SlideShare ist ein Scribd-Unternehmen logo
1 von 5
CONTACT: PRAVEEN KUMAR. L (,+91 – 9791938249)
MAIL ID: , praveen@nexgenproject.com
Web: www.nexgenproject.com,
BIG DATA ANALYTICS FOR USER-ACTIVITY ANALYSIS AND USER-ANOMALY
DETECTION IN MOBILE WIRELESS NETWORK
ABSTRACT
The next generation wireless networks are expected to operate in fully automated fashion to meet
the burgeoning capacity demand and to serve users with superior quality of experience. Mobile
wireless networks can leverage spatiotemporal information about user and network condition to
embed the system with end-to-end visibility and intelligence. Big data analytics has emerged as a
promising approach to unearth meaningful insights and to build artificially intelligent models
with assistance of machine learning tools. Utilizing aforementioned tools and techniques, this
paper contributes in two ways. First, we utilize mobile network data (big data) – call detail
record (CDR) – to analyze anomalous behavior of mobile wireless network. For anomaly
detection purposes, we use unsupervised clustering techniques namely k-means clustering and
hierarchical clustering. We compare the detected anomalies with ground truth information to
verify their correctness. From the comparative analysis, we observe that when the network
experiences abruptly high (unusual) traffic demand at any location and time, it identifies that as
anomaly. This helps in identifying regions of interest (RoI) in the network for special action such
as resource allocation, fault avoidance solution etc. Second, we train a neural-network based
prediction model with anomalous and anomaly-free data to highlight the effect of anomalies in
data while training/building intelligent models. In this phase, we transform our anomalous data
to anomaly-free and we observe that the error in prediction while training the model with
anomaly-free data has largely decreased as compared to the case when the model was trained
with anomalous data.
EXISTING SYSTEM:
CONTACT: PRAVEEN KUMAR. L (,+91 – 9791938249)
MAIL ID: , praveen@nexgenproject.com
Web: www.nexgenproject.com,
In the literature, anomaly detection has been performed through various supervised, semi-
supervised and unsupervised learning methods. Authors proposed a framework that categorizes
large size CDR into different call profile and accordingly classify network usages. As a by-
product, the proposed framework identifies unexpected traffic that is anomalous as compared to
the normal. They consider large-scale dataset of voice calls, however, our dataset is comprised
of voice calls as well as text messages. Article categorized anomaly detection techniques for
Big Data based on nearest neighbors, clustering and statistical approaches. Their finding suggests
that for real datasets, clustering based anomaly detection technique performs the best and second
best performance was attained by the nearest neighbor based technique k-NN -, k-means
clustering approach has been performed on CDR for different purposes such as identifying
Industrial Parks & Office Areas, Commercial Areas, Nightlife areas, Leisure areas and
Residential areas. It was validated that there was a strong correspondence between land uses and
the infrastructures included in the geographical representation of each cluster. Using the k-
means clustering, the authors were able to detect volume anomalies in real network traffic,
achieving satisfactory results. K-means clustering has been applied for anomaly detection in
traffic data. The data contains unlabeled flow records, which k-means algorithm separates into
clusters of normal and anomalous traffic. The authors utilize agglomerative hierarchical
clustering to perform segmentation and anomaly/outlier detection from a single dendrogram,
utilizing Pearson correlation as distance function. Rule based approach has been utilized have
been for detecting anomaly CDR information generated from wireless network. However, study
overlooks the effect of non-travelling users in the analysis, which is a common case in business
areas. On the contrary in this paper, we first categorize the call activity information into different
clusters. This in turn helps to identify the un-natural behavior in the activity on a particular date
and time, which further can be traced back for root cause analysis. Few similar works along with
security concern are also presented PROPOSED SYSTEM:
In this paper, we exploit call detailed record (CDR) information collected from core network
(CN) of a real mobile cellular network. The patio-temporal information contained within the
CONTACT: PRAVEEN KUMAR. L (,+91 – 9791938249)
MAIL ID: , praveen@nexgenproject.com
Web: www.nexgenproject.com,
CDR helps us analyze user specific activity in a certain region at a particular time and date. By
anomaly in this paper, we mean abnormal or unusual behavior or activity pattern of user and thus
an accordingly effect on the network. Anomaly in network performance can be noticed due to
multiple reasons such as sleeping cell, hardware failures, surge in traffic etc. Successful anomaly
detection and its proper treatment results in multiple benefits, e.g., at a place like stadium, when
the provided bandwidth resource does not suffice the highly-dense user demands then it will
cause choke in bandwidth, and it will appear as anomaly in the network. On one hand, such
behaviors are considered normal in telecom and are not usually counted amongst anomalies. On
the other hand, categorizing them into anomalies would help the network operators not only in
detecting them but also in determining the region of interests (ROI), for which proper network
resources can be proactively allocated for enhanced quality of experience. Our contributions
towards anomaly detection in this paper are as follows. 1. We utilize machine-learning tools
namely K-means clustering and Hierarchical clustering to detect anomalies. 2. We verify and
compare the anomalies with those found through ground truth observation to determine their
accuracy. 3. After anomaly detection and verification, the performance of anomaly-free data is
evaluated by passing it through a neural network based prediction model that forecasts future
traffic pattern. We observe that the mean square error between the training, validation and test
data is largely reduced as compared to that in the case when the model was trained with
anomalous data.
CONCLUSION AND FUTURE WORK
In this paper we presented anomaly detection in mobile network big data (Call Detail Record:
CDR) using machine learning (clustering) technique. We analyzed user activities at different
time and location from the patio-temporal information contained within CDR. Using k-means
and hierarchical clustering techniques. The user activities that were unusually high caused
unusual traffic demand and thus were categorized into anomalies. Further, after verifying these
anomalies with ground truth information, we found that the location where there was unusual
CONTACT: PRAVEEN KUMAR. L (,+91 – 9791938249)
MAIL ID: , praveen@nexgenproject.com
Web: www.nexgenproject.com,
high traffic was a stadium and at the time when the network experienced high demand, there was
a soccer match going on. And thus the traffic experienced was higher than on usual days. Thus
with the help of anomaly detection, region of interests (Roil) can be identified, for which proper
action (e.g. proper resource allocation) can be taken in advance to meet the requirements. We
also discussed the effect of anomalous and anomaly-free data by experimenting on a prediction
model. We found that training the model with anomaly-free data resulted in less mean square
error than with anomalous data. This work can be extended to understand the dynamics of user
in envisioned smart cities. Big data analytics approach can be utilized to understand users’
contextual information such as mobility pattern, traffic pattern, their choice of contents, their
social network and ties etc. By extracting these insightful information, smart and intelligent
resource allocation algorithms can be developed for efficient resource utilization. Additionally,
data analytics can also be performed on data collected from energy meters in every home to
understand and appropriately determine energy utilization pattern in smart cities.
REFERENCES
[1] Cisco, “Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update 2015-
2020”, White Paper, [Online],
http://www.cisco.com/c/en/us/solutions/collateral/serviceprovider/visual-networking-index-
vni/mobile-white-paper-c11520862.pdf.
[2] Nicola Bald, Lorenz Geoponic, and Joseph Mangues-Bafalluy, “Big Data Empowered Self
Organized Networks,” In 20th European Wireless Conference; Proceedings of European
Wireless-2014;, pp. 1-8, 2014.
[3] Jaime Floret, Alejandro Canova’s, Sandra Sandra, and Lorena Parra. “A smart
communication architecture for ambient assisted living,” IEEE Communications Magazine, Vol.
53, no. 1 pp. 26-33, 2015.
CONTACT: PRAVEEN KUMAR. L (,+91 – 9791938249)
MAIL ID: , praveen@nexgenproject.com
Web: www.nexgenproject.com,
[4] Dial Nabulus, Raven Stannic, and Marco Fiore, “Classifying call profiles in large-scale
mobile traffic datasets,” In Proc. of the IEEE INFOCOM-2014, pp. 1806-1814, 2014.
[5] Mohiuddin Ahmed, Adnan Anwar, Abdu Nasser Mahmoud, Dubai Shah and Michael J.
Maher, “An Investigation of Performance Analysis of Anomaly Detection Techniques for Big
Data in SCADA Systems,” EAI Endorsed Transactions on Industrial Networks and Intelligent
Systems, Vol. 15, No. 3, pp. 1-16, 2015
[6] Victor Soto, and Enrique Frías-Martínez. “Automated land use identification using cell-
phone records,” In Proceedings of the 3rd ACM international workshop on MobiArch, pp. 17-22.
2011.
[7] M. Amar, “Comparison of unsupervised anomaly detection techniques”, Bachelor’s Thesis
2011, http://www.madm.eu/_media/theses/thesisamer.pdf
[8] Ahmed Zohar, Arsenal Saied, Ali Imran, Muhammad Ali Imran, and Adnan Abu-Daye, “A
SON solution for sleeping cell detection using low-dimensional embedding of MDT
measurements,” In Proc. of Personal, Indoor, and Mobile Radio Communication (PIMRC), 2014
IEEE 25th Annual International Symposium on, pp. 1626-1630, 2014.
[9] Gerhard Munoz, Sa Li, and Georg Carle, “Traffic anomaly detection using k-means
clustering,” In GI/ITG Workshop Monet, 2007.
[10] Moses F. Lima, Bruno B. Zarpelao, Lucas DH Simpatico, Joel JPC Rodrigues, Tewfik
Abroad, and Mario Lames Provence Jr., “Anomaly detection using baseline and K-means
clustering,” In Software, Telecommunications and Computer Networks (Sitcom), 2010
International Conference on, pp. 305-309, 2010.
[11] Berm Citi, Minas Joke, Athena Markopoulos, and Carter T. Butts, “On the Decomposition
of Cell Phone Activity Patterns and their Connection with Urban Ecology.” Mobic '15, pp. 317-
326,2015.

Weitere ähnliche Inhalte

Was ist angesagt?

2013 ieee project dotnet titles
2013 ieee project dotnet titles2013 ieee project dotnet titles
2013 ieee project dotnet titles
ecwayerode
 
2013 ieee project java titles
2013 ieee project java titles2013 ieee project java titles
2013 ieee project java titles
ecwayerode
 

Was ist angesagt? (10)

F33022028
F33022028F33022028
F33022028
 
2013-2014 IEEE Projects & Application Projects
2013-2014 IEEE Projects & Application Projects2013-2014 IEEE Projects & Application Projects
2013-2014 IEEE Projects & Application Projects
 
Ieee projects-in-pondicherry | 2015 ieee projects in pondicherry
Ieee projects-in-pondicherry | 2015 ieee projects in pondicherryIeee projects-in-pondicherry | 2015 ieee projects in pondicherry
Ieee projects-in-pondicherry | 2015 ieee projects in pondicherry
 
Ieee transactions on 2018 network and service management
Ieee transactions on 2018 network and service managementIeee transactions on 2018 network and service management
Ieee transactions on 2018 network and service management
 
WLAN BASED POSITIONING WITH A SINGLE ACCESS POINT
WLAN BASED POSITIONING WITH A SINGLE ACCESS POINTWLAN BASED POSITIONING WITH A SINGLE ACCESS POINT
WLAN BASED POSITIONING WITH A SINGLE ACCESS POINT
 
A predictive model for network intrusion detection using stacking approach
A predictive model for network intrusion detection using stacking approach A predictive model for network intrusion detection using stacking approach
A predictive model for network intrusion detection using stacking approach
 
TREND-BASED NETWORKING DRIVEN BY BIG DATA TELEMETRY FOR SDN AND TRADITIONAL N...
TREND-BASED NETWORKING DRIVEN BY BIG DATA TELEMETRY FOR SDN AND TRADITIONAL N...TREND-BASED NETWORKING DRIVEN BY BIG DATA TELEMETRY FOR SDN AND TRADITIONAL N...
TREND-BASED NETWORKING DRIVEN BY BIG DATA TELEMETRY FOR SDN AND TRADITIONAL N...
 
Approximation of regression-based fault minimization for network traffic
Approximation of regression-based fault minimization for network trafficApproximation of regression-based fault minimization for network traffic
Approximation of regression-based fault minimization for network traffic
 
2013 ieee project dotnet titles
2013 ieee project dotnet titles2013 ieee project dotnet titles
2013 ieee project dotnet titles
 
2013 ieee project java titles
2013 ieee project java titles2013 ieee project java titles
2013 ieee project java titles
 

Ähnlich wie BIG DATA ANALYTICS FOR USER-ACTIVITY ANALYSIS AND USER-ANOMALY DETECTION IN MOBILE WIRELESS NETWORK

Web server load prediction and anomaly detection from hypertext transfer prot...
Web server load prediction and anomaly detection from hypertext transfer prot...Web server load prediction and anomaly detection from hypertext transfer prot...
Web server load prediction and anomaly detection from hypertext transfer prot...
IJECEIAES
 
MACHINE LEARNING FOR QOE PREDICTION AND ANOMALY DETECTION IN SELF-ORGANIZING ...
MACHINE LEARNING FOR QOE PREDICTION AND ANOMALY DETECTION IN SELF-ORGANIZING ...MACHINE LEARNING FOR QOE PREDICTION AND ANOMALY DETECTION IN SELF-ORGANIZING ...
MACHINE LEARNING FOR QOE PREDICTION AND ANOMALY DETECTION IN SELF-ORGANIZING ...
ijwmn
 
Cao nicolau-mc dermott-learning-neural-cybernetics-2018-preprint
Cao nicolau-mc dermott-learning-neural-cybernetics-2018-preprintCao nicolau-mc dermott-learning-neural-cybernetics-2018-preprint
Cao nicolau-mc dermott-learning-neural-cybernetics-2018-preprint
Nam Le
 

Ähnlich wie BIG DATA ANALYTICS FOR USER-ACTIVITY ANALYSIS AND USER-ANOMALY DETECTION IN MOBILE WIRELESS NETWORK (20)

Life and science journal.pdf
Life and science journal.pdfLife and science journal.pdf
Life and science journal.pdf
 
A NOVEL INTRUSION DETECTION MODEL FOR MOBILE AD-HOC NETWORKS USING CP-KNN
A NOVEL INTRUSION DETECTION MODEL FOR MOBILE AD-HOC NETWORKS USING CP-KNNA NOVEL INTRUSION DETECTION MODEL FOR MOBILE AD-HOC NETWORKS USING CP-KNN
A NOVEL INTRUSION DETECTION MODEL FOR MOBILE AD-HOC NETWORKS USING CP-KNN
 
Comparative Analysis of K-Means Data Mining and Outlier Detection Approach fo...
Comparative Analysis of K-Means Data Mining and Outlier Detection Approach fo...Comparative Analysis of K-Means Data Mining and Outlier Detection Approach fo...
Comparative Analysis of K-Means Data Mining and Outlier Detection Approach fo...
 
Web server load prediction and anomaly detection from hypertext transfer prot...
Web server load prediction and anomaly detection from hypertext transfer prot...Web server load prediction and anomaly detection from hypertext transfer prot...
Web server load prediction and anomaly detection from hypertext transfer prot...
 
BIG DATA SANITIZATION AND CYBER SITUATIONALAWARENESS: A NETWORK TELESCOPE PE...
 BIG DATA SANITIZATION AND CYBER SITUATIONALAWARENESS: A NETWORK TELESCOPE PE... BIG DATA SANITIZATION AND CYBER SITUATIONALAWARENESS: A NETWORK TELESCOPE PE...
BIG DATA SANITIZATION AND CYBER SITUATIONALAWARENESS: A NETWORK TELESCOPE PE...
 
Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...
Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...
Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...
 
EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...
EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...
EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...
 
Project Synopsis Electricity Theft Detection.docx
Project Synopsis Electricity Theft Detection.docxProject Synopsis Electricity Theft Detection.docx
Project Synopsis Electricity Theft Detection.docx
 
IEEE 2015 C# Projects
IEEE 2015 C# ProjectsIEEE 2015 C# Projects
IEEE 2015 C# Projects
 
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
 
ICMCSI 2023 PPT 1074.pptx
ICMCSI 2023 PPT 1074.pptxICMCSI 2023 PPT 1074.pptx
ICMCSI 2023 PPT 1074.pptx
 
IEEE 2015 C# Projects
IEEE 2015 C# ProjectsIEEE 2015 C# Projects
IEEE 2015 C# Projects
 
MACHINE LEARNING FOR QOE PREDICTION AND ANOMALY DETECTION IN SELF-ORGANIZING ...
MACHINE LEARNING FOR QOE PREDICTION AND ANOMALY DETECTION IN SELF-ORGANIZING ...MACHINE LEARNING FOR QOE PREDICTION AND ANOMALY DETECTION IN SELF-ORGANIZING ...
MACHINE LEARNING FOR QOE PREDICTION AND ANOMALY DETECTION IN SELF-ORGANIZING ...
 
An efficient approach on spatial big data related to wireless networks and it...
An efficient approach on spatial big data related to wireless networks and it...An efficient approach on spatial big data related to wireless networks and it...
An efficient approach on spatial big data related to wireless networks and it...
 
G03403041052
G03403041052G03403041052
G03403041052
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Cao nicolau-mc dermott-learning-neural-cybernetics-2018-preprint
Cao nicolau-mc dermott-learning-neural-cybernetics-2018-preprintCao nicolau-mc dermott-learning-neural-cybernetics-2018-preprint
Cao nicolau-mc dermott-learning-neural-cybernetics-2018-preprint
 
IRJET- Secure Data Access on Distributed Database using Skyline Queries
IRJET- Secure Data Access on Distributed Database using Skyline QueriesIRJET- Secure Data Access on Distributed Database using Skyline Queries
IRJET- Secure Data Access on Distributed Database using Skyline Queries
 
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemWLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
 
Intrusion Detection System Using Machine Learning: An Overview
Intrusion Detection System Using Machine Learning: An OverviewIntrusion Detection System Using Machine Learning: An Overview
Intrusion Detection System Using Machine Learning: An Overview
 

Mehr von Nexgen Technology

Mehr von Nexgen Technology (20)

MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
 
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
 
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
 
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
 
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
 
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
 
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CH...
     MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CH...     MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CH...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CH...
 
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHENN...
  MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHENN...  MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHENN...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHENN...
 
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
 
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
 
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHENNA...
 MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHENNA... MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHENNA...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHENNA...
 
Ieee 2020 21 vlsi projects in pondicherry,ieee vlsi projects in chennai
Ieee 2020 21 vlsi projects in pondicherry,ieee  vlsi projects  in chennaiIeee 2020 21 vlsi projects in pondicherry,ieee  vlsi projects  in chennai
Ieee 2020 21 vlsi projects in pondicherry,ieee vlsi projects in chennai
 
Ieee 2020 21 power electronics in pondicherry,Ieee 2020 21 power electronics
Ieee 2020 21 power electronics in pondicherry,Ieee 2020 21 power electronics Ieee 2020 21 power electronics in pondicherry,Ieee 2020 21 power electronics
Ieee 2020 21 power electronics in pondicherry,Ieee 2020 21 power electronics
 
Ieee 2020 -21 ns2 in pondicherry, Ieee 2020 -21 ns2 projects,best project cen...
Ieee 2020 -21 ns2 in pondicherry, Ieee 2020 -21 ns2 projects,best project cen...Ieee 2020 -21 ns2 in pondicherry, Ieee 2020 -21 ns2 projects,best project cen...
Ieee 2020 -21 ns2 in pondicherry, Ieee 2020 -21 ns2 projects,best project cen...
 
Ieee 2020 21 ns2 in pondicherry,best project center in pondicherry,final year...
Ieee 2020 21 ns2 in pondicherry,best project center in pondicherry,final year...Ieee 2020 21 ns2 in pondicherry,best project center in pondicherry,final year...
Ieee 2020 21 ns2 in pondicherry,best project center in pondicherry,final year...
 
Ieee 2020 21 java dotnet in pondicherry,final year projects in pondicherry,pr...
Ieee 2020 21 java dotnet in pondicherry,final year projects in pondicherry,pr...Ieee 2020 21 java dotnet in pondicherry,final year projects in pondicherry,pr...
Ieee 2020 21 java dotnet in pondicherry,final year projects in pondicherry,pr...
 
Ieee 2020 21 iot in pondicherry,final year projects in pondicherry,project ce...
Ieee 2020 21 iot in pondicherry,final year projects in pondicherry,project ce...Ieee 2020 21 iot in pondicherry,final year projects in pondicherry,project ce...
Ieee 2020 21 iot in pondicherry,final year projects in pondicherry,project ce...
 
Ieee 2020 21 blockchain in pondicherry,final year projects in pondicherry,bes...
Ieee 2020 21 blockchain in pondicherry,final year projects in pondicherry,bes...Ieee 2020 21 blockchain in pondicherry,final year projects in pondicherry,bes...
Ieee 2020 21 blockchain in pondicherry,final year projects in pondicherry,bes...
 
Ieee 2020 -21 bigdata in pondicherry,project center in pondicherry,best proje...
Ieee 2020 -21 bigdata in pondicherry,project center in pondicherry,best proje...Ieee 2020 -21 bigdata in pondicherry,project center in pondicherry,best proje...
Ieee 2020 -21 bigdata in pondicherry,project center in pondicherry,best proje...
 
Ieee 2020 21 embedded in pondicherry,final year projects in pondicherry,best...
Ieee 2020 21  embedded in pondicherry,final year projects in pondicherry,best...Ieee 2020 21  embedded in pondicherry,final year projects in pondicherry,best...
Ieee 2020 21 embedded in pondicherry,final year projects in pondicherry,best...
 

Kürzlich hochgeladen

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 

Kürzlich hochgeladen (20)

Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 

BIG DATA ANALYTICS FOR USER-ACTIVITY ANALYSIS AND USER-ANOMALY DETECTION IN MOBILE WIRELESS NETWORK

  • 1. CONTACT: PRAVEEN KUMAR. L (,+91 – 9791938249) MAIL ID: , praveen@nexgenproject.com Web: www.nexgenproject.com, BIG DATA ANALYTICS FOR USER-ACTIVITY ANALYSIS AND USER-ANOMALY DETECTION IN MOBILE WIRELESS NETWORK ABSTRACT The next generation wireless networks are expected to operate in fully automated fashion to meet the burgeoning capacity demand and to serve users with superior quality of experience. Mobile wireless networks can leverage spatiotemporal information about user and network condition to embed the system with end-to-end visibility and intelligence. Big data analytics has emerged as a promising approach to unearth meaningful insights and to build artificially intelligent models with assistance of machine learning tools. Utilizing aforementioned tools and techniques, this paper contributes in two ways. First, we utilize mobile network data (big data) – call detail record (CDR) – to analyze anomalous behavior of mobile wireless network. For anomaly detection purposes, we use unsupervised clustering techniques namely k-means clustering and hierarchical clustering. We compare the detected anomalies with ground truth information to verify their correctness. From the comparative analysis, we observe that when the network experiences abruptly high (unusual) traffic demand at any location and time, it identifies that as anomaly. This helps in identifying regions of interest (RoI) in the network for special action such as resource allocation, fault avoidance solution etc. Second, we train a neural-network based prediction model with anomalous and anomaly-free data to highlight the effect of anomalies in data while training/building intelligent models. In this phase, we transform our anomalous data to anomaly-free and we observe that the error in prediction while training the model with anomaly-free data has largely decreased as compared to the case when the model was trained with anomalous data. EXISTING SYSTEM:
  • 2. CONTACT: PRAVEEN KUMAR. L (,+91 – 9791938249) MAIL ID: , praveen@nexgenproject.com Web: www.nexgenproject.com, In the literature, anomaly detection has been performed through various supervised, semi- supervised and unsupervised learning methods. Authors proposed a framework that categorizes large size CDR into different call profile and accordingly classify network usages. As a by- product, the proposed framework identifies unexpected traffic that is anomalous as compared to the normal. They consider large-scale dataset of voice calls, however, our dataset is comprised of voice calls as well as text messages. Article categorized anomaly detection techniques for Big Data based on nearest neighbors, clustering and statistical approaches. Their finding suggests that for real datasets, clustering based anomaly detection technique performs the best and second best performance was attained by the nearest neighbor based technique k-NN -, k-means clustering approach has been performed on CDR for different purposes such as identifying Industrial Parks & Office Areas, Commercial Areas, Nightlife areas, Leisure areas and Residential areas. It was validated that there was a strong correspondence between land uses and the infrastructures included in the geographical representation of each cluster. Using the k- means clustering, the authors were able to detect volume anomalies in real network traffic, achieving satisfactory results. K-means clustering has been applied for anomaly detection in traffic data. The data contains unlabeled flow records, which k-means algorithm separates into clusters of normal and anomalous traffic. The authors utilize agglomerative hierarchical clustering to perform segmentation and anomaly/outlier detection from a single dendrogram, utilizing Pearson correlation as distance function. Rule based approach has been utilized have been for detecting anomaly CDR information generated from wireless network. However, study overlooks the effect of non-travelling users in the analysis, which is a common case in business areas. On the contrary in this paper, we first categorize the call activity information into different clusters. This in turn helps to identify the un-natural behavior in the activity on a particular date and time, which further can be traced back for root cause analysis. Few similar works along with security concern are also presented PROPOSED SYSTEM: In this paper, we exploit call detailed record (CDR) information collected from core network (CN) of a real mobile cellular network. The patio-temporal information contained within the
  • 3. CONTACT: PRAVEEN KUMAR. L (,+91 – 9791938249) MAIL ID: , praveen@nexgenproject.com Web: www.nexgenproject.com, CDR helps us analyze user specific activity in a certain region at a particular time and date. By anomaly in this paper, we mean abnormal or unusual behavior or activity pattern of user and thus an accordingly effect on the network. Anomaly in network performance can be noticed due to multiple reasons such as sleeping cell, hardware failures, surge in traffic etc. Successful anomaly detection and its proper treatment results in multiple benefits, e.g., at a place like stadium, when the provided bandwidth resource does not suffice the highly-dense user demands then it will cause choke in bandwidth, and it will appear as anomaly in the network. On one hand, such behaviors are considered normal in telecom and are not usually counted amongst anomalies. On the other hand, categorizing them into anomalies would help the network operators not only in detecting them but also in determining the region of interests (ROI), for which proper network resources can be proactively allocated for enhanced quality of experience. Our contributions towards anomaly detection in this paper are as follows. 1. We utilize machine-learning tools namely K-means clustering and Hierarchical clustering to detect anomalies. 2. We verify and compare the anomalies with those found through ground truth observation to determine their accuracy. 3. After anomaly detection and verification, the performance of anomaly-free data is evaluated by passing it through a neural network based prediction model that forecasts future traffic pattern. We observe that the mean square error between the training, validation and test data is largely reduced as compared to that in the case when the model was trained with anomalous data. CONCLUSION AND FUTURE WORK In this paper we presented anomaly detection in mobile network big data (Call Detail Record: CDR) using machine learning (clustering) technique. We analyzed user activities at different time and location from the patio-temporal information contained within CDR. Using k-means and hierarchical clustering techniques. The user activities that were unusually high caused unusual traffic demand and thus were categorized into anomalies. Further, after verifying these anomalies with ground truth information, we found that the location where there was unusual
  • 4. CONTACT: PRAVEEN KUMAR. L (,+91 – 9791938249) MAIL ID: , praveen@nexgenproject.com Web: www.nexgenproject.com, high traffic was a stadium and at the time when the network experienced high demand, there was a soccer match going on. And thus the traffic experienced was higher than on usual days. Thus with the help of anomaly detection, region of interests (Roil) can be identified, for which proper action (e.g. proper resource allocation) can be taken in advance to meet the requirements. We also discussed the effect of anomalous and anomaly-free data by experimenting on a prediction model. We found that training the model with anomaly-free data resulted in less mean square error than with anomalous data. This work can be extended to understand the dynamics of user in envisioned smart cities. Big data analytics approach can be utilized to understand users’ contextual information such as mobility pattern, traffic pattern, their choice of contents, their social network and ties etc. By extracting these insightful information, smart and intelligent resource allocation algorithms can be developed for efficient resource utilization. Additionally, data analytics can also be performed on data collected from energy meters in every home to understand and appropriately determine energy utilization pattern in smart cities. REFERENCES [1] Cisco, “Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update 2015- 2020”, White Paper, [Online], http://www.cisco.com/c/en/us/solutions/collateral/serviceprovider/visual-networking-index- vni/mobile-white-paper-c11520862.pdf. [2] Nicola Bald, Lorenz Geoponic, and Joseph Mangues-Bafalluy, “Big Data Empowered Self Organized Networks,” In 20th European Wireless Conference; Proceedings of European Wireless-2014;, pp. 1-8, 2014. [3] Jaime Floret, Alejandro Canova’s, Sandra Sandra, and Lorena Parra. “A smart communication architecture for ambient assisted living,” IEEE Communications Magazine, Vol. 53, no. 1 pp. 26-33, 2015.
  • 5. CONTACT: PRAVEEN KUMAR. L (,+91 – 9791938249) MAIL ID: , praveen@nexgenproject.com Web: www.nexgenproject.com, [4] Dial Nabulus, Raven Stannic, and Marco Fiore, “Classifying call profiles in large-scale mobile traffic datasets,” In Proc. of the IEEE INFOCOM-2014, pp. 1806-1814, 2014. [5] Mohiuddin Ahmed, Adnan Anwar, Abdu Nasser Mahmoud, Dubai Shah and Michael J. Maher, “An Investigation of Performance Analysis of Anomaly Detection Techniques for Big Data in SCADA Systems,” EAI Endorsed Transactions on Industrial Networks and Intelligent Systems, Vol. 15, No. 3, pp. 1-16, 2015 [6] Victor Soto, and Enrique Frías-Martínez. “Automated land use identification using cell- phone records,” In Proceedings of the 3rd ACM international workshop on MobiArch, pp. 17-22. 2011. [7] M. Amar, “Comparison of unsupervised anomaly detection techniques”, Bachelor’s Thesis 2011, http://www.madm.eu/_media/theses/thesisamer.pdf [8] Ahmed Zohar, Arsenal Saied, Ali Imran, Muhammad Ali Imran, and Adnan Abu-Daye, “A SON solution for sleeping cell detection using low-dimensional embedding of MDT measurements,” In Proc. of Personal, Indoor, and Mobile Radio Communication (PIMRC), 2014 IEEE 25th Annual International Symposium on, pp. 1626-1630, 2014. [9] Gerhard Munoz, Sa Li, and Georg Carle, “Traffic anomaly detection using k-means clustering,” In GI/ITG Workshop Monet, 2007. [10] Moses F. Lima, Bruno B. Zarpelao, Lucas DH Simpatico, Joel JPC Rodrigues, Tewfik Abroad, and Mario Lames Provence Jr., “Anomaly detection using baseline and K-means clustering,” In Software, Telecommunications and Computer Networks (Sitcom), 2010 International Conference on, pp. 305-309, 2010. [11] Berm Citi, Minas Joke, Athena Markopoulos, and Carter T. Butts, “On the Decomposition of Cell Phone Activity Patterns and their Connection with Urban Ecology.” Mobic '15, pp. 317- 326,2015.