SlideShare a Scribd company logo
1 of 2
Download to read offline
AI Anomaly Detection for Cloudified
Mobile Core Architectures
Abstract
IT systems monitoring is a crucial process for managing and orchestrating
network resources, allowing network providers to rapidly detect and react to
most impediment causing network degradation. However, the high growth in
size and complexity of current o
solutions to process huge amounts of data (including alarms) reliably and
swiftly. Further, as the network becomes progressively more virtualized, the
hosting of NFV on cloud environments adds a magnitude of possible
bottlenecks outside the control of the service owners. In this paper, we
propose two deep learning anomaly detection solutions that leverage service
exposure and apply it to automate the detection of service degradation and
root cause discovery in a cloudi
ETSI OSM. A testbed is built to validate these AI models. The testbed collects
monitoring data from the OSM monitoring module, which is then exposed to
the external AI anomaly detection modules, tuned to identify
AI Anomaly Detection for Cloudified
Mobile Core Architectures
IT systems monitoring is a crucial process for managing and orchestrating
network resources, allowing network providers to rapidly detect and react to
most impediment causing network degradation. However, the high growth in
size and complexity of current operational networks (2022) demands new
solutions to process huge amounts of data (including alarms) reliably and
swiftly. Further, as the network becomes progressively more virtualized, the
hosting of NFV on cloud environments adds a magnitude of possible
bottlenecks outside the control of the service owners. In this paper, we
propose two deep learning anomaly detection solutions that leverage service
exposure and apply it to automate the detection of service degradation and
root cause discovery in a cloudified mobile network that is orchestrated by
ETSI OSM. A testbed is built to validate these AI models. The testbed collects
monitoring data from the OSM monitoring module, which is then exposed to
the external AI anomaly detection modules, tuned to identify the anomalies
AI Anomaly Detection for Cloudified
IT systems monitoring is a crucial process for managing and orchestrating
network resources, allowing network providers to rapidly detect and react to
most impediment causing network degradation. However, the high growth in
perational networks (2022) demands new
solutions to process huge amounts of data (including alarms) reliably and
swiftly. Further, as the network becomes progressively more virtualized, the
hosting of NFV on cloud environments adds a magnitude of possible
bottlenecks outside the control of the service owners. In this paper, we
propose two deep learning anomaly detection solutions that leverage service
exposure and apply it to automate the detection of service degradation and
fied mobile network that is orchestrated by
ETSI OSM. A testbed is built to validate these AI models. The testbed collects
monitoring data from the OSM monitoring module, which is then exposed to
the anomalies
and the network services causing them. The deep learning solutions are
tested using various artificially induced bottlenecks. The AI solutions are
shown to correctly detect anomalies and identify the network components
involved in the bottlenecks, with certain limitations in a particular type of
bottlenecks. A discussion of the right monitoring tools to identify concrete
bottlenecks is provided.

More Related Content

Similar to AI Anomaly Detection for Cloudified Mobile Core Architectures.pdf

Ncct Ieee Software Abstract Collection Volume 1 50+ Abst
Ncct   Ieee Software Abstract Collection Volume 1   50+ AbstNcct   Ieee Software Abstract Collection Volume 1   50+ Abst
Ncct Ieee Software Abstract Collection Volume 1 50+ Abst
ncct
 

Similar to AI Anomaly Detection for Cloudified Mobile Core Architectures.pdf (20)

2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...
 
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A system-for-denial-of-service...
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A system-for-denial-of-service...IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A system-for-denial-of-service...
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A system-for-denial-of-service...
 
Ijsrdv9 i20118
Ijsrdv9 i20118Ijsrdv9 i20118
Ijsrdv9 i20118
 
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
 
IoT.pdf
IoT.pdfIoT.pdf
IoT.pdf
 
internet architecture.pdf
internet architecture.pdfinternet architecture.pdf
internet architecture.pdf
 
L010527175
L010527175L010527175
L010527175
 
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING MLSECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
 
Ixia/Net Optics - Visibility Architecture Solution Brief
Ixia/Net Optics - Visibility Architecture Solution BriefIxia/Net Optics - Visibility Architecture Solution Brief
Ixia/Net Optics - Visibility Architecture Solution Brief
 
Light sec for utilities and critical infrastructure white paper
Light sec for utilities and critical infrastructure white paperLight sec for utilities and critical infrastructure white paper
Light sec for utilities and critical infrastructure white paper
 
Overview of Various Industrial Fault Diagnosis Methods
Overview of Various Industrial Fault Diagnosis MethodsOverview of Various Industrial Fault Diagnosis Methods
Overview of Various Industrial Fault Diagnosis Methods
 
Present and desired network management to cope with the expected expansion, n...
Present and desired network management to cope with the expected expansion, n...Present and desired network management to cope with the expected expansion, n...
Present and desired network management to cope with the expected expansion, n...
 
IRJET- Machine Learning based Network Security
IRJET-  	  Machine Learning based Network SecurityIRJET-  	  Machine Learning based Network Security
IRJET- Machine Learning based Network Security
 
Seminar PPT-4.pptx
Seminar PPT-4.pptxSeminar PPT-4.pptx
Seminar PPT-4.pptx
 
Towards internet of things iots integration of wireless sensor network to clo...
Towards internet of things iots integration of wireless sensor network to clo...Towards internet of things iots integration of wireless sensor network to clo...
Towards internet of things iots integration of wireless sensor network to clo...
 
Learning-based Orchestrator for Intelligent Software-defined Networking Contr...
Learning-based Orchestrator for Intelligent Software-defined Networking Contr...Learning-based Orchestrator for Intelligent Software-defined Networking Contr...
Learning-based Orchestrator for Intelligent Software-defined Networking Contr...
 
LEARNING-BASED ORCHESTRATOR FOR INTELLIGENT SOFTWARE-DEFINED NETWORKING CONTR...
LEARNING-BASED ORCHESTRATOR FOR INTELLIGENT SOFTWARE-DEFINED NETWORKING CONTR...LEARNING-BASED ORCHESTRATOR FOR INTELLIGENT SOFTWARE-DEFINED NETWORKING CONTR...
LEARNING-BASED ORCHESTRATOR FOR INTELLIGENT SOFTWARE-DEFINED NETWORKING CONTR...
 
Ncct Ieee Software Abstract Collection Volume 1 50+ Abst
Ncct   Ieee Software Abstract Collection Volume 1   50+ AbstNcct   Ieee Software Abstract Collection Volume 1   50+ Abst
Ncct Ieee Software Abstract Collection Volume 1 50+ Abst
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
 

More from OKOKPROJECTS

More from OKOKPROJECTS (20)

Distributed State Estimation With Deep Neural Networks for Uncertain Nonlinea...
Distributed State Estimation With Deep Neural Networks for Uncertain Nonlinea...Distributed State Estimation With Deep Neural Networks for Uncertain Nonlinea...
Distributed State Estimation With Deep Neural Networks for Uncertain Nonlinea...
 
Distributed Inference in Resource-Constrained IoT for Real-Time Video Surveil...
Distributed Inference in Resource-Constrained IoT for Real-Time Video Surveil...Distributed Inference in Resource-Constrained IoT for Real-Time Video Surveil...
Distributed Inference in Resource-Constrained IoT for Real-Time Video Surveil...
 
DLTIF Deep Learning-Driven Cyber Threat Intelligence Modeling and Identificat...
DLTIF Deep Learning-Driven Cyber Threat Intelligence Modeling and Identificat...DLTIF Deep Learning-Driven Cyber Threat Intelligence Modeling and Identificat...
DLTIF Deep Learning-Driven Cyber Threat Intelligence Modeling and Identificat...
 
DGSSC A Deep Generative Spectral-Spatial Classifier for Imbalanced Hyperspect...
DGSSC A Deep Generative Spectral-Spatial Classifier for Imbalanced Hyperspect...DGSSC A Deep Generative Spectral-Spatial Classifier for Imbalanced Hyperspect...
DGSSC A Deep Generative Spectral-Spatial Classifier for Imbalanced Hyperspect...
 
Digital Restoration of Cultural Heritage With Data-Driven Computing A Survey.pdf
Digital Restoration of Cultural Heritage With Data-Driven Computing A Survey.pdfDigital Restoration of Cultural Heritage With Data-Driven Computing A Survey.pdf
Digital Restoration of Cultural Heritage With Data-Driven Computing A Survey.pdf
 
Dependable Intrusion Detection System for IoT A Deep Transfer Learning Based ...
Dependable Intrusion Detection System for IoT A Deep Transfer Learning Based ...Dependable Intrusion Detection System for IoT A Deep Transfer Learning Based ...
Dependable Intrusion Detection System for IoT A Deep Transfer Learning Based ...
 
DendroMap Visual Exploration of Large-Scale Image Datasets for Machine Learni...
DendroMap Visual Exploration of Large-Scale Image Datasets for Machine Learni...DendroMap Visual Exploration of Large-Scale Image Datasets for Machine Learni...
DendroMap Visual Exploration of Large-Scale Image Datasets for Machine Learni...
 
Dense Nested Attention Network for Infrared Small Target Detection.pdf
Dense Nested Attention Network for Infrared Small Target Detection.pdfDense Nested Attention Network for Infrared Small Target Detection.pdf
Dense Nested Attention Network for Infrared Small Target Detection.pdf
 
Detection of Small Moving Targets in Cluttered Infrared Imagery.pdf
Detection of Small Moving Targets in Cluttered Infrared Imagery.pdfDetection of Small Moving Targets in Cluttered Infrared Imagery.pdf
Detection of Small Moving Targets in Cluttered Infrared Imagery.pdf
 
Depression Screening in Humans With AI and Deep Learning Techniques.pdf
Depression Screening in Humans With AI and Deep Learning Techniques.pdfDepression Screening in Humans With AI and Deep Learning Techniques.pdf
Depression Screening in Humans With AI and Deep Learning Techniques.pdf
 
DeepTx Deep Learning Beamforming With Channel Prediction.pdf
DeepTx Deep Learning Beamforming With Channel Prediction.pdfDeepTx Deep Learning Beamforming With Channel Prediction.pdf
DeepTx Deep Learning Beamforming With Channel Prediction.pdf
 
DeHIN A Decentralized Framework for Embedding Large-Scale Heterogeneous Infor...
DeHIN A Decentralized Framework for Embedding Large-Scale Heterogeneous Infor...DeHIN A Decentralized Framework for Embedding Large-Scale Heterogeneous Infor...
DeHIN A Decentralized Framework for Embedding Large-Scale Heterogeneous Infor...
 
DefQ Defensive Quantization Against Inference Slow-Down Attack for Edge Compu...
DefQ Defensive Quantization Against Inference Slow-Down Attack for Edge Compu...DefQ Defensive Quantization Against Inference Slow-Down Attack for Edge Compu...
DefQ Defensive Quantization Against Inference Slow-Down Attack for Edge Compu...
 
Deep-Learning-Driven Proactive Maintenance Management of IoT-Empowered Smart ...
Deep-Learning-Driven Proactive Maintenance Management of IoT-Empowered Smart ...Deep-Learning-Driven Proactive Maintenance Management of IoT-Empowered Smart ...
Deep-Learning-Driven Proactive Maintenance Management of IoT-Empowered Smart ...
 
Deep-Distributed-Learning-Based POI Recommendation Under Mobile-Edge Networks...
Deep-Distributed-Learning-Based POI Recommendation Under Mobile-Edge Networks...Deep-Distributed-Learning-Based POI Recommendation Under Mobile-Edge Networks...
Deep-Distributed-Learning-Based POI Recommendation Under Mobile-Edge Networks...
 
DeepCog A Trustworthy Deep Learning-Based Human Cognitive Privacy Framework i...
DeepCog A Trustworthy Deep Learning-Based Human Cognitive Privacy Framework i...DeepCog A Trustworthy Deep Learning-Based Human Cognitive Privacy Framework i...
DeepCog A Trustworthy Deep Learning-Based Human Cognitive Privacy Framework i...
 
DeepCrowd A Deep Model for Large-Scale Citywide Crowd Density and Flow Predic...
DeepCrowd A Deep Model for Large-Scale Citywide Crowd Density and Flow Predic...DeepCrowd A Deep Model for Large-Scale Citywide Crowd Density and Flow Predic...
DeepCrowd A Deep Model for Large-Scale Citywide Crowd Density and Flow Predic...
 
D2Net Deep Denoising Network in Frequency Domain for Hyperspectral Image.pdf
D2Net Deep Denoising Network in Frequency Domain for Hyperspectral Image.pdfD2Net Deep Denoising Network in Frequency Domain for Hyperspectral Image.pdf
D2Net Deep Denoising Network in Frequency Domain for Hyperspectral Image.pdf
 
Decentralized Federated Learning for Industrial IoT With Deep Echo State Netw...
Decentralized Federated Learning for Industrial IoT With Deep Echo State Netw...Decentralized Federated Learning for Industrial IoT With Deep Echo State Netw...
Decentralized Federated Learning for Industrial IoT With Deep Echo State Netw...
 
Cyber Code Intelligence for Android Malware Detection.pdf
Cyber Code Intelligence for Android Malware Detection.pdfCyber Code Intelligence for Android Malware Detection.pdf
Cyber Code Intelligence for Android Malware Detection.pdf
 

Recently uploaded

Recently uploaded (20)

Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of TransportBasic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 
How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17
 
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
 
Including Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdfIncluding Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdf
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
ANTI PARKISON DRUGS.pptx
ANTI         PARKISON          DRUGS.pptxANTI         PARKISON          DRUGS.pptx
ANTI PARKISON DRUGS.pptx
 
Book Review of Run For Your Life Powerpoint
Book Review of Run For Your Life PowerpointBook Review of Run For Your Life Powerpoint
Book Review of Run For Your Life Powerpoint
 
Trauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical PrinciplesTrauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical Principles
 
diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....
 
The Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDFThe Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDF
 
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading RoomSternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
 
Improved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio AppImproved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio App
 
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community PartnershipsSpring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
 
Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...
 
e-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopale-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopal
 
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjStl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
 
Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"
 
Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"
 

AI Anomaly Detection for Cloudified Mobile Core Architectures.pdf

  • 1. AI Anomaly Detection for Cloudified Mobile Core Architectures Abstract IT systems monitoring is a crucial process for managing and orchestrating network resources, allowing network providers to rapidly detect and react to most impediment causing network degradation. However, the high growth in size and complexity of current o solutions to process huge amounts of data (including alarms) reliably and swiftly. Further, as the network becomes progressively more virtualized, the hosting of NFV on cloud environments adds a magnitude of possible bottlenecks outside the control of the service owners. In this paper, we propose two deep learning anomaly detection solutions that leverage service exposure and apply it to automate the detection of service degradation and root cause discovery in a cloudi ETSI OSM. A testbed is built to validate these AI models. The testbed collects monitoring data from the OSM monitoring module, which is then exposed to the external AI anomaly detection modules, tuned to identify AI Anomaly Detection for Cloudified Mobile Core Architectures IT systems monitoring is a crucial process for managing and orchestrating network resources, allowing network providers to rapidly detect and react to most impediment causing network degradation. However, the high growth in size and complexity of current operational networks (2022) demands new solutions to process huge amounts of data (including alarms) reliably and swiftly. Further, as the network becomes progressively more virtualized, the hosting of NFV on cloud environments adds a magnitude of possible bottlenecks outside the control of the service owners. In this paper, we propose two deep learning anomaly detection solutions that leverage service exposure and apply it to automate the detection of service degradation and root cause discovery in a cloudified mobile network that is orchestrated by ETSI OSM. A testbed is built to validate these AI models. The testbed collects monitoring data from the OSM monitoring module, which is then exposed to the external AI anomaly detection modules, tuned to identify the anomalies AI Anomaly Detection for Cloudified IT systems monitoring is a crucial process for managing and orchestrating network resources, allowing network providers to rapidly detect and react to most impediment causing network degradation. However, the high growth in perational networks (2022) demands new solutions to process huge amounts of data (including alarms) reliably and swiftly. Further, as the network becomes progressively more virtualized, the hosting of NFV on cloud environments adds a magnitude of possible bottlenecks outside the control of the service owners. In this paper, we propose two deep learning anomaly detection solutions that leverage service exposure and apply it to automate the detection of service degradation and fied mobile network that is orchestrated by ETSI OSM. A testbed is built to validate these AI models. The testbed collects monitoring data from the OSM monitoring module, which is then exposed to the anomalies
  • 2. and the network services causing them. The deep learning solutions are tested using various artificially induced bottlenecks. The AI solutions are shown to correctly detect anomalies and identify the network components involved in the bottlenecks, with certain limitations in a particular type of bottlenecks. A discussion of the right monitoring tools to identify concrete bottlenecks is provided.