In this work we present a novel scheme for statistical-based anomaly detection in 3G cellular networks. The traffic data collected by a passive monitoring system are reduced to a set of per-mobile user counters, from which time-series of unidimensional feature distributions are derived. An example of feature is the number of TCP SYN packets seen in uplink for each mobile user in fixed-length time bins. We design a changedetection algorithm to identify deviations in each distribution time-series. Our algorithm is designed specifically to cope with the marked non-stationarities, daily/weekly seasonality and longterm trend that characterize the global traffic in a real network. The proposed scheme was applied to the analysis of a la...
New security threats emerge against mobiledevices as the devices’ computing power and storagecapabil...
The massive amount of data available in operational mobile networks offers an invaluable opportunity...
The increasing complexity of cellular radio networks yields new demands concerning network security....
In this work we present a novel scheme for statistical-based anomaly detection in 3G cellular networ...
Modern cellular networks are complex systems offering a wide range of services and present challenge...
In this paper we investigate the dynamics of one-way delays in an operational mobile core network. O...
This paper proposes an anomaly detection framework that utilizes key performance indicators (KPIs) a...
Functioning mobile telecommunication networks are taken for granted in present-day society. The netw...
As the mobile Internet has become widespread in recent years, communication based on mobile networks...
Third generation (3G) mobile networks rely on distributed architectures where Operation and Maintena...
Recent studies have shown that a number of network attacks that were used to target mainframes and p...
In this paper we evaluate four different metrics for non intrusive bottleneck detection based on TCP...
Despite a large body of literature and methods devoted to the analysis of network traffic, the autom...
In this work we address the problem of inferring the presence of a capacity bottleneck from passive ...
Mobile communication networks produce massive amounts of data which may be useful in identifying the...
New security threats emerge against mobiledevices as the devices’ computing power and storagecapabil...
The massive amount of data available in operational mobile networks offers an invaluable opportunity...
The increasing complexity of cellular radio networks yields new demands concerning network security....
In this work we present a novel scheme for statistical-based anomaly detection in 3G cellular networ...
Modern cellular networks are complex systems offering a wide range of services and present challenge...
In this paper we investigate the dynamics of one-way delays in an operational mobile core network. O...
This paper proposes an anomaly detection framework that utilizes key performance indicators (KPIs) a...
Functioning mobile telecommunication networks are taken for granted in present-day society. The netw...
As the mobile Internet has become widespread in recent years, communication based on mobile networks...
Third generation (3G) mobile networks rely on distributed architectures where Operation and Maintena...
Recent studies have shown that a number of network attacks that were used to target mainframes and p...
In this paper we evaluate four different metrics for non intrusive bottleneck detection based on TCP...
Despite a large body of literature and methods devoted to the analysis of network traffic, the autom...
In this work we address the problem of inferring the presence of a capacity bottleneck from passive ...
Mobile communication networks produce massive amounts of data which may be useful in identifying the...
New security threats emerge against mobiledevices as the devices’ computing power and storagecapabil...
The massive amount of data available in operational mobile networks offers an invaluable opportunity...
The increasing complexity of cellular radio networks yields new demands concerning network security....