Anomaly Detection in Wireless Networks: An Introduction to Multi-Cluster Technique

Anomaly Detection in Wireless Networks: An Introduction to Multi-Cluster Technique

Yirui Hu
Copyright: © 2017 |Pages: 11
ISBN13: 9781522517504|ISBN10: 1522517502|EISBN13: 9781522517511
DOI: 10.4018/978-1-5225-1750-4.ch008
Cite Chapter Cite Chapter

MLA

Hu, Yirui. "Anomaly Detection in Wireless Networks: An Introduction to Multi-Cluster Technique." Big Data Applications in the Telecommunications Industry, edited by Ye Ouyang and Mantian Hu, IGI Global, 2017, pp. 108-118. https://doi.org/10.4018/978-1-5225-1750-4.ch008

APA

Hu, Y. (2017). Anomaly Detection in Wireless Networks: An Introduction to Multi-Cluster Technique. In Y. Ouyang & M. Hu (Eds.), Big Data Applications in the Telecommunications Industry (pp. 108-118). IGI Global. https://doi.org/10.4018/978-1-5225-1750-4.ch008

Chicago

Hu, Yirui. "Anomaly Detection in Wireless Networks: An Introduction to Multi-Cluster Technique." In Big Data Applications in the Telecommunications Industry, edited by Ye Ouyang and Mantian Hu, 108-118. Hershey, PA: IGI Global, 2017. https://doi.org/10.4018/978-1-5225-1750-4.ch008

Export Reference

Mendeley
Favorite

Abstract

This chapter is an introduction to multi-cluster based anomaly detection analysis. Various anomalies present different behaviors in wireless networks. Not all anomalies are known to networks. Unsupervised algorithms are desirable to automatically characterize the nature of traffic behavior and detect anomalies from normal behaviors. Essentially all anomaly detection systems first learn a model of the normal patterns in training data set, and then determine the anomaly score of a given testing data point based on the deviations from the learned patterns. The initial step of learning a good model is the most crucial part in anomaly detection. Multi-cluster based analysis are valuable because they can obtain the insights of human behaviors and learn similar patterns in temporal traffic data. The anomaly threshold can be determined by quantitative analysis based on the trained model. A novel quantitative “Donut” algorithm of anomaly detection on the basis of model log-likelihood is proposed in this chapter.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.