Abstract
The recent development with respect to Information and Communication Technology (ICT) has a very high impact on the social well-being, economic-growth as well as national security. The ICT includes all the recent technologies like computers, mobile-devices and networks. This also includes few people who have the intent to attack maliciously and they are generally called as network intruders, cybercriminals, etc. Confronting these detrimental cyber activities has become the highest priority internationally and hence the focused research area. For this kind of confront, anomaly detection plays a major role. This is an important task in data analysis which helps in detecting these kinds of intrusions. It helps in identifying the abnormal patterns in various domains like finance, computer networks, human behaviour, gene expression etc. This paper focuses on detecting the abnormalities in the telecommunication domain using the Call Detail Records (CDR). The abnormalities are identified using the clustering techniques namely k-means clustering, hierarchical clustering and PAM clustering. The results obtained are discussed and the clustering technique which is suited better in identifying the anomaly accurately is suggested.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
E.E. Papalexakis, A. Beutel, P. Steenkiste, Network anomaly detection using co-clustering, in IEEE International Conference on Advances in Social Networks Analysis and Mining, pp. 403–410. Washington, DC, USA (2012)
M. Ahmed, A. Mahmood, Clustering based semantic data summarization technique: a new approach, in 9th IEEE Conference on Industrial Electronics and Applications, pp. 1780–1785. Hangzhou, China (2014)
D. Naboulsi, R. Stanica, M. Fiore, Classifying call profiles in largescale mobile traffic datasets, in IEEE Conference on Computer Communications, pp. 1806–1814. Toronto, ON, Canada (2014)
M. Ahmed, A. Anwar, A.N. Mahmood, Z. Shah, M.J. Maher, An investigation of performance analysis of anomaly detection techniques for big data in SCADA systems. EAI Endorsed Trans. Ind. Netw. Intell. Syst. 15(3), 1–16 (2015)
V. Soto, E. Frías-Martínez, Automated land use identification using cell-phone records, in 3rd ACM International Workshop on MobiArch, pp. 17–22. (2011)
M. Amer, Comparison of Unsupervised Anomaly Detection Techniques. Bachelor Thesis (2011)
A. Zoha, A. Saeed, A. Imran, M.A. Imran, A. Abu-Dayya, A SON solution for sleeping cell detection using low-dimensional embedding of MDT measurements, in IEEE 25th Annual International Symposium on Personal, Indoor, and Mobile Radio Communication, pp. 1626–1630 (2014)
G. Münz, S. Li, G. Carle, Traffic anomaly detection using k-means clustering, in GI/ITG Workshop MMBnet, pp. 13–14 (2007)
M.F. Lima, B.B. Zarpelao, L.D. Sampaio, J.J. Rodrigues, T. Abrao, M.L. Proença, Anomaly detection using baseline and k-means clustering, in IEEE International Conference on Software, Telecommunications and Computer Networks, pp. 305–309 (2010)
B. Cici, M. Gjoka, A. Markopoulou, C.T. Butts, On the decomposition of cell phone activity patterns and their connection with urban ecology, in 16th ACM International Symposium on Mobile Ad Hoc Networking and Computing, pp. 317–326 (2015)
I.A. Karatepe, E. Zeydan, Anomaly detection in cellular network data using big data analytics, in 20th European Wireless Conference, pp. 1–5 (2014)
Y. Sun, H. Song, A.J. Jara, R. Bie, Internet of things and big data analytics for smart and connected communities. IEEE Access 4, 766–773 (2016)
D.B. Rawat, S.R. Reddy, Software defined networking architecture, security and energy efficiency: a survey. Environment 3(5), 325–346 (2017)
R.K. Sharma, D.B. Rawat, Advances on security threats and countermeasures for cognitive radio networks: a survey. IEEE Commun. Surv. Tutorials 17(2), 1023–1043 (2015)
X. Xiong, D. Jiang, Y. Wu, L. He, H. Song, Z. Lv, Empirical analysis and modeling of the activity dilemmas in big social networks. IEEE Access 5, 967–974 (2017)
N. Cordeschi, D. Amendola, M. Shojafar, E. Baccarelli, Distributed and adaptive resource management in cloud-assisted cognitive radio vehicular networks with hard reliability guarantees. Veh. Commun. 2(1), 1–12 (2015)
M. Shojafar, N. Cordeschi, E. Baccarelli, Energy-efficient adaptive resource management for real-time vehicular cloud services. IEEE Trans. Cloud Comput. 99, 1–14 (2016)
W. Li, H. Song, ART: an attack-resistant trust management scheme for securing vehicular ad-hoc networks. IEEE Trans. Intell. Transp. Syst. 17(4), 960–969 (2016)
H. Song, M. Brandt-Pearce, Range of influence and impact of physical impairments in long-haul DWDM systems. J. Lightwave Technol. 31(6), 846–854 (2013)
A.K. Jain, M.N. Murty, P.J. Flynn, Data clustering: a review. ACM Comput. Surv. 31(3), 264–323 (1999)
CDR dataset information, https://dandelion.eu
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Gunavathi, C., Swarna Priya, R.M., Aarthy, S.L. (2019). Big Data Analysis for Anomaly Detection in Telecommunication Using Clustering Techniques. In: Satapathy, S., Bhateja, V., Somanah, R., Yang, XS., Senkerik, R. (eds) Information Systems Design and Intelligent Applications. Advances in Intelligent Systems and Computing, vol 862. Springer, Singapore. https://doi.org/10.1007/978-981-13-3329-3_11
Download citation
DOI: https://doi.org/10.1007/978-981-13-3329-3_11
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-3328-6
Online ISBN: 978-981-13-3329-3
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)