2020
DOI: 10.1177/0037549720958480
|View full text |Cite
|
Sign up to set email alerts
|

802.11 wireless simulation and anomaly detection using HMM and UBM

Abstract: Despite the growing popularity of 802.11 wireless networks, users often suffer from connectivity problems and performance issues due to unstable radio conditions and dynamic user behavior, among other reasons. Anomaly detection and distinction are in the thick of major challenges that network managers encounter. The difficulty of monitoring broad and complex Wireless Local Area Networks, that often requires heavy instrumentation of the user devices, makes anomaly detection analysis even harder. In this paper w… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 26 publications
0
2
0
Order By: Relevance
“…In order to evaluate our model in the aforementioned scenario, we have followed the procedure of [20], performing extensive network simulations in a typical Wi-Fi network setup (IEEE 802.11 WLANg 2.4 GHz in infrastructure mode) using OMNeT++ [21] and INET [22] simulators. Our network consists of 10 APs and 100 users accessing it.…”
Section: A Anomaly Detection In Wi-fi Networkmentioning
confidence: 99%
See 1 more Smart Citation
“…In order to evaluate our model in the aforementioned scenario, we have followed the procedure of [20], performing extensive network simulations in a typical Wi-Fi network setup (IEEE 802.11 WLANg 2.4 GHz in infrastructure mode) using OMNeT++ [21] and INET [22] simulators. Our network consists of 10 APs and 100 users accessing it.…”
Section: A Anomaly Detection In Wi-fi Networkmentioning
confidence: 99%
“…Following this idea, the weight G j,k , associated with the edge connecting nodes j and k in graph G, was set to the inverse distance between APs j and k and normalized so that max j,k G j,k " 1. As in [20], sequences were preprocessed by subtracting the mean and dividing by the standard deviation and applying PCA, reducing the number of features to 3. For MHMM, we did 3-fold cross validation of the number of mixture components M and hidden states per component S. We ended up using M " 15 and S " 10.…”
Section: A Anomaly Detection In Wi-fi Networkmentioning
confidence: 99%