Open Access iconOpen Access



Rule-Based Anomaly Detection Model with Stateful Correlation Enhancing Mobile Network Security

Rafia Afzal, Raja Kumar Murugesan*

School of Computer Science and Engineering, Taylor’s University, Subang Jaya, Selangor, 47500, Malaysia

* Corresponding Author: Raja Kumar Murugesan. Email: email

Intelligent Automation & Soft Computing 2022, 31(3), 1825-1841.


The global Signalling System No. 7 (SS7) network protocol standard has been developed and regulated based only on trusted partner networks. The SS7 network protocol by design neither secures the communication channel nor verifies the entire network peers. The SS7 network protocol used in telecommunications has deficiencies that include verification of actual subscribers, precise location, subscriber’s belonging to a network, absence of illegitimate message filtering mechanism, and configuration deficiencies in home routing networks. Attackers can take advantage of these deficiencies and exploit them to impose threats such as subscriber or network data disclosure, intercept mobile traffic, perform account frauds, track subscriber location, and deny services. Existing methods are unable to identify suspicious hosts as they use a minimal number of network parameters. So, there is a vital need to overcome these deficiencies to detect the abnormal behaviour of users and hence mitigate security attacks in a mobile network. This research proposes a model for anomaly detection in mobile networks based on Rule-based filtering with stateful correlation. The performance of the proposed method is evaluated using synthetic datasets. Results show that the proposed anomaly detection model performs 0.37% better in terms of security attack detection rate, 24.25% better in terms of false alarm rate, and 31.45% better in terms of true positive rate when compared with the existing pattern recognition Artificial Neural Network (ANN) algorithm.


Cite This Article

R. Afzal and R. Kumar Murugesan, "Rule-based anomaly detection model with stateful correlation enhancing mobile network security," Intelligent Automation & Soft Computing, vol. 31, no.3, pp. 1825–1841, 2022.

cc This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 1462


  • 871


  • 1


Share Link