AuthorsF. I. Michelinakis, J. S. Pujol-Roig, S. Malacarne, M. Xie, T. Dreibholz, S. Majumdar, W. Y. Poe, G. Patounas, C. Guerrero, A. M. Elmokashfi et al.
TitleAI Anomaly Detection for Cloudified Mobile Core Architectures
AfilliationCommunication Systems
Project(s)5G-VINNI: 5G Verticals INNovation Infrastructure , The Center for Resilient Networks and Applications, Simula Metropolitan Center for Digital Engineering, Simula Metropolitan Center for Digital Engineering, NorNet, SMIL: SimulaMet Interoperability Lab
Publication TypeJournal Article
Year of Publication2022
JournalTransactions on Network and Service Management
Date Published08/2022
Publisher IEEE
Place PublishedLos Alamitos, California/U.S.A.
Keywords5G, AI, Anomaly detection, Autoencoders, deep learning, Mobile networks, Smart Networks

IT systems monitoring is a crucial process for managing and orchestrating network resources, allowing network providers to rapidly detect and react to most impediment causing network degradation. However, the high growth in size and complexity of current operational networks (2022) demands new solutions to process huge amounts of data (including alarms) reliably and swiftly. Further, as the network becomes progressively more virtualized, the hosting of nfv on cloud environments adds a magnitude of possible bottlenecks outside the control of the service owners. In this paper, we propose two deep learning anomaly detection solutions that leverage service exposure and apply it to automate the detection of service degradation and root cause discovery in a cloudified mobile network that is orchestrated by ETSI OSM. A testbed is built to validate these AI models. The testbed collects monitoring data from the OSM monitoring module, which is then exposed to the external AI anomaly detection modules, tuned to identify the anomalies and the network services causing them. The deep learning solutions are tested using various artificially induced bottlenecks. The AI solutions are shown to correctly detect anomalies and identify the network components involved in the bottlenecks, with certain limitations in a particular type of bottlenecks. A discussion of the right monitoring tools to identify concrete bottlenecks is provided.

Citation Key TNSM2022

Contact person