Anomaly Detection Algorithms for the Sleeping Cell Detection in LTE Networks
Chernov, S., Cochez, M., & Ristaniemi, T. (2015). Anomaly Detection Algorithms for the Sleeping Cell Detection in LTE Networks. In Proceedings of 2015 IEEE 81st Vehicular Technology Conference (VTC Spring) (pp. 1-5). IEEE. IEEE Vehicular Technology Conference. https://doi.org/10.1109/VTCSpring.2015.7145707
Published in
IEEE Vehicular Technology ConferenceDate
2015Copyright
© 2015 IEEE. This is an author's post-print version of an article whose final and definitive form has been published in the conference proceeding by IEEE.
The Sleeping Cell problem is a particular type of
cell degradation in Long-Term Evolution (LTE) networks. In
practice such cell outage leads to the lack of network service and
sometimes it can be revealed only after multiple user complains
by an operator. In this study a cell becomes sleeping because of a
Random Access Channel (RACH) failure, which may happen due
to software or hardware problems. For the detection of malfunctioning
cells, we introduce a data mining based framework. In
its core is the analysis of event sequences reported by a User
Equipment (UE) to a serving Base Station (BS). The crucial
element of the developed framework is an anomaly detection
algorithm. We compare performances of distance, centroid distance
and probabilistic based methods, using Receiver Operating
Characteristic (ROC) and Precision-Recall curves. Moreover, the
theoretical comparison of the methods’ computational efficiencies
is provided. The sleeping cell detection framework is verified by
means of a dynamic LTE system simulator, using Minimization of
Drive Testing (MDT) functionality. It is shown that the sleeping
cell can be pinpointed.
...
Publisher
IEEEParent publication ISBN
978-1-4799-8088-8Conference
IEEE vehicular technology conferenceIs part of publication
Proceedings of 2015 IEEE 81st Vehicular Technology Conference (VTC Spring)ISSN Search the Publication Forum
1090-3038Keywords
Publication in research information system
https://converis.jyu.fi/converis/portal/detail/Publication/24495814
Metadata
Show full item recordCollections
License
Related items
Showing items with similar title or keywords.
-
Detecting cellular network anomalies using the knowledge discovery process
Chernov, Sergey (University of Jyväskylä, 2015)Analytical companies unanimously forecast the exponential growth of mobile traffic consumption over the next five years. The densification of a network structure with small cells is regarded as a key solution to meet growing ... -
Advanced performance monitoring for self-healing cellular mobile networks
Chernogorov, Fedor (University of Jyväskylä, 2015)This dissertation is devoted to development and validation of advanced per- formance monitoring system for existing and future cellular mobile networks. Knowledge mining techniques are employed for analysis of user specific ... -
Anomaly detection from network logs using diffusion maps
Sipola, Tuomo; Juvonen, Antti; Lehtonen, Joel (Springer, 2011)The goal of this study is to detect anomalous queries from network logs using a dimensionality reduction framework. The fequencies of 2-grams in queries are extracted to a feature matrix. Dimensionality reduction is done ... -
Combining conjunctive rule extraction with diffusion maps for network intrusion detection
Juvonen, Antti; Sipola, Tuomo (IEEE, 2013)Network security and intrusion detection are important in the modern world where communication happens via information networks. Traditional signature-based intrusion detection methods cannot find previously unknown ... -
Dimensionality reduction framework for detecting anomalies from network logs
Sipola, Tuomo; Juvonen, Antti; Lehtonen, Joel (CRL Publishing, 2012)Dynamic web services are vulnerable to multitude of intrusions that could be previously unknown. Server logs contain vast amounts of information about network traffic, and finding attacks from these logs improves the ...