Monitoring of a Large Wi-Fi Hotspots Network: Performance Investigation of Soft Computing Techniques

  • Conference paper
Bio-Inspired Models of Networks, Information, and Computing Systems (BIONETICS 2011)

Abstract

This paper addresses the problem of network monitoring by investigating the performance of three soft computing techniques, the Artificial Neural Network, Bayesian Network and the Artificial Immune System. The techniques were used for achieving situation recognition and monitoring in a large network of Wi-Fi hotspots as part of a highly scalable preemptive monitoring tool for wireless networks. Using a set of data extracted from a live network of Wi-Fi hotspots managed by an ISP, we integrated algorithms into a data collection system to detect anomalous performance and aberrant behavior in the ISP’s network. The results are therefore revealed and discussed in terms of both anomaly performance and aberrant behavior on several test case scenarios.

The financial assistance of the National Research Foundation (NRF) and Telkom SA Center of Excellence (CoE) is hereby acknowledged. Opinions expressed and conclusions arrived at, are those of the author and are not necessarily to be attributed to the NRF and CoE.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Vaughan-Nichols, S.J.: The challenge of wi-fi roaming. Computer 36, 17–19 (2003)

    Article  Google Scholar 

  2. Cannady, J.: Artificial neural networks for misuse detection. In: Proceedings of the 21st National Information Systems Security Conference, Arlington, VA, USA (1998)

    Google Scholar 

  3. Cheng, E., **, H., Han, Z., Sun, J.: Network-Based Anomaly Detection Using an Elman Network. In: Lu, X., Zhao, W. (eds.) ICCNMC 2005. LNCS, vol. 3619, pp. 471–480. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  4. Zhang, J., Zulkernine, M.: Anomaly based network intrusion detection with unsupervised outlier detection. In: ICC 2006, Instanbul, vol. 9 (2006)

    Google Scholar 

  5. Forrest, S., Hofmeyr, S.A., Somayaji, A., Longstaff, T.A.: A sense of self for unix processes. In: 1996 Proceedings of IEEE Symposium on Security and Privacy (1996)

    Google Scholar 

  6. Dasgupta, D., Gonzalez, F.: An immunity-based technique to characterize intrusions in computer networks. IEEE Transactions on Evolutionary Computation 6, 281–291 (2002)

    Article  Google Scholar 

  7. Luther, K., Bye, R., Alpcan, T., Muller, A., Albayrak, S.: A cooperative AIS framework for intrusion detection. In: 2007 IEEE International Conference on Communications (2007)

    Google Scholar 

  8. Cha, B., Lee, D.: Network-Based Anomaly Intrusion Detection Improvement by Bayesian Network and Indirect Relation. In: Apolloni, B., Howlett, R.J., Jain, L. (eds.) KES 2007, Part II. LNCS (LNAI), vol. 4693, pp. 141–148. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  9. Dunne, R.A.: A statistical Approach to Neural Network for Pattern Recognition, p. 288. Wiley-Interscience (2007)

    Google Scholar 

  10. Kjaerulff, U.B., Madsen, A.L.: Bayesian Networks and Influence Diagrams: Guide To Construction and Analysis, 1st edn., p. 336. Springer (2007)

    Google Scholar 

  11. Witten, I.H., Frank, E.: Data Mining: Practical Machine Learning Tools and Techniques, 2nd edn. Morgan Kaufmann Series in Data Management Systems, p. 560. Morgan Kaufmann (2005)

    Google Scholar 

  12. Watkins, A., Timmis, J., Boggess, L.: Artificial immune recognition system (AIRS): An immune-inspired supervised learning algorithm. Genetic Programming and Evolvable Machines 5, 291–317 (2004)

    Article  Google Scholar 

  13. Robinson, S.: Simulation: The Practice of Model Development and Use, 1st edn., p. 339. John Wiley & Sons Ltd., The Atrium (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Machaka, P., Mabande, T., Bagula, A. (2012). Monitoring of a Large Wi-Fi Hotspots Network: Performance Investigation of Soft Computing Techniques. In: Hart, E., Timmis, J., Mitchell, P., Nakamo, T., Dabiri, F. (eds) Bio-Inspired Models of Networks, Information, and Computing Systems. BIONETICS 2011. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 103. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-32711-7_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-32711-7_14

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-32710-0

  • Online ISBN: 978-3-642-32711-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics

Navigation