2013
DOI: 10.1016/j.comnet.2013.07.028
|View full text |Cite
|
Sign up to set email alerts
|

Distribution-based anomaly detection via generalized likelihood ratio test: A general Maximum Entropy approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
32
0
1

Year Published

2015
2015
2020
2020

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 39 publications
(33 citation statements)
references
References 31 publications
0
32
0
1
Order By: Relevance
“…Examples of such events include outages in mobile cloud services [31,8] and in VoIP peer-to-peer networks [9]. During those incidents, a large number of mobile devices attempt to recover connectivity to the application servers, generating significantly more keep-alive messages [5] and an unexpectedly high signaling load in the process.…”
Section: Signaling Stormsmentioning
confidence: 99%
“…Examples of such events include outages in mobile cloud services [31,8] and in VoIP peer-to-peer networks [9]. During those incidents, a large number of mobile devices attempt to recover connectivity to the application servers, generating significantly more keep-alive messages [5] and an unexpectedly high signaling load in the process.…”
Section: Signaling Stormsmentioning
confidence: 99%
“…A general framework for anomaly detection was presented in [13] based on time-series analysis and change detection algorithms. While the goal of [13,45] is to identify large-scale events by aggregating and analyzing statistics from all hosts and mobile users, respectively, our approach aims to identify users that are contributing to a problem, namely signaling overload, rather than detect the problem itself.…”
Section: Prior Work On Storm Detection and Mitigationmentioning
confidence: 99%
“…A general framework for anomaly detection was presented in [13] based on time-series analysis and change detection algorithms. While the goal of [13,45] is to identify large-scale events by aggregating and analyzing statistics from all hosts and mobile users, respectively, our approach aims to identify users that are contributing to a problem, namely signaling overload, rather than detect the problem itself. The work in [42] considered the detection of mobile-initiated signaling attacks via a supervised learning approach, which monitors transmissions that trigger a radio access bearer setup procedure, and extracts from the corresponding packets features relating to destination IP and port numbers, packet size and response-request ratio.…”
Section: Prior Work On Storm Detection and Mitigationmentioning
confidence: 99%
See 1 more Smart Citation
“…Just recently interest has emerged in applying methods from the machine learning domain such as clustering algorithms [16] as well as Bayesian networks [18] to automate the detection of faulty cell behavior. Coluccia et al [17] analyzed the variations in the traffic profiles for 3G cellular systems to detect real world traffic anomalies. In terms of COC, the authors in [8], [9] investigated the effectiveness of control parameters such as the reference signal power, antenna tilt, scheduling parameters and the uplink target received power level in mitigating the effect of cell outage.…”
Section: Introductionmentioning
confidence: 99%