Towards the Identification of Context in 5G Infrastructures | SpringerLink
Skip to main content

Towards the Identification of Context in 5G Infrastructures

  • Conference paper
  • First Online:
Intelligent Computing (CompCom 2019)

Abstract

The evolution of communication networks, bringing the fifth generation (5G) of mobile communications in the foreground, gives the vertical industries opportunities that were not possible until now. Flexible network and computing infrastructure management can be achieved, hence bringing more freedom to the service providers, to maximize the performance of their computing resources. Still, challenges regarding the orchestration of these resources may arise. For this reason, an engine that can recognize possible factors that might affect the use of these resources and come up with solutions when needed in real-time, is required. In this paper, we present a novel Complex Event Processing engine that is enriched with Machine Learning capabilities in order to be fully adaptive to its environment, as a solution for monitoring application components deployed in 5G infrastructures. The proposed engine utilizes Incremental DBSCAN to identify the normal behavior of the deployed services and adjust the rules accordingly.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
JPY 22879
Price includes VAT (Japan)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
JPY 28599
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Suriano, D.: The Future of Networking Is 5G: Businesses Must Prepare Now, 23 September 2018. https://www.forbes.com/sites/oracle/2018/09/24/the-future-of-networking-is-5g-businesses-must-prepare-now

  2. Soldani, D., Manzalini, A.: A 5G infrastructure for “anything-as-a-service”. J. Telecommun. Syst. Manag. 3(2), 1 (2014)

    Google Scholar 

  3. Moyse, I.: 5 Reasons for a Multi-Cloud Infrastructure—Dyn Blog (n.d.). https://dyn.com/blog/5-reasons-for-a-multi-cloud-infrastructure/

  4. Uittenbogaard, T.: What are the advantages of a multi-site/multi-domain solution and who’s to benefit from it? (2015). https://oneshoe.com/news/what-are-advantages-multi-sitemulti-domain-solution-and-whos-benefit-it

  5. Hume, A.C., Al-Hazmi, Y., Belter, B., Campowsky, K., Carril, L. M., Carrozzo, G., Engen, V., Garcia-Perez, D., Ponsati, J.J., Kubert, R., Rohr, C., van Seghbroeck, G., Liang, Y.: Bonfire: a multi-cloud test facility for internet of services experimentation. In: International Conference on Testbeds and Research Infrastructures, pp. 81–96. Springer, Heidelberg (2012)

    Google Scholar 

  6. Schilit, B., Adams N., Want R.: Context-aware computing applications. In: Workshop on Mobile Computing Systems and Applications, pp. 85–90. IEEE, Santa Cruz (1994)

    Google Scholar 

  7. Baldin, I., Chase, J., Xin, Y., Mandal, A., Ruth, P., Castillo, C., Orlikowski, V., Heermann, C., Mills, J.: ExoGENI: a multi-domain infrastructure-as-a-service testbed. In: The GENI Book, pp. 279–315. Springer, Cham (2016)

    Chapter  Google Scholar 

  8. Perera, S., Sriskandarajah, S., Vivekanandalingam, M., Fremantle, P., Weerawarana, S.: Solving the grand challenge using an opensource CEP engine. In: Proceedings of the 8th ACM International Conference on Distributed Event-Based Systems, pp. 288–293. ACM, May 2014

    Google Scholar 

  9. WSO2 Complex Event Processor. https://wso2.com/products/complex-event-processor

  10. Luckham, D.: The Power of Events, vol. 204. Addison-Wesley, Reading (2002)

    Google Scholar 

  11. Garcia, J.: A complex event processing system for monitoring manufacturing systems. Tampere University of Technology (2012). https://dspace.cc.tut.fi/dpub/bitstream/handle/123456789/20958/garcia_izaguirre.pdf

  12. Drools Fusion 6.2.0 documentation. https://docs.jboss.org/drools/release/6.2.0.CR3/drools-docs/html/

  13. Fulop, L.J., Toth, G., Rcz, R., Panczel, J., Gergely, T., Beszedes, A., Farkas, L.: Survey on complex event processing and predictive analytics. In: Proceedings of the Fifth Balkan Conference in Informatics, pp. 26–31, July 2010

    Google Scholar 

  14. Saboor, M., Rengasamy, R.: Designing and developing complex event processing applications. Sapient Global Markets (2013)

    Google Scholar 

  15. Carney, D., Cetintemel, U., Cherniack, M., Convey, C., Lee, S., Seidman, G., Stonebraker, M., Tatbul, N., Zdonik, S.: Monitoring streams: a new class of data management applications. In: Proceedings of the 28th International Conference on Very Large Data Bases, pp. 215–226. VLDB Endowment, August 2002

    Chapter  Google Scholar 

  16. Diao, Y., Immerman, N., Gyllstrom, D.: SASE+: an agile language for kleene closure over event streams. UMass Technical Report (2007)

    Google Scholar 

  17. Bhargavi, R., Pathak, R., Vaidehi, V.: Dynamic complex event processing—adaptive rule engine. In: 2013 International Conference on Recent Trends in Information Technology (ICRTIT), pp. 189–194. IEEE, July 2013

    Google Scholar 

  18. Brenna, L., Gehrke, J., Hong, M., Johansen, D.: Distributed event stream processing with non-deterministic finite automata. In: Proceedings of the Third ACM International Conference on Distributed Event-Based Systems, p. 3. ACM, July 2009

    Google Scholar 

  19. Suhothayan, S., Gajasinghe, K., Loku Narangoda, I., Chaturanga, S., Perera, S., Nanayakkara, V.: Siddhi: a second look at complex event processing architectures. In: Proceedings of the 2011 ACM Workshop on Gateway Computing Environments, pp. 43–50. ACM, November 2011

    Google Scholar 

  20. ETES Intelligence - Esper and NEsper: Where Complex Event Processing meets Open Source. Esper & NEsper, 2, 2006-2013 (2006)

    Google Scholar 

  21. Petersen, E., To, M.A., Maag, S.: An online learning based approach for CEP rule generation. In: 2016 8th IEEE Latin-American Conference on Communications (LATINCOM), pp. 1–6. IEEE, November 2016

    Google Scholar 

  22. Endler, M., Briot, J.P., e Silva, F.S., de Almeida, V.P., Haeusler, E.H.: Towards stream-based reasoning and machine learning for IoT applications. In: Intelligent Systems Conference (IntelliSys), pp. 202–209. IEEE, September 2017

    Google Scholar 

  23. Deljac, Z., Randic, M., Krcelic, G.: Early detection of network element outages based on customer trouble calls. Decis. Support Syst. 73, 57–73 (2015)

    Article  Google Scholar 

  24. Ahmed, M., Mahmood, A.N., Hu, J.: A survey of network anomaly detection techniques. J. Netw. Comput. Appl. 60, 19–31 (2016)

    Article  Google Scholar 

  25. Ahmed, M., Mahmood, A.N.: A novel approach for outlier detection and clustering improvement. In: 2013 8th IEEE conference on Industrial electronics and applications (ICIEA), pp. 577–582. IEEE, June 2013

    Google Scholar 

  26. Ester, M., Kriegel, H. P., Sander, J., Xu, X.: A density-based algorithm for discovering clusters in large spatial databases with noise. In: KDD, vol. 96, no. 34, pp. 226–231, August 1996

    Google Scholar 

  27. Thottan, M., Ji, C.: Anomaly detection in IP networks. IEEE Trans. Signal Process. 51(8), 2191–2204 (2003)

    Article  Google Scholar 

  28. Shyu, M.L., Chen, S.C., Sarinnapakorn, K., Chang, L.: A novel anomaly detection scheme based on principal component classifier. Department of Electrical and Computer Engineering, Miami University Coral Gables, FL (2003)

    Google Scholar 

  29. Yang, Y., McLaughlin, K., Littler, T., Sezer, S., Wang, H.F.: Rule-based intrusion detection system for SCADA networks (2013)

    Google Scholar 

  30. Poojitha, G., Kumar, K.N., Reddy, P.J.: Intrusion detection using artificial neural network. In: 2010 International Conference on Computing Communication and Networking Technologies (ICCCNT), pp. 1–7. IEEE, July 2010

    Google Scholar 

  31. Balabine, I., Velednitsky, A.: U.S. Patent No. 9,843,488. U.S. Patent and Trademark Office Washington, DC (2017)

    Google Scholar 

  32. Dijkman, R., Peters, S., ter Hofstede, A.: A toolkit for streaming process data analysis. In: 2016 IEEE 20th International Enterprise Distributed Object Computing Workshop (EDOCW), pp. 1–9. IEEE, September 2016

    Google Scholar 

  33. Gaunitz, B., Roth, M., Franczyk, B.: Dynamic and scalable real-time analytics in logistics combining Apache Storm with complex event processing for enabling new business models in logistics. In: 2015 International Conference on Evaluation of Novel Approaches to Software Engineering (ENASE), pp. 289–294. IEEE, April 2015

    Google Scholar 

  34. Bansod, R., Kadarkar, S., Virk, R., Raval, M., Rashinkar, R., Nambiar, M.: High performance distributed in-memory architectures for trade surveillance system. In: 2018 17th International Symposium on Parallel and Distributed Computing (ISPDC), pp. 101–108. IEEE, June 2018

    Google Scholar 

  35. Liu, G., Zhu, W., Saunders, C., Gao, F., Yu, Y.: Real-time complex event processing and analytics for smart grid. Proc. Comput. Sci. 61, 113–119 (2015)

    Article  Google Scholar 

  36. Chakraborty, S., Nagwani, N.K.: Analysis and study of Incremental DBSCAN clustering algorithm. arXiv preprint arXiv:1406.4754 (2014)

  37. Cao, J., Wei, X., Liu, Y.Q., Mao, D., Cai, Q.: LogCEP-Complex event processing based on pushdown automaton. Int. J. Hybrid Inform. Technol. 7(6), 71–82 (2014)

    Article  Google Scholar 

  38. Koch, G. G., Koldehofe, B., Rothermel, K.: Cordies: expressive event correlation in distributed systems. In: Proceedings of the Fourth ACM International Conference on Distributed Event-Based Systems, pp. 26–37. ACM, July 2010

    Google Scholar 

  39. NetData. https://my-netdata.io/

  40. Prometheus monitoring system. https://prometheus.io/

  41. Consul by HashiCorp. https://consul.io/

  42. Apache Kafka. https://apache.kafka.org/

  43. Apache Spark: Lightning-fast cluster computing. http://spark.apache.org

  44. Marz, N.: Storm: distributed and fault-tolerant realtime computation (2013). https://www.infoq.com/presentations/Storm-Introduction. Accessed 21 Oct 2011

  45. Flink, A.: Scalable batch and stream data processing (2016). https://flink.apache.org

Download references

Acknowledgment

This work has received funding from the European Unions Horizon 2020 research and innovation program under grant agreement No 761898 project MATILDA.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chrysostomos Symvoulidis .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Symvoulidis, C., Tsoumas, I., Kyriazis, D. (2019). Towards the Identification of Context in 5G Infrastructures. In: Arai, K., Bhatia, R., Kapoor, S. (eds) Intelligent Computing. CompCom 2019. Advances in Intelligent Systems and Computing, vol 998. Springer, Cham. https://doi.org/10.1007/978-3-030-22868-2_31

Download citation

Publish with us

Policies and ethics