University of Jyväskylä | JYX Digital Repository

  • English  | Give feedback |
    • suomi
    • English
 
  • Login
JavaScript is disabled for your browser. Some features of this site may not work without it.
View Item 
  • JYX
  • Artikkelit
  • Informaatioteknologian tiedekunta
  • View Item
JYX > Artikkelit > Informaatioteknologian tiedekunta > View Item

Anomaly Detection Algorithms for the Sleeping Cell Detection in LTE Networks

ThumbnailFinal Draft
View/Open
610.1 Kb

Downloads:  
Show download detailsHide download details  
Chernov, S., Cochez, M., & Ristaniemi, T. (2015). Anomaly Detection Algorithms for the Sleeping Cell Detection in LTE Networks. In Proceedings of 2015 IEEE 81st Vehicular Technology Conference (VTC Spring) (pp. 1-5). IEEE. IEEE Vehicular Technology Conference. https://doi.org/10.1109/VTCSpring.2015.7145707
Published in
IEEE Vehicular Technology Conference
Authors
Chernov, Sergey |
Cochez, Michael |
Ristaniemi, Tapani
Date
2015
Discipline
TietotekniikkaMathematical Information Technology
Copyright
© 2015 IEEE. This is an author's post-print version of an article whose final and definitive form has been published in the conference proceeding by IEEE.

 
The Sleeping Cell problem is a particular type of cell degradation in Long-Term Evolution (LTE) networks. In practice such cell outage leads to the lack of network service and sometimes it can be revealed only after multiple user complains by an operator. In this study a cell becomes sleeping because of a Random Access Channel (RACH) failure, which may happen due to software or hardware problems. For the detection of malfunctioning cells, we introduce a data mining based framework. In its core is the analysis of event sequences reported by a User Equipment (UE) to a serving Base Station (BS). The crucial element of the developed framework is an anomaly detection algorithm. We compare performances of distance, centroid distance and probabilistic based methods, using Receiver Operating Characteristic (ROC) and Precision-Recall curves. Moreover, the theoretical comparison of the methods’ computational efficiencies is provided. The sleeping cell detection framework is verified by means of a dynamic LTE system simulator, using Minimization of Drive Testing (MDT) functionality. It is shown that the sleeping cell can be pinpointed. ...
Publisher
IEEE
ISBN
978-1-4799-8088-8
Parent publication ISBN
Conference
IEEE vehicular technology conference
Is part of publication
Proceedings of 2015 IEEE 81st Vehicular Technology Conference (VTC Spring)
ISSN Search the Publication Forum
1090-3038
Keywords
mobile cellular networks LTE self-organizing networks SON cell outage anomaly detection tiedonlouhinta
DOI
https://doi.org/10.1109/VTCSpring.2015.7145707
URI

http://urn.fi/URN:NBN:fi:jyu-201507082554

Publication in research information system

https://converis.jyu.fi/converis/portal/detail/Publication/24495814

Metadata
Show full item record
Collections
  • Informaatioteknologian tiedekunta [1974]

Related items

Showing items with similar title or keywords.

  • Detecting cellular network anomalies using the knowledge discovery process 

    Chernov, Sergey (University of Jyväskylä, 2015)
    Analytical companies unanimously forecast the exponential growth of mobile traffic consumption over the next five years. The densification of a network structure with small cells is regarded as a key solution to meet growing ...
  • Advanced performance monitoring for self-healing cellular mobile networks 

    Chernogorov, Fedor (University of Jyväskylä, 2015)
    This dissertation is devoted to development and validation of advanced per- formance monitoring system for existing and future cellular mobile networks. Knowledge mining techniques are employed for analysis of user specific ...
  • Dimensionality reduction framework for detecting anomalies from network logs 

    Sipola, Tuomo; Juvonen, Antti; Lehtonen, Joel (CRL Publishing, 2012)
    Dynamic web services are vulnerable to multitude of intrusions that could be previously unknown. Server logs contain vast amounts of information about network traffic, and finding attacks from these logs improves the ...
  • Anomaly detection from network logs using diffusion maps 

    Sipola, Tuomo; Juvonen, Antti; Lehtonen, Joel (Springer, 2011)
    The goal of this study is to detect anomalous queries from network logs using a dimensionality reduction framework. The fequencies of 2-grams in queries are extracted to a feature matrix. Dimensionality reduction is done ...
  • An Efficient Network Log Anomaly Detection System using Random Projection Dimensionality Reduction 

    Juvonen, Antti; Hämäläinen, Timo (IEEE, 2014)
    Network traffic is increasing all the time and network services are becoming more complex and vulnerable. To protect these networks, intrusion detection systems are used. Signature-based intrusion detection cannot find ...
  • Browse materials
  • Browse materials
  • Articles
  • Conferences and seminars
  • Electronic books
  • Historical maps
  • Journals
  • Tunes and musical notes
  • Photographs
  • Presentations and posters
  • Publication series
  • Research reports
  • Research data
  • Study materials
  • Theses

Browse

All of JYXCollection listBy Issue DateAuthorsSubjectsPublished inDepartmentDiscipline

My Account

Login

Statistics

View Usage Statistics
  • How to publish in JYX?
  • Self-archiving
  • Publish Your Thesis Online
  • Publishing Your Dissertation
  • Publication services

Open Science at the JYU
 
Data Protection Description

Accessibility Statement

Unless otherwise specified, publicly available JYX metadata (excluding abstracts) may be freely reused under the CC0 waiver.
Open Science Centre