Abstract
Although mobile technologies keep evolving through years, Fault management and cyber-security management in mobile networks are still treated as separated notions with different blocks and different approaches whereas in practice, they are highly correlated. In this paper, we propose a framework that takes into account the correlation between these two management systems. The framework is based on several prediction agents where each agent is composed of a security predictor, a fault predictor and a generic anomaly detection model. A re-enforcement process allows to enhance the reliability of the machine learning training and prediction phases of the different predictors. Besides, each agent can collaborate with its neighborhood for a more resilient network. An application of this framework to 5G architecture is proposed by mapping the components of our framework with network slices. Finally, an experimentation is held over a testbed that we set up on openstack in order to forecast future anomalies related to proxy overload, latency violation in call session network functions and to excessive usage of memory. The training is achieved with ARIMA and deep learning models with promising results.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
NGMN (2015) 5G white Paper. Technical report
Chandola V, Banerjee A, Kumar V (2009) Anomaly detection: a survey. ACM Comput Surv (CSUR) 41(3):15
Kbar G (2009) Security risk analysis based on probability of system failure, attacks and vulnerabilities, pp 874–879
Abhishek NV, Tandon A, Lim TJ, Sikdar B (2018) Detecting forwarding misbehavior in clustered iot networks. In: Proceedings of the 14th ACM international symposium on qos and security for wireless and mobile networks, series (Q2SWinet’18). Association for Computing Machinery, New York, NY, USA, p 16
Sriram VSS, Sahoo G, Agrawal KK (2010) Detecting and eliminating rogue access points in ieee-802.11 WLAN—a multi-agent sourcing methodology. In: 2010 IEEE 2nd international advance computing conference (IACC), pp 256–260
Singh PK, Kar K (2019) Countering data and control plane attack on olsr using passive neighbor policing and inconsistency identification. In: Proceedings of the 15th ACM international symposium on QoS and security for wireless and mobile networks, series (Q2SWinet’19). Association for Computing Machinery, New York, NY, USA, p 1928
Halder B, Barik MS, Mazumdar C (2018) Detection of flow violation in distributed SDN controller. In: 2018 Fifth international conference on emerging applications of information technology (EAIT), pp 1–6
Kralik L, Malanik D, Matysek M (2018) Cyber security resilience based on static factors as a part of converged security. In: 2018 5th international conference on mathematics and computers in sciences and industry (MCSI), pp 114–117
Arfaoui G, Vilchez JM Sanchez, Wary J (2017) Security and resilience in 5g: current challenges and future directions. In: 2017 IEEE Trustcom/BigDataSE/ICESS, pp 1010–1015
Slimen YB, Allio S, Jacques J (2017) Anomaly prevision in radio access networks using functional data analysis. In: 2017 IEEE global communications conference (GLOBECOM 2017), Singapore, December 4–8, 2017. IEEE, pp. 1–6
Hadj-Kacem I, Jemaa SB, Allio S, Slimen YB (2020) Anomaly prediction in mobile networks: a data driven approach for machine learning algorithm selection. In: NOMS 2020 - IEEE/IFIP network operations and management symposium, Budapest, Hungary, April 20–24, 2020. IEEE, pp 1–7
Bouattour H, Slimen YB, Mechteri M, Biallach H (2020) Root cause analysis of noisy neighbors in a virtualized infrastructure. In: 2020 IEEE wireless communications and networking conference (WCNC 2020), Seoul, Korea (South), May 25–28, 2020. IEEE, pp 1–6
SelfNet: a framework for self-organized network management in virtualized and software defined networks [Online]. https://selfnet-5g.eu/
CogNet building an intelligent system of insights and action for 5G network management [online]. https://5g-ppp.eu/cognet/
Kellerer W, Kalmbach P, Blenk A, Basta A, Reisslein M, Schmid S (2019) Adaptable and data-driven softwarized networks: review, opportunities, and challenges. Proc IEEE 107(4):711–731
Chollet F (2017) Deep learning with python. Manning
Tomasik B (2017) Ethical issues in artificial reinforcement learning. Technical report
3GPPP (2017) 28.801: telecommunication management;Study on management and orchestration of network slicing for next generation network. Technical report
Jiang W, Strufe M, Schotten HD (2017) Intelligent network management for 5g systems: the SELFNET approach. In: 2017 European conference on networks and communications (EuCNC), pp 1–5
Kaloxylos A (2018) “Application of data mining in the 5g network architecture,”
Kibria MG, Nguyen K, Villardi GP, Zhao O, Ishizu K, Kojima F (2018) Big data analytics, machine learning, and artificial intelligence in next-generation wireless networks. IEEE Access 6:32 328–32 338
Kotulski Z, Nowak T, Sepczuk M, Tunia M, Artych R, Bocianiak K, Osko T, Wary J (2017) On end-to-end approach for slice isolation in 5g networks. fundamental challenges. In: 2017 federated conference on computer science and information systems (FedCSIS), pp 783–792
IETF (2017) SUPA policy-based management framework. Technical report
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Benslimen, Y., Sedjelmaci, H. & Manenti, AC. Attacks and failures prediction framework for a collaborative 5G mobile network. Computing 103, 1165–1181 (2021). https://doi.org/10.1007/s00607-020-00893-8
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00607-020-00893-8
Keywords
- Cyber-security
- Fault management
- Anomaly detection
- Mobile networks
- Cognitive manegement
- Machine learning
- Re-enforcement learning