scispace - formally typeset
Book ChapterDOI

Big Data Analysis for Anomaly Detection in Telecommunication Using Clustering Techniques

Reads0
Chats0
TLDR
This paper focuses on detecting the abnormalities in the telecommunication domain using the Call Detail Records (CDR) using the clustering techniques namely k-means clustering, hierarchical clustering and PAM clustering.
Abstract
The recent development with respect to Information and Communication Technology (ICT) has a very high impact on the social well-being, economic-growth as well as national security. The ICT includes all the recent technologies like computers, mobile-devices and networks. This also includes few people who have the intent to attack maliciously and they are generally called as network intruders, cybercriminals, etc. Confronting these detrimental cyber activities has become the highest priority internationally and hence the focused research area. For this kind of confront, anomaly detection plays a major role. This is an important task in data analysis which helps in detecting these kinds of intrusions. It helps in identifying the abnormal patterns in various domains like finance, computer networks, human behaviour, gene expression etc. This paper focuses on detecting the abnormalities in the telecommunication domain using the Call Detail Records (CDR). The abnormalities are identified using the clustering techniques namely k-means clustering, hierarchical clustering and PAM clustering. The results obtained are discussed and the clustering technique which is suited better in identifying the anomaly accurately is suggested.

read more

Citations
More filters
Journal ArticleDOI

Modeling and state of health estimation of nickel–metal hydride battery using an EPSO-based fuzzy c-regression model

TL;DR: A combined battery modeling and SOH estimation method over the lifespan of a nickel–metal hydride (Ni–MH) battery is proposed and a fuzzy c-regression model based on Euclidean particle swarm optimization is applied to modeling a Ni–MH battery.

Massive Scale Streaming Graphs: Evolving Network Analysis and Mining

TL;DR: This dissertation encapsulates contributions in three major perspectives: Analysis, Sampling, and Mining of streaming networks, which proposes algorithms that comply with single-pass and limited memory for processing, and presents dynamic sampling on evolving networks.
Journal ArticleDOI

Fraud Detection Call Detail Record Using Machine Learning in Telecommunications Company

TL;DR: The K-Means algorithm is obtained to show a better accuracy value to model fraud on telecommunications CDR compared to DBSCAN, and machine learning with unsupervised learning techniques are used.
Journal ArticleDOI

Dynamic Behavior Pattern: Mining the Fraudsters in Telecom Network

TL;DR: Wang et al. as discussed by the authors proposed a telephone network fraud detection framework based on the social relationship evo-lution model and designed the feature extraction method of dynamic telephone social behavior patterns based on time slices.
References
More filters
Journal ArticleDOI

Data clustering: a review

TL;DR: An overview of pattern clustering methods from a statistical pattern recognition perspective is presented, with a goal of providing useful advice and references to fundamental concepts accessible to the broad community of clustering practitioners.
Journal ArticleDOI

Internet of Things and Big Data Analytics for Smart and Connected Communities

TL;DR: It is argued that Internet of Things (IoT) has the potential to provide a ubiquitous network of connected devices and smart sensors for SCC, and big data analytics has the Potential to enable the move from IoT to real-time control desired for S CC.
Journal ArticleDOI

ART: An Attack-Resistant Trust Management Scheme for Securing Vehicular Ad Hoc Networks

TL;DR: An attack-resistant trust management scheme (ART) is proposed for VANets that is able to detect and cope with malicious attacks and also evaluate the trustworthiness of both data and mobile nodes in VANETs.
Journal ArticleDOI

Energy-Efficient Adaptive Resource Management for Real-Time Vehicular Cloud Services

TL;DR: An energy-efficient adaptive resource scheduler for Networked Fog Centers (NetFCs) that is capable to provide hard QoS guarantees, in terms of minimum/maximum instantaneous rates of the traffic delivered to the vehicular clients, instantaneous rate-jitters and total processing delays is proposed and tested.
Journal ArticleDOI

Software Defined Networking Architecture, Security and Energy Efficiency: A Survey

TL;DR: This paper presents various security threats that are resolved by SDN and new threats that arise as a result of SDN implementation, and the main ongoing research efforts, challenges, and research trends in this area are discussed.
Related Papers (5)