Skip to main content
Log in

Attacks and failures prediction framework for a collaborative 5G mobile network

  • Special Issue Article
  • Published:
Computing Aims and scope Submit manuscript

Abstract

Although mobile technologies keep evolving through years, Fault management and cyber-security management in mobile networks are still treated as separated notions with different blocks and different approaches whereas in practice, they are highly correlated. In this paper, we propose a framework that takes into account the correlation between these two management systems. The framework is based on several prediction agents where each agent is composed of a security predictor, a fault predictor and a generic anomaly detection model. A re-enforcement process allows to enhance the reliability of the machine learning training and prediction phases of the different predictors. Besides, each agent can collaborate with its neighborhood for a more resilient network. An application of this framework to 5G architecture is proposed by mapping the components of our framework with network slices. Finally, an experimentation is held over a testbed that we set up on openstack in order to forecast future anomalies related to proxy overload, latency violation in call session network functions and to excessive usage of memory. The training is achieved with ARIMA and deep learning models with promising results.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. NGMN (2015) 5G white Paper. Technical report

  2. Chandola V, Banerjee A, Kumar V (2009) Anomaly detection: a survey. ACM Comput Surv (CSUR) 41(3):15

    Article  Google Scholar 

  3. Kbar G (2009) Security risk analysis based on probability of system failure, attacks and vulnerabilities, pp 874–879

  4. Abhishek NV, Tandon A, Lim TJ, Sikdar B (2018) Detecting forwarding misbehavior in clustered iot networks. In: Proceedings of the 14th ACM international symposium on qos and security for wireless and mobile networks, series (Q2SWinet’18). Association for Computing Machinery, New York, NY, USA, p 16

  5. Sriram VSS, Sahoo G, Agrawal KK (2010) Detecting and eliminating rogue access points in ieee-802.11 WLAN—a multi-agent sourcing methodology. In: 2010 IEEE 2nd international advance computing conference (IACC), pp 256–260

  6. Singh PK, Kar K (2019) Countering data and control plane attack on olsr using passive neighbor policing and inconsistency identification. In: Proceedings of the 15th ACM international symposium on QoS and security for wireless and mobile networks, series (Q2SWinet’19). Association for Computing Machinery, New York, NY, USA, p 1928

  7. Halder B, Barik MS, Mazumdar C (2018) Detection of flow violation in distributed SDN controller. In: 2018 Fifth international conference on emerging applications of information technology (EAIT), pp 1–6

  8. Kralik L, Malanik D, Matysek M (2018) Cyber security resilience based on static factors as a part of converged security. In: 2018 5th international conference on mathematics and computers in sciences and industry (MCSI), pp 114–117

  9. Arfaoui G, Vilchez JM Sanchez, Wary J (2017) Security and resilience in 5g: current challenges and future directions. In: 2017 IEEE Trustcom/BigDataSE/ICESS, pp 1010–1015

  10. Slimen YB, Allio S, Jacques J (2017) Anomaly prevision in radio access networks using functional data analysis. In: 2017 IEEE global communications conference (GLOBECOM 2017), Singapore, December 4–8, 2017. IEEE, pp. 1–6

  11. Hadj-Kacem I, Jemaa SB, Allio S, Slimen YB (2020) Anomaly prediction in mobile networks: a data driven approach for machine learning algorithm selection. In: NOMS 2020 - IEEE/IFIP network operations and management symposium, Budapest, Hungary, April 20–24, 2020. IEEE, pp 1–7

  12. Bouattour H, Slimen YB, Mechteri M, Biallach H (2020) Root cause analysis of noisy neighbors in a virtualized infrastructure. In: 2020 IEEE wireless communications and networking conference (WCNC 2020), Seoul, Korea (South), May 25–28, 2020. IEEE, pp 1–6

  13. SelfNet: a framework for self-organized network management in virtualized and software defined networks [Online]. https://selfnet-5g.eu/

  14. CogNet building an intelligent system of insights and action for 5G network management [online]. https://5g-ppp.eu/cognet/

  15. Kellerer W, Kalmbach P, Blenk A, Basta A, Reisslein M, Schmid S (2019) Adaptable and data-driven softwarized networks: review, opportunities, and challenges. Proc IEEE 107(4):711–731

    Article  Google Scholar 

  16. Chollet F (2017) Deep learning with python. Manning

  17. Tomasik B (2017) Ethical issues in artificial reinforcement learning. Technical report

  18. 3GPPP (2017) 28.801: telecommunication management;Study on management and orchestration of network slicing for next generation network. Technical report

  19. Jiang W, Strufe M, Schotten HD (2017) Intelligent network management for 5g systems: the SELFNET approach. In: 2017 European conference on networks and communications (EuCNC), pp 1–5

  20. Kaloxylos A (2018) “Application of data mining in the 5g network architecture,”

  21. Kibria MG, Nguyen K, Villardi GP, Zhao O, Ishizu K, Kojima F (2018) Big data analytics, machine learning, and artificial intelligence in next-generation wireless networks. IEEE Access 6:32 328–32 338

    Article  Google Scholar 

  22. Kotulski Z, Nowak T, Sepczuk M, Tunia M, Artych R, Bocianiak K, Osko T, Wary J (2017) On end-to-end approach for slice isolation in 5g networks. fundamental challenges. In: 2017 federated conference on computer science and information systems (FedCSIS), pp 783–792

  23. IETF (2017) SUPA policy-based management framework. Technical report

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yosra Benslimen.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Benslimen, Y., Sedjelmaci, H. & Manenti, AC. Attacks and failures prediction framework for a collaborative 5G mobile network. Computing 103, 1165–1181 (2021). https://doi.org/10.1007/s00607-020-00893-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00607-020-00893-8

Keywords

Mathematics Subject Classification

Navigation