2019
DOI: 10.1109/lcomm.2019.2923913
|View full text |Cite
|
Sign up to set email alerts
|

Cooperative Anomaly Detection With Transfer Learning-Based Hidden Markov Model in Virtualized Network Slicing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2020
2020
2025
2025

Publication Types

Select...
9

Relationship

1
8

Authors

Journals

citations
Cited by 17 publications
(8 citation statements)
references
References 10 publications
0
8
0
Order By: Relevance
“…Furthermore, the presence of an anomaly physical node in a network may result in the degradation of a network slice's performance while exposing sensitive data to intruders/attackers. As a solution, a cooperative anomaly detection mechanism using a hybrid hidden Markov-transfer learning model is presented in [138]. Table VI highlights AI/ML-based security solutions for network slicing.…”
Section: Security Solutions and Servicesmentioning
confidence: 99%
“…Furthermore, the presence of an anomaly physical node in a network may result in the degradation of a network slice's performance while exposing sensitive data to intruders/attackers. As a solution, a cooperative anomaly detection mechanism using a hybrid hidden Markov-transfer learning model is presented in [138]. Table VI highlights AI/ML-based security solutions for network slicing.…”
Section: Security Solutions and Servicesmentioning
confidence: 99%
“…For instance, time series anomaly detection (Wen and Keyes 2019), detecting dangerous aircraft test flight actions (Xiong et al 2018), hyperspectral image anomaly detection (Li, Wu, and Du 2017), or video anomaly detection (Bansod and Nandedkar 2019;Liu et al 2020). Some authors focus on instance-transfer for anomaly detection Davis 2017, 2020), others on feature-based transfer (Kumagai, Iwata, and Fujiwara 2019;Yamaguchi, Koizumi, and Harada 2019), or model-based transfer (Wang et al 2019;Idé, Phan, and Kalagnanam 2017;Du et al 2013). The goal is almost always to improve a target model using source domain label information, i.e., deriving better estimates for the anomaly scores.…”
Section: Related Workmentioning
confidence: 99%
“…Authors in [16] proposed using TL in HMM for capturing anomalous states of nodes at the physical substrate in a network slicing scenarios, based on observations from the virtual nodes. The BW algorithm, was modified to transfer knowledge between two physical nodes.…”
Section: Related Workmentioning
confidence: 99%
“…One intuitive approach would be to transfer more knowledge when the source is closely related to the target, and transfer less knowledge otherwise. To this end, the authors in [16] propose using a rate, ζ = 1/t, inversely to the time instance, t, where t corresponds to a parameter learning iteration. Thus, a modified λ new can be obtained using:…”
Section: Knowledge Exchange Casesmentioning
confidence: 99%