935
Views
0
CrossRef citations to date
0
Altmetric
Research Article

An Unsupervised Detection Method for Multiple Abnormal Wi-Fi Access Points in Large-Scale Wireless Network

ORCID Icon &
Article: 2073722 | Received 27 Jan 2022, Accepted 29 Apr 2022, Published online: 18 May 2022

References

  • Alqahtani, A., E. Solaiman, P. Patel, S. Dustdar, and R. Ranjan. 2019. Service level agreement specification for end-to-end IoT application ecosystems. Software-practice & Experience 49 (12):1689–693. doi:10.1002/spe.2747.
  • Baric, J., L. Kvesic, J. Pecaric, and M. R. Penava. 2021. New bounds for generalized Taylor expansions. Mathematical Inequalities & Applications 24 (4):993–993. doi:10.7153/mia-2021-24-69.
  • Boardman, N. T., and K. M. Sullivan. 2021. Time-based node deployment policies for reliable wireless sensor networks. IEEE Transactions on Reliability 70 (3):1204–17. doi:10.1109/TR.2020.3047757.
  • Breiman, L. 2001. Random forests. 2001. Machine Learning 45 (1):5–32. doi:10.1023/A:1010933404324.
  • Bretan, P. 2017. Trap analysis: An automated approach for deriving column height predictions in fault-bounded traps. Proceedings of 4th EAGE Conference on Fault and Top Seals, 59–69, Almeria, Spain. doi:10.1144/petgeo2016-022
  • Chen, J. B., and S. L. Cheng. 2021. GMM estimation of a partially linear additive spatial error model. Mathematics 9 (6). doi: 10.1016/j.jnca.2017.03.001.
  • Clark, A. Y., N. Blumenfeld, E. Lal, S. Darbari, S. Northwood, and A. Wadpey. 2021. Using K-means cluster analysis and decision trees to highlight significant factors leading to homelessness. Mathematics 9 (17). doi: 10.3390/math9172045.
  • Dong, A., Z. J. Du, and Z. Y. Yan. 2019. Round trip time prediction using recurrent neural networks with minimal gated unit. IEEE Communications Letters 23 (4):584–87. doi:10.1109/LCOMM.2019.2899603.
  • Ducourthial, B., S. Mottelet, and A. Busson. 2017. Improving fairness between close Wi-Fi access points. Journal of Network and Computer Applications 87:87–99. doi:10.1016/j.jnca.2017.03.001.
  • Garcia-Fernandez, M., I. Hoyas-Ester, A. Lopez-Cruces, M. Siutkowska, and X. Banque-Casanovas. 2021. Accuracy in WiFi access point position estimation using round trip time. Sensors 21 (11):3828. doi:10.3390/s21113828.
  • Gezer, A., and G. Warner. 2019. Exploitation of ICMP time exceeded packets for a large-scale router delay analysis. International Arab Journal of Information Technology 16 (6):1090–97.
  • Guan, X., Y. Yang, J. J. Li, X. Xu, and H. T. Shen. 2021. Mind the remainder: taylor’s theorem view on recurrent neural networks. IEEE Transactions on Neural Networks and Learning Systems 33 (4): 1507–1519. doi:10.1109/TNNLS.2020.3042537.
  • Hahsler, M., M. Piekenbrock, and D. Doran. 2019. dbscan: fast density-based clustering with R. Journal of Statistical Software 91 (1):1–30. doi:10.18637/jss.v091.i01.
  • Hashem, O., K. A. Harras, and M. Youssef. 2021. Accurate indoor positioning using IEEE 802.11mc round trip time. Pervasive and Mobile Computing 75:101416. doi:10.1016/j.pmcj.2021.101416.
  • Hou, B. N., C. S. Hou, T. Q. Zhou, Z. P. Cai, and F. Liu. 2021. Detection and characterization of network anomalies in large-scale RTT time series. IEEE Transactions on Network and Service Management 18 (1):793–806. doi:10.1109/TNSM.2021.3050495.
  • Iverson, L. R., A. M. Prasad, S. N. Matthews, and M. Peters. 2008. Estimating potential habitat for 134 eastern US tree species under six climate scenarios. Forest Ecology and Management 254 (3):390–406. doi:10.1016/j.foreco.2007.07.023.
  • Jahani, H., B. Abbasi, Z. Hosseinifard, M. Fadaki, and J. P. Minas. 2020. Disruption risk management in service-level agreements. International Journal of Production Research 59 (1):226–44. doi:10.1080/00207543.2020.1748248.
  • Jia, M., S. B. Khattak, Q. Guo, X. M. Gu, and Y. Lin. 2020. Access point optimization for reliable indoor localization systems. IEEE Transactions on Reliability 69 (4):1424–36. doi:10.1109/TR.2019.2955748.
  • Kitisriworapan, S., A. Jansang, and A. Phonphoem. 2020. Client-side rogue access-point detection using a simple walking strategy and round-trip time analysis. Eurasip Journal on Wireless Communications and Networking 1. doi:10.1186/s13638-020-01864-5.
  • Kumar, S., S. Duttagupta, V. P. Rangan, and M. V. Ramesh. 2020. Reliable network connectivity in wireless sensor networks for remote monitoring of landslides. Wireless Networks 26 (3):2137–52. doi:10.1007/s11276-019-02059-7.
  • Lima, F. H. M. S., L. F. M. Vieira, M. A. M. Vieira, A. B. Vieira, and M. Jose Augusto. 2019. Nacif. water ping: ICMP for the internet of underwater things. Computer Networks 152:54–63. doi:10.1016/j.comnet.2019.01.009.
  • Liu, Z., B. Wu, and T. C. Ye. 2018. Improved turbo decoding with multivariable Taylor series expansion. IEEE Communications Letters 22 (1):37–40. doi:10.1109/LCOMM.2017.2705643.
  • Luckie, M., A. Dhamdhere, K. C. Claffy, and D. Murrell. 2011. Measured impact of crooked traceroute. ACM Sigcomm Computer Communication Review 41 (1):15–21. doi:10.1145/1925861.1925864.
  • Lyu, J. H., Y. R. Ren, Z. Abbas, and B. L. Zhang. 2021. Reliable route selection for wireless sensor networks with connection failure uncertainties. Sensors 21 (21):7254. doi:10.3390/s21217254.
  • Matousek, P., O. Rysavy, and L. Polcak. 2021. Unified SNMP interface for iot monitoring. Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management (IM), 938–43, Network.
  • Mirkovic, D., G. Armitage, and P. Branch. 2018. A survey of round trip time prediction systems. IEEE Communications Surveys and Tutorials 20 (3):1758–76. doi:10.1109/COMST.2018.2816917.
  • Monteiro, S. D. S., and R. F. Erbacher. 2008. Exemplifying attack identification and analysis in a novel forensically viable syslog model. Proceedings of the 3rd International Workshop on Systematic Approaches to Digital Forensic Engineering, 57–68, Berkeley, CA. doi:10.1109/SADFE.2008.14.
  • Romano, J. P., and M. Wolf. 2017. Resurrecting weighted least squares. Journal of Econometrics 197 (1):1–19. doi:10.1016/j.jeconom.2016.10.003.
  • Saravanan, K., and A. Radhakrishnan. 2018. Dynamic search engine platform for cloud service level agreements using semantic annotation. International Journal on Semantic Web and Information Systems 14 (3):70–98. doi:10.4018/IJSWIS.2018070104.
  • Sharma, A., R. Kumar, M. W. Abu Talib, S. Srivastava, and R. Iqbal. 2019. Network modelling and computation of quickest path for service-level agreements using bi-objective optimization. International Journal of Distributed Sensor Networks 15 (10):155014771988111. doi:10.1177/1550147719881116.
  • Shenoy, S., D. Gorinevsky, and N. Laptev. 2019. Probabilistic modeling of computing demand for service level agreement. IEEE Transactions on Services Computing 12 (6):987–93. doi:10.1109/TSC.2016.2637929.
  • Sun, P., J. W. Yang, and Y. F. Zhi. 2019. Multi-attribute decision-making method based on Taylor expansion. International Journal of Distributed Sensor Networks 15 (3):155014771983607. doi:10.1177/1550147719836078.
  • Vaarandi, R., B. Blumbergs, and M. Kont. 2009. An unsupervised framework for detecting anomalous messages from syslog log files. Proceedings of the 7th Annual Conference on Communication Networks and Services Research, 158–+, Moncton, Canada.
  • Wang, H. 2020. Improvement and implementation of wireless network topology system based on SNMP protocol for router equipment. Computer Communications 51:10–18. doi:10.1016/j.comcom.2019.12.038.
  • Xie, L. X., Y. Ding, H. Y. Yang, and Z. Hu. 2020. Mitigating LFA through segment rerouting in IoT environment with traceroute flow abnormality detection. Journal of Network and Computer Applications 164:102690. doi:10.1016/j.jnca.2020.102690.
  • Yang, X. L., and B. Chen. 2018. A novel method for measurement points selection in access points localization. Wireless Networks 24 (1):257–70. doi:10.1007/s11276-016-1315-y.
  • Yeh, M. H., Y. C. Lai, and J. W. Lin. 2012. An extendable web-based system of managing distributed servers using IPMI and WMI techniques. Pakistan Journal of Statistics 28 (5):551–64.
  • Zhang, S. L., Y. Liu, W. B. Meng, J. H. Bu, S. Yang, Y. Q. Sun, et al. 2020b. Efficient and robust syslog parsing for network devices in datacenter networks. IEEE Access 8:30245–61. doi:10.1109/ACCESS.2020.2972691.
  • Zhang, D. G., H. Wu, P. Z. Zhao, X. H. Liu, Y. Y. Cui, L. Chen, et al. 2020a. New approach of multi-path reliable transmission for marginal wireless sensor network. Wireless Networks 26 (2):1503–17. doi:10.1007/s11276-019-02216-y.
  • Zhao, Z., T. Karvonen, R. Hostettler, and S. Sarkka. 2021a. Taylor moment expansion for continuous-discrete gaussian filtering. IEEE Transactions on Automatic Control 66 (9):4460–67. doi:10.1109/TAC.2020.3047367.
  • Zhao, Z. F., W. N. Niu, X. S. Zhang, R. Z. Zhang, Z. Q. Yu, and C. Huang. 2021b. Trine: Syslog anomaly detection with three transformer encoders in one generative adversarial network. Applied Intelligence Advance online publication. doi:10.1007/s10489-021-02863-9.