrossRefGoogle Scholar
  15. 15.
    X. Xiong, D. Jiang, Y. Wu, L. He, H. Song, Z. Lv, Empirical analysis and modeling of the activity dilemmas in big social networks. IEEE Access 5, 967–974 (2017)CrossRefGoogle Scholar
  16. 16.
    N. Cordeschi, D. Amendola, M. Shojafar, E. Baccarelli, Distributed and adaptive resource management in cloud-assisted cognitive radio vehicular networks with hard reliability guarantees. Veh. Commun. 2(1), 1–12 (2015)Google Scholar
  17. 17.
    M. Shojafar, N. Cordeschi, E. Baccarelli, Energy-efficient adaptive resource management for real-time vehicular cloud services. IEEE Trans. Cloud Comput. 99, 1–14 (2016)Google Scholar
  18. 18.
    W. Li, H. Song, ART: an attack-resistant trust management scheme for securing vehicular ad-hoc networks. IEEE Trans. Intell. Transp. Syst. 17(4), 960–969 (2016)CrossRefGoogle Scholar
  19. 19.
    H. Song, M. Brandt-Pearce, Range of influence and impact of physical impairments in long-haul DWDM systems. J. Lightwave Technol. 31(6), 846–854 (2013)CrossRefGoogle Scholar
  20. 20.
    A.K. Jain, M.N. Murty, P.J. Flynn, Data clustering: a review. ACM Comput. Surv. 31(3), 264–323 (1999)CrossRefGoogle Scholar
  21. 21.
    CDR dataset information,

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  1. 1.School of Information Technology and EngineeringVellore Institute of TechnologyVelloreIndia

Personalised recommendations