SlideShare a Scribd company logo
AI Anomaly Detection for Cloudified
Mobile Core Architectures
Abstract
IT systems monitoring is a crucial process for managing and orchestrating
network resources, allowing network providers to rapidly detect and react to
most impediment causing network degradation. However, the high growth in
size and complexity of current o
solutions to process huge amounts of data (including alarms) reliably and
swiftly. Further, as the network becomes progressively more virtualized, the
hosting of NFV on cloud environments adds a magnitude of possible
bottlenecks outside the control of the service owners. In this paper, we
propose two deep learning anomaly detection solutions that leverage service
exposure and apply it to automate the detection of service degradation and
root cause discovery in a cloudi
ETSI OSM. A testbed is built to validate these AI models. The testbed collects
monitoring data from the OSM monitoring module, which is then exposed to
the external AI anomaly detection modules, tuned to identify
AI Anomaly Detection for Cloudified
Mobile Core Architectures
IT systems monitoring is a crucial process for managing and orchestrating
network resources, allowing network providers to rapidly detect and react to
most impediment causing network degradation. However, the high growth in
size and complexity of current operational networks (2022) demands new
solutions to process huge amounts of data (including alarms) reliably and
swiftly. Further, as the network becomes progressively more virtualized, the
hosting of NFV on cloud environments adds a magnitude of possible
bottlenecks outside the control of the service owners. In this paper, we
propose two deep learning anomaly detection solutions that leverage service
exposure and apply it to automate the detection of service degradation and
root cause discovery in a cloudified mobile network that is orchestrated by
ETSI OSM. A testbed is built to validate these AI models. The testbed collects
monitoring data from the OSM monitoring module, which is then exposed to
the external AI anomaly detection modules, tuned to identify the anomalies
AI Anomaly Detection for Cloudified
IT systems monitoring is a crucial process for managing and orchestrating
network resources, allowing network providers to rapidly detect and react to
most impediment causing network degradation. However, the high growth in
perational networks (2022) demands new
solutions to process huge amounts of data (including alarms) reliably and
swiftly. Further, as the network becomes progressively more virtualized, the
hosting of NFV on cloud environments adds a magnitude of possible
bottlenecks outside the control of the service owners. In this paper, we
propose two deep learning anomaly detection solutions that leverage service
exposure and apply it to automate the detection of service degradation and
fied mobile network that is orchestrated by
ETSI OSM. A testbed is built to validate these AI models. The testbed collects
monitoring data from the OSM monitoring module, which is then exposed to
the anomalies
and the network services causing them. The deep learning solutions are
tested using various artificially induced bottlenecks. The AI solutions are
shown to correctly detect anomalies and identify the network components
involved in the bottlenecks, with certain limitations in a particular type of
bottlenecks. A discussion of the right monitoring tools to identify concrete
bottlenecks is provided.

More Related Content

DOCX
Ieee transactions on 2018 network and service management
PDF
Cao nicolau-mc dermott-learning-neural-cybernetics-2018-preprint
DOCX
AI-NOC Transforming Network Monitoring with Cutting-Edge AI Technology.docx
PDF
Parallel and distributed system projects for java and dot net
PDF
Secure Data Aggregation Of Wireless Sensor Networks
PDF
PacketsNeverLie
DOCX
Empowering IT Teams with AI-NOC's Advanced Network Insights
PDF
IRJET- An Overview of Slum Rehabilitation by IN-SITU Technique
Ieee transactions on 2018 network and service management
Cao nicolau-mc dermott-learning-neural-cybernetics-2018-preprint
AI-NOC Transforming Network Monitoring with Cutting-Edge AI Technology.docx
Parallel and distributed system projects for java and dot net
Secure Data Aggregation Of Wireless Sensor Networks
PacketsNeverLie
Empowering IT Teams with AI-NOC's Advanced Network Insights
IRJET- An Overview of Slum Rehabilitation by IN-SITU Technique

Similar to AI Anomaly Detection for Cloudified Mobile Core Architectures.pdf (20)

PDF
IRJET- Integrating Wireless Sensor Networks with Cloud Computing and Emerging...
PDF
A Scalable Network Monitoring and Bandwidth Throttling System for Cloud Compu...
DOCX
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...
DOCX
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A system-for-denial-of-service...
PDF
Ijsrdv9 i20118
PDF
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
PDF
IoT.pdf
PDF
internet architecture.pdf
DOCX
Experience Next Level NOC Support with AI NOC’s AI_Powered Services
PDF
L010527175
PDF
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
PDF
Ixia/Net Optics - Visibility Architecture Solution Brief
DOCX
Boost Network Reliability and Security with AI.docx
PDF
Light sec for utilities and critical infrastructure white paper
PDF
Overview of Various Industrial Fault Diagnosis Methods
PDF
Present and desired network management to cope with the expected expansion, n...
PDF
IRJET- Machine Learning based Network Security
PPTX
Seminar PPT-4.pptx
DOCX
AI-NOC Empowering Organizations with Real-Time Network Monitoring and Support
PDF
Towards internet of things iots integration of wireless sensor network to clo...
IRJET- Integrating Wireless Sensor Networks with Cloud Computing and Emerging...
A Scalable Network Monitoring and Bandwidth Throttling System for Cloud Compu...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A system-for-denial-of-service...
Ijsrdv9 i20118
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
IoT.pdf
internet architecture.pdf
Experience Next Level NOC Support with AI NOC’s AI_Powered Services
L010527175
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
Ixia/Net Optics - Visibility Architecture Solution Brief
Boost Network Reliability and Security with AI.docx
Light sec for utilities and critical infrastructure white paper
Overview of Various Industrial Fault Diagnosis Methods
Present and desired network management to cope with the expected expansion, n...
IRJET- Machine Learning based Network Security
Seminar PPT-4.pptx
AI-NOC Empowering Organizations with Real-Time Network Monitoring and Support
Towards internet of things iots integration of wireless sensor network to clo...

More from OKOKPROJECTS (20)

PDF
Distributed State Estimation With Deep Neural Networks for Uncertain Nonlinea...
PDF
Distributed Inference in Resource-Constrained IoT for Real-Time Video Surveil...
PDF
DLTIF Deep Learning-Driven Cyber Threat Intelligence Modeling and Identificat...
PDF
DGSSC A Deep Generative Spectral-Spatial Classifier for Imbalanced Hyperspect...
PDF
Digital Restoration of Cultural Heritage With Data-Driven Computing A Survey.pdf
PDF
Dependable Intrusion Detection System for IoT A Deep Transfer Learning Based ...
PDF
DendroMap Visual Exploration of Large-Scale Image Datasets for Machine Learni...
PDF
Dense Nested Attention Network for Infrared Small Target Detection.pdf
PDF
Detection of Small Moving Targets in Cluttered Infrared Imagery.pdf
PDF
Depression Screening in Humans With AI and Deep Learning Techniques.pdf
PDF
DeepTx Deep Learning Beamforming With Channel Prediction.pdf
PDF
DeHIN A Decentralized Framework for Embedding Large-Scale Heterogeneous Infor...
PDF
DefQ Defensive Quantization Against Inference Slow-Down Attack for Edge Compu...
PDF
Deep-Learning-Driven Proactive Maintenance Management of IoT-Empowered Smart ...
PDF
Deep-Distributed-Learning-Based POI Recommendation Under Mobile-Edge Networks...
PDF
DeepCog A Trustworthy Deep Learning-Based Human Cognitive Privacy Framework i...
PDF
DeepCrowd A Deep Model for Large-Scale Citywide Crowd Density and Flow Predic...
PDF
D2Net Deep Denoising Network in Frequency Domain for Hyperspectral Image.pdf
PDF
Decentralized Federated Learning for Industrial IoT With Deep Echo State Netw...
PDF
Cyber Code Intelligence for Android Malware Detection.pdf
Distributed State Estimation With Deep Neural Networks for Uncertain Nonlinea...
Distributed Inference in Resource-Constrained IoT for Real-Time Video Surveil...
DLTIF Deep Learning-Driven Cyber Threat Intelligence Modeling and Identificat...
DGSSC A Deep Generative Spectral-Spatial Classifier for Imbalanced Hyperspect...
Digital Restoration of Cultural Heritage With Data-Driven Computing A Survey.pdf
Dependable Intrusion Detection System for IoT A Deep Transfer Learning Based ...
DendroMap Visual Exploration of Large-Scale Image Datasets for Machine Learni...
Dense Nested Attention Network for Infrared Small Target Detection.pdf
Detection of Small Moving Targets in Cluttered Infrared Imagery.pdf
Depression Screening in Humans With AI and Deep Learning Techniques.pdf
DeepTx Deep Learning Beamforming With Channel Prediction.pdf
DeHIN A Decentralized Framework for Embedding Large-Scale Heterogeneous Infor...
DefQ Defensive Quantization Against Inference Slow-Down Attack for Edge Compu...
Deep-Learning-Driven Proactive Maintenance Management of IoT-Empowered Smart ...
Deep-Distributed-Learning-Based POI Recommendation Under Mobile-Edge Networks...
DeepCog A Trustworthy Deep Learning-Based Human Cognitive Privacy Framework i...
DeepCrowd A Deep Model for Large-Scale Citywide Crowd Density and Flow Predic...
D2Net Deep Denoising Network in Frequency Domain for Hyperspectral Image.pdf
Decentralized Federated Learning for Industrial IoT With Deep Echo State Netw...
Cyber Code Intelligence for Android Malware Detection.pdf

Recently uploaded (20)

PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PPTX
Pharma ospi slides which help in ospi learning
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
TR - Agricultural Crops Production NC III.pdf
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PPTX
GDM (1) (1).pptx small presentation for students
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PPTX
master seminar digital applications in india
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Pharma ospi slides which help in ospi learning
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
VCE English Exam - Section C Student Revision Booklet
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
TR - Agricultural Crops Production NC III.pdf
Microbial disease of the cardiovascular and lymphatic systems
Abdominal Access Techniques with Prof. Dr. R K Mishra
O5-L3 Freight Transport Ops (International) V1.pdf
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
Supply Chain Operations Speaking Notes -ICLT Program
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
Pharmacology of Heart Failure /Pharmacotherapy of CHF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
GDM (1) (1).pptx small presentation for students
Renaissance Architecture: A Journey from Faith to Humanism
STATICS OF THE RIGID BODIES Hibbelers.pdf
master seminar digital applications in india

AI Anomaly Detection for Cloudified Mobile Core Architectures.pdf

  • 1. AI Anomaly Detection for Cloudified Mobile Core Architectures Abstract IT systems monitoring is a crucial process for managing and orchestrating network resources, allowing network providers to rapidly detect and react to most impediment causing network degradation. However, the high growth in size and complexity of current o solutions to process huge amounts of data (including alarms) reliably and swiftly. Further, as the network becomes progressively more virtualized, the hosting of NFV on cloud environments adds a magnitude of possible bottlenecks outside the control of the service owners. In this paper, we propose two deep learning anomaly detection solutions that leverage service exposure and apply it to automate the detection of service degradation and root cause discovery in a cloudi ETSI OSM. A testbed is built to validate these AI models. The testbed collects monitoring data from the OSM monitoring module, which is then exposed to the external AI anomaly detection modules, tuned to identify AI Anomaly Detection for Cloudified Mobile Core Architectures IT systems monitoring is a crucial process for managing and orchestrating network resources, allowing network providers to rapidly detect and react to most impediment causing network degradation. However, the high growth in size and complexity of current operational networks (2022) demands new solutions to process huge amounts of data (including alarms) reliably and swiftly. Further, as the network becomes progressively more virtualized, the hosting of NFV on cloud environments adds a magnitude of possible bottlenecks outside the control of the service owners. In this paper, we propose two deep learning anomaly detection solutions that leverage service exposure and apply it to automate the detection of service degradation and root cause discovery in a cloudified mobile network that is orchestrated by ETSI OSM. A testbed is built to validate these AI models. The testbed collects monitoring data from the OSM monitoring module, which is then exposed to the external AI anomaly detection modules, tuned to identify the anomalies AI Anomaly Detection for Cloudified IT systems monitoring is a crucial process for managing and orchestrating network resources, allowing network providers to rapidly detect and react to most impediment causing network degradation. However, the high growth in perational networks (2022) demands new solutions to process huge amounts of data (including alarms) reliably and swiftly. Further, as the network becomes progressively more virtualized, the hosting of NFV on cloud environments adds a magnitude of possible bottlenecks outside the control of the service owners. In this paper, we propose two deep learning anomaly detection solutions that leverage service exposure and apply it to automate the detection of service degradation and fied mobile network that is orchestrated by ETSI OSM. A testbed is built to validate these AI models. The testbed collects monitoring data from the OSM monitoring module, which is then exposed to the anomalies
  • 2. and the network services causing them. The deep learning solutions are tested using various artificially induced bottlenecks. The AI solutions are shown to correctly detect anomalies and identify the network components involved in the bottlenecks, with certain limitations in a particular type of bottlenecks. A discussion of the right monitoring tools to identify concrete bottlenecks is provided.