Detection and mitigation of signaling storms in mobile networks
File(s)Erol-Gelenbe-Storms-Invited-Paper.pdf (200.72 KB)
Accepted version
Author(s)
Gelenbe, E
Abdelrahman, OH
Gorbil, G
Type
Conference Paper
Abstract
Mobile Networks are subject to "signaling storms" launched by malware or apps, which overload the the bandwidth at the cell, the backbone signaling servers, and Cloud servers, and may also deplete the battery power of mobile devices. This paper reviews the subject and discusses a novel technique to detect and mitigate such signaling storms. Through a mathematical analysis we introduce a technique based on tracking time-out transitions in the signaling system that can substantially reduce both the number of misbehaving mobiles and the signaling overload in the backbone.
Date Issued
2016-03-24
Date Acceptance
2016-02-15
Citation
2016 International Conference on Computing, Networking and Communications (ICNC), 2016
Publisher
IEEE
Journal / Book Title
2016 International Conference on Computing, Networking and Communications (ICNC)
Copyright Statement
© 2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
Sponsor
Commission of the European Communities
Identifier
http://gateway.webofknowledge.com/gateway/Gateway.cgi?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000382143300142&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=1ba7043ffcc86c417c072aa74d649202
Grant Number
317888 - NEMESYS
Source
2016 International Conference on Computing, Networking and Communications (ICNC)
Subjects
Science & Technology
Technology
Computer Science, Theory & Methods
Engineering, Electrical & Electronic
Telecommunications
Computer Science
Engineering
Mobile Networks
Signaling Storms
Malware
Attack Mitigation
RANDOM NEURAL-NETWORKS
MODELS
Publication Status
Published
Start Date
2016-02-15
Finish Date
2016-02-18
Coverage Spatial
Kauai, HI