Skip to main content

Real Anomaly Detection in Telecommunication Multidimensional Data Using Data Mining Techniques

  • Conference paper
Computational Collective Intelligence. Technologies and Applications (ICCCI 2010)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 6421))

Included in the following conference series:

  • 1255 Accesses

Abstract

The tremendous amount of data are generated and collected by telecommunication companies. These data include call detail data which describe the calls traversing the telecommunication networks as well as network and customer data which mainly describe incomes of telecommunication companies. The amount of data is so huge that manual analysis of these data is impossible. The need to automatically handle such large volumes of data has led to the development of special algorithms and technologies such as data mining, intelligent computer agents, knowledge-based expert systems, etc. Telecommunication companies are strongly interested not only in identifying fraudulent phone calls and identifying network faults but also in forecasting the preferred directions of customer calls or the incomes of the companies. The paper presents a communication real anomaly detection framework, which uses data mining technologies using OLAP cube built for telecommunication data.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Sumathi, S., Sivanandam, S.N.: Introduction to Data Mining and its Applications. In: Part 24. Data Mining in Telecommunications and Control. Studies in Computational Intelligence (SCI), vol. 29, pp. 615–627 (2006)

    Google Scholar 

  2. Weiss G.M.: Data Mining in Telecommunications. In: Maimon, O., Rokach, L.: Data Mining and Knowledge Discovery Handbook, ch. 56, pp. 1189–1201. Springer, US (2005)

    Google Scholar 

  3. Sumathi, S.: Data mining and data warehousing. In: Sumathi, S., Esakkirajan, S. (eds.) Fundamentals of Relational Database Management Systems. Studies in Computational Intelligence (SCI), vol. 47, pp. 415–475 (2007)

    Google Scholar 

  4. Berry, M.J.A., Linoff, G.S.: Data Mining Techniques: For Marketing, Sales, and Customer Relationship Management, 2nd edn. John Wiley & Sons, Chichester (2004)

    Google Scholar 

  5. Berry, M.W., Castellanos, M. (eds.): Survey of Text Mining II. Clustering, Classification, and Retrieval. Springer, Heidelberg (2007)

    Google Scholar 

  6. Alba, E., Talbi, E., Zomaya, A.Y.: Nature-inspired distributed computing. Computer Communications 30, 653–655 (2007)

    Article  Google Scholar 

  7. Rocha-Mier, L.E., Sheremetov, L., Batyrshin, I.: Intelligent agents for real time data mining in telecommunications networks. In: Gorodetsky, V., Zhang, C., Skormin, V.A., Cao, L. (eds.) AIS-ADM 2007. LNCS (LNAI), vol. 4476, pp. 138–152. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  8. Kordon, A.K.: Applying Computational Intelligence. In: How to Create Value. Part 6. Swarm Intelligence: The Benefits of Swarms, pp. 145–174. Springer, Berlin (2010)

    Google Scholar 

  9. Patcha, A., Park, J.-M.: An overview of anomaly detection techniques: Existing solutions and latest technological trends. Computer Networks 51, 3448–3470 (2007)

    Article  Google Scholar 

  10. Zhang, W., Yang, Q., Geng, Y.: A survey of anomaly detection methods in networks. In: International Symposium on Computer Network and Multimedia Technology, pp. 1–3 (2009)

    Google Scholar 

  11. Wang, X.-F., Zhou, J.-L., Yu, S.-S., Cai, L.-Z.: Data mining methods for anomaly detection of HTTP request exploitations. In: Wang, L., Jin, Y. (eds.) FSKD 2005. LNCS (LNAI), vol. 3614, pp. 320–323. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  12. Kumpulainen, P., Hätönen, K.: Local anomaly detection for mobile network monitoring. Information Sciences 178, 3840–3859 (2008)

    Article  Google Scholar 

  13. Lazarevic, A., Srivastava, N., Tiwari, A., Isom, J., Oza, N., Srivastava, J.: Theoretically optimal distributed anomaly detection. In: IEEE International Conference on Data Mining Workshops, pp. 515–520 (2009)

    Google Scholar 

  14. Rabatel, J., Bringay, S., Poncelet, P.: SO_MAD: SensOr Mining for Anomaly Detection in railway data. In: Perner, P. (ed.) Advances in Data Mining. Applications and Theoretical Aspects. Lecture Notes in Computer Science, LNAI, vol. 5633, pp. 191–205. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  15. Wrembel, R., Koncilia, C. (eds.): Data Warehouses and OLAP: Concepts, Architectures, and Solutions. Idea Group Inc., Hershey (2007)

    Google Scholar 

  16. O’Brien, J.A., Marakas, G.M.: Management Information Systems, 9th edn. McGraw-Hill/Irwin, Boston (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Choroś, K. (2010). Real Anomaly Detection in Telecommunication Multidimensional Data Using Data Mining Techniques. In: Pan, JS., Chen, SM., Nguyen, N.T. (eds) Computational Collective Intelligence. Technologies and Applications. ICCCI 2010. Lecture Notes in Computer Science(), vol 6421. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16693-8_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-16693-8_2

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-16692-1

  • Online ISBN: 978-3-642-16693-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics