Abstract
This paper addresses the problem of network monitoring by investigating the performance of three soft computing techniques, the Artificial Neural Network, Bayesian Network and the Artificial Immune System. The techniques were used for achieving situation recognition and monitoring in a large network of Wi-Fi hotspots as part of a highly scalable preemptive monitoring tool for wireless networks. Using a set of data extracted from a live network of Wi-Fi hotspots managed by an ISP, we integrated algorithms into a data collection system to detect anomalous performance and aberrant behavior in the ISP’s network. The results are therefore revealed and discussed in terms of both anomaly performance and aberrant behavior on several test case scenarios.
The financial assistance of the National Research Foundation (NRF) and Telkom SA Center of Excellence (CoE) is hereby acknowledged. Opinions expressed and conclusions arrived at, are those of the author and are not necessarily to be attributed to the NRF and CoE.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Vaughan-Nichols, S.J.: The challenge of wi-fi roaming. Computer 36, 17–19 (2003)
Cannady, J.: Artificial neural networks for misuse detection. In: Proceedings of the 21st National Information Systems Security Conference, Arlington, VA, USA (1998)
Cheng, E., **, H., Han, Z., Sun, J.: Network-Based Anomaly Detection Using an Elman Network. In: Lu, X., Zhao, W. (eds.) ICCNMC 2005. LNCS, vol. 3619, pp. 471–480. Springer, Heidelberg (2005)
Zhang, J., Zulkernine, M.: Anomaly based network intrusion detection with unsupervised outlier detection. In: ICC 2006, Instanbul, vol. 9 (2006)
Forrest, S., Hofmeyr, S.A., Somayaji, A., Longstaff, T.A.: A sense of self for unix processes. In: 1996 Proceedings of IEEE Symposium on Security and Privacy (1996)
Dasgupta, D., Gonzalez, F.: An immunity-based technique to characterize intrusions in computer networks. IEEE Transactions on Evolutionary Computation 6, 281–291 (2002)
Luther, K., Bye, R., Alpcan, T., Muller, A., Albayrak, S.: A cooperative AIS framework for intrusion detection. In: 2007 IEEE International Conference on Communications (2007)
Cha, B., Lee, D.: Network-Based Anomaly Intrusion Detection Improvement by Bayesian Network and Indirect Relation. In: Apolloni, B., Howlett, R.J., Jain, L. (eds.) KES 2007, Part II. LNCS (LNAI), vol. 4693, pp. 141–148. Springer, Heidelberg (2007)
Dunne, R.A.: A statistical Approach to Neural Network for Pattern Recognition, p. 288. Wiley-Interscience (2007)
Kjaerulff, U.B., Madsen, A.L.: Bayesian Networks and Influence Diagrams: Guide To Construction and Analysis, 1st edn., p. 336. Springer (2007)
Witten, I.H., Frank, E.: Data Mining: Practical Machine Learning Tools and Techniques, 2nd edn. Morgan Kaufmann Series in Data Management Systems, p. 560. Morgan Kaufmann (2005)
Watkins, A., Timmis, J., Boggess, L.: Artificial immune recognition system (AIRS): An immune-inspired supervised learning algorithm. Genetic Programming and Evolvable Machines 5, 291–317 (2004)
Robinson, S.: Simulation: The Practice of Model Development and Use, 1st edn., p. 339. John Wiley & Sons Ltd., The Atrium (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Machaka, P., Mabande, T., Bagula, A. (2012). Monitoring of a Large Wi-Fi Hotspots Network: Performance Investigation of Soft Computing Techniques. In: Hart, E., Timmis, J., Mitchell, P., Nakamo, T., Dabiri, F. (eds) Bio-Inspired Models of Networks, Information, and Computing Systems. BIONETICS 2011. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 103. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-32711-7_14
Download citation
DOI: https://doi.org/10.1007/978-3-642-32711-7_14
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-32710-0
Online ISBN: 978-3-642-32711-7
eBook Packages: Computer ScienceComputer Science (R0)