Reactive protocols for unified user profiling for anomaly detection in mobile Ad Hoc networks

Nariman Jabbar Qasim, Saja Majeed Mohammed, Ali Sami Sosa, Israa Albarazanchi

Abstract


The Next Generation mobile network expected to be fully automated to meet the growing need for data rates and quality in communication. These prodigious demands have also increased the amount of data being handled in these wireless networks. The cellular networks can leverage vital data about the user and the network conditions providing all-inclusive visibility and intelligence in communication. Emerging analytic technologies such as big data and neural networks have been used to unearth vital insight from network traffic to assist intelligent models in routing packets. Reactive protocols are an emerging model in the intelligent routing of traffic in ad-hoc networks. In this paper, we first utilize the reactive protocols to route traffic in a wireless network while analyzing anomalous behavior. In the case of anomaly detection in wireless communication, combined performance indicators to identify outliers. The detected outliers been compared with the ground data and routes created using the reactive protocols. The combination of reactive protocols and the key performance indicators in network performance uncovered anomalies leading to segregation of these traffic in routing. From the results, it is evident that an abrupt surge in the traffic indicated an anomaly and identify the areas of interest in a network especially for resource and path allocation and fault avoidance. A MATLAB GUI was used to simulate the reactive protocols for routing of traffic and generation of data sets that analyze in Microsoft Excel to characterize the key performance indicators of the network.

Keywords


First keyword User profiling Anomaly detection KPI Cellular communication Traffic MANET

Full Text:

PDF

References


M. S. Parwez, D. B. Rawat and M. Garuba, "Big data analytics for user-activity analysis and user-anomaly detection in mobile wireless network," IEEE Transactions on Industrial Informatics, vol. 13, no. 4, pp. 2058-2065, 2017.

P. N. Reddy, C. Vishnuvardhan and V. Ramesh, "An Overview on Reactive Protocols for Mobile Ad-Hoc Networks," International Journal of Computer Science and Mobile Computing, vol. 2, no. 5, pp. 368-375, 2013.

M. Wang and S. Handurukande, "Anomaly Detection for Mobile Network Management," International Journal of Next-Generation Computing, vol. 9, no. 2, pp. 81-97, 2018.

L. Bodrog, M. Kaj´o, S. Kocsis and B. Schultz, "Robust Algorithm for Anomaly Detection in Mobile Networks," in 6th International Workshop on Self-Organizing Networks, Budapest, Hungary, 2016.

R. B¨uschkes, D. Kesdogan and P. Reichl, "How to Increase Security in Mobile Networks by Anomaly Detection," in Proceedings 14th Annual Computer Security Applications Conference, Aachen, Germany, 1998.

M. H. Kamarudin, C. Maple, T. Watson, and N. S. Safa, "A New Unified Intrusion Anomaly Detection in Identifying Unseen Web Attacks," Security and Communication Networks, no. 2539034, pp. 1-18, 2017.

R. Kaur and S. Singh, "A survey of data mining and social network analysis based anomaly detection techniques," Egyptian Informatics Journal, vol. 17, p. 199–216, 2016.

A. H. Lashkari, M. Chen and A. A. Ghorbani, "A Survey on User Profiling Model for Anomaly Detection in Cyberspace," Journal of Cyber Security and Mobility, vol. 8, no. 1, p. 75–112, 2018.

S. Kalwar, "Introduction to reactive protocol," IEEE Potentials, vol. 29, no. 2, pp. 34-35, 2010.

P. Grant and H. Ashman, "Anomaly detection over user profiles," in Proceedings of the 8th Australian Information Security Management Conference, Adelaide, Australia, 2010.

M. Grčar, D. Mladenič, and M. Grobelnik, "User Profiling for Interest-focused Browsing History," in Proceedings of the Workshop on End User Aspects of the Semantic Web, Ljubljana, Slovenia, 2005.

A. Ortigosa, R. M. Carro and J. I. Quiroga, "Predicting user personality by mining social interactions in Facebook," Journal of Computer and System Sciences, vol. 80, no. 1, pp. 57-71, 2014.

M. Corney, G. Mohay and A. Clark, "Detection of Anomalies from User Profiles Generated from System," in Proceedings of the Ninth Australasian Information Security Conference, Perth, Australia, 2011.

X. Luo, X. Di, X. Liu, H. Qi, J. Li, L. Cong, and H. Yang, "Anomaly Detection for Application Layer User Browsing Behavior Based on Attributes and Features," Journal of Physics: Conference Series, vol. 1069, no. 1, p. 012072, 2018.

Abdulshaheed, H.R., Binti, S.A., and Sadiq, I.I., 2018. Proposed a Smart Solutions Based-on Cloud Computing and Wireless Sensing. International Journal of Pure and Applied Mathematics, 119 (18), pp.427–449.

Barazanchi, I. Al, Shibghatullah, A.S., and Selamat, S.R., 2017. A New Routing Protocols for Reducing Path Loss in Wireless Body Area Network ( WBAN ). Journal of Telecommunication, Electronic and Computer Engineering model, 9 (1), pp.1–5.

Abdulshaheed, H.R., Binti, S.A., and Sadiq, I.I., 2018. A Review on Smart Solutions Based-On Cloud Computing and Wireless Sensing. International Journal of Pure and Applied Mathematics, 119 (18), pp.461–486.

B. Durakovic, “Thermal Performances of Glazed Energy Storage Systems with Various Storage Materials: An Experimental study”, Sustainable Cities and Society, vol. 45, pp. 422-430, 2019.

B. Durakovic, “Design for Additive Manufacturing: Benefits, Trends and Challenges”, Periodicals of Engineering and Natural Sciences (PEN), vol. 6, pp. 179–191, 2018.

B. Durakovic, Demir, R., Abat, K., and Emek, C., “Lean Manufacturing: Trends and Implementation Issues”, Periodical of Engineering and Natural Sciences, vol. 6, no. 1, pp. 130-143 , 2018.

B. Durakovic, "Design of Experiments Application, Concepts, Examples: State of the Art," Periodicals of Engineering and Natural Scinces, vol. 5, no. 3, p. 421‒439, 2017.




DOI: http://dx.doi.org/10.21533/pen.v7i2.497

Refbacks

  • There are currently no refbacks.


Copyright (c) 2019 Nariman Jabbar Qasim, Saja Majeed Mohammed, Ali Sami Sosa, Israa Albarazanchi

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.

ISSN: 2303-4521

Digital Object Identifier DOI: 10.21533/pen

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License