Cooperative Anomaly Detection With Transfer Learning-Based Hidden Markov Model in Virtualized Network Slicing

被引:16
|
作者
Wang, Weili [1 ]
Chen, Qianbin [1 ]
He, Xiaoqiang [1 ]
Tang, Lun [1 ]
机构
[1] Chongqing Univ Posts & Telecommun, Key Lab Mobile Commun, Chongqing 400065, Peoples R China
基金
中国国家自然科学基金;
关键词
Network slicing; cooperative anomaly detection; transfer learning; HMM; CELL OUTAGE DETECTION;
D O I
10.1109/LCOMM.2019.2923913
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Network slicing can partition a shared substrate network into multiple logically isolated virtual networks to support diverse service requirements. However, one anomaly physical node (PN) in substrate networks will cause performance degradation of multiple network slices. To realize the self-organizing management of network slices, a cooperative anomaly detection scheme is designed in this letter through utilizing the transfer learning-based hidden Markov model (TLHMM). The PNs are first classified into four different states. Then, the hidden Markov model (HMM) is used to capture the current states of PNs based on the measurements of virtual nodes (VNs). Finally, according to the learned knowledge of networks and the similarity between PNs, the concept of transfer learning is introduced into HMM to propose a cooperative anomaly detection algorithm. Simulation results demonstrate that the proposed TLHMM-based cooperative anomaly detection algorithm cannot only speed up the learning process, but also achieve an average detection accuracy of more than 90%.
引用
收藏
页码:1534 / 1537
页数:4
相关论文
共 50 条
  • [41] ILIDViz: An incremental learning-based visual analysis system for network anomaly detection
    Xuefei TIAN
    Zhiyuan WU
    Junxiang CAO
    Shengtao CHEN
    Xiaoju DONG
    虚拟现实与智能硬件(中英文), 2023, 5 (06) : 471 - 489
  • [42] Anomaly detection based on a dynamic Markov model
    Ren, Huorong
    Ye, Zhixing
    Li, Zhiwu
    INFORMATION SCIENCES, 2017, 411 : 52 - 65
  • [43] A Simple and Efficient Hidden Markov Model Scheme for Host-Based Anomaly Intrusion Detection
    Hu, Jiankun
    Yu, Xinghuo
    Qiu, D.
    Chen, Hsiao-Hwa
    IEEE NETWORK, 2009, 23 (01): : 42 - 47
  • [44] Anomaly detection based on a granular Markov model
    Zhou, Yanjun
    Ren, Huorong
    Li, Zhiwu
    Pedrycz, Witold
    EXPERT SYSTEMS WITH APPLICATIONS, 2022, 187
  • [45] The Application of Markov Model Based Equivalence Class Generalization in Network Anomaly Detection
    Peng, Siyuan
    Wang, Guoyin
    Li, Zhixing
    Yang, Jie
    2017 2ND IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND BIG DATA ANALYSIS (ICCCBDA 2017), 2017, : 389 - 393
  • [46] Fight Detection Based On Hidden Markov Model
    Liu, Dejian
    Wu, Jinyong
    Wang, Yike
    Wang, Jun
    Gong, Zhuo
    2012 IEEE FIFTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTATIONAL INTELLIGENCE (ICACI), 2012, : 658 - 661
  • [47] Hidden Markov model based intrusion detection
    Liu, Zhi-Yong
    Qiao, Hong
    INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 3917 : 169 - 170
  • [48] Detection of Violence Based on Hidden Markov Model
    Lu Hui-qing
    Zhu Weinan
    Zhou Yuchao
    MATERIALS SCIENCE AND INFORMATION TECHNOLOGY, PTS 1-8, 2012, 433-440 : 4651 - 4655
  • [49] Intrusion detection based on Hidden Markov Model
    Yin, QB
    Shen, LR
    Zhang, RB
    Li, XY
    Wang, HQ
    2003 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-5, PROCEEDINGS, 2003, : 3115 - 3118
  • [50] Method for anomaly detection of user behaviors based on hidden Markov models
    School of Information and Electronic Engineering, Hunan University of Science and Technology, Xiangtan 411201, China
    不详
    不详
    Tongxin Xuebao, 2007, 4 (38-43):