Cooperative Anomaly Detection With Transfer Learning-Based Hidden Markov Model in Virtualized Network Slicing

被引:16
|
作者
Wang, Weili [1 ]
Chen, Qianbin [1 ]
He, Xiaoqiang [1 ]
Tang, Lun [1 ]
机构
[1] Chongqing Univ Posts & Telecommun, Key Lab Mobile Commun, Chongqing 400065, Peoples R China
基金
中国国家自然科学基金;
关键词
Network slicing; cooperative anomaly detection; transfer learning; HMM; CELL OUTAGE DETECTION;
D O I
10.1109/LCOMM.2019.2923913
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Network slicing can partition a shared substrate network into multiple logically isolated virtual networks to support diverse service requirements. However, one anomaly physical node (PN) in substrate networks will cause performance degradation of multiple network slices. To realize the self-organizing management of network slices, a cooperative anomaly detection scheme is designed in this letter through utilizing the transfer learning-based hidden Markov model (TLHMM). The PNs are first classified into four different states. Then, the hidden Markov model (HMM) is used to capture the current states of PNs based on the measurements of virtual nodes (VNs). Finally, according to the learned knowledge of networks and the similarity between PNs, the concept of transfer learning is introduced into HMM to propose a cooperative anomaly detection algorithm. Simulation results demonstrate that the proposed TLHMM-based cooperative anomaly detection algorithm cannot only speed up the learning process, but also achieve an average detection accuracy of more than 90%.
引用
收藏
页码:1534 / 1537
页数:4
相关论文
共 50 条
  • [21] Deep transfer learning-based anomaly detection for cycling safety
    Yaqoob, Shumayla
    Cafiso, Salvatore
    Morabito, Giacomo
    Pappalardo, Giuseppina
    JOURNAL OF SAFETY RESEARCH, 2023, 87 : 122 - 131
  • [22] A Hidden Markov Model-Based Method for Virtual Machine Anomaly Detection
    Shi, Chaochen
    Yu, Jiangshan
    PROVABLE SECURITY, PROVSEC 2019, 2019, 11821 : 372 - 380
  • [23] An anomaly intrusion detection Based on Hidden Markov model System Call Sequenc
    Wang, Dongliang
    Wang, Zhigang
    ADVANCED RESEARCH ON AUTOMATION, COMMUNICATION, ARCHITECTONICS AND MATERIALS, PTS 1 AND 2, 2011, 225-226 (1-2): : 609 - +
  • [24] Method for Network Anomaly Detection Based on Bayesian Statistical Model with Time Slicing
    Liu Tao
    Qi Ailing
    Hou Yuanbin
    Chang Xintan
    2008 7TH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION, VOLS 1-23, 2008, : 3359 - 3362
  • [25] Network anomaly detection using Two-dimensional Hidden Markov Model-based Viterbi algorithm
    Alhaidari, Sulaiman
    Zohdy, Mohamed
    2019 IEEE INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE TESTING (AITEST), 2019, : 17 - 18
  • [26] Research on hidden Markov model for system call anomaly detection
    Qian, Quan
    Xin, Mingjun
    INTELLIGENCE AND SECURITY INFORMATICS, 2007, 4430 : 152 - +
  • [27] Deep Learning-based Hybrid Model for Efficient Anomaly Detection
    Osamor, Frances
    Wellman, Briana
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2022, 13 (04) : 975 - 979
  • [28] Transfer learning-based data anomaly detection for structural health monitoring
    Pan, Qiuyue
    Bao, Yuequan
    Li, Hui
    STRUCTURAL HEALTH MONITORING-AN INTERNATIONAL JOURNAL, 2023, 22 (05): : 3077 - 3091
  • [29] Quantum deep learning-based anomaly detection for enhanced network security
    Hdaib, Moe
    Rajasegarar, Sutharshan
    Pan, Lei
    QUANTUM MACHINE INTELLIGENCE, 2024, 6 (01)
  • [30] A Bayesian Hidden Markov Model-Based Approach for Anomaly Detection in Electronic Systems
    Dorj, Enkhjargal
    Chen, Chaochao
    Pecht, Michael
    2013 IEEE AEROSPACE CONFERENCE, 2013,