Pub Date : 2025-10-11DOI: 10.1007/s12243-025-01120-1
Andrew Bengtson, Ali Tekeoglu, Christopher Rouff
With the rise of online chess, the increasing prevalence of automated chess bots, and recent high-profile cheating controversies, there is growing interest in developing effective methods for detecting bots in chess. Current approaches in this domain largely depend on analyzing player history, detecting anomalies, and conducting engine analysis to identify bot-like behavior after a game has concluded. However, these post-hoc techniques struggle to adapt to real-time detection scenarios, such as those required in dynamic cybersecurity contexts. This paper introduces a novel challenge: detecting bots during an ongoing game, enabling adaptive strategies based on the real-time identification of an opponent’s behavior. It further proposes an autonomic system leveraging self-adaptive properties to address this challenge as well as discussing the application of this bot detection to other domains.
{"title":"A real-time autonomic architecture for detection and defeat of open-access chess bots","authors":"Andrew Bengtson, Ali Tekeoglu, Christopher Rouff","doi":"10.1007/s12243-025-01120-1","DOIUrl":"10.1007/s12243-025-01120-1","url":null,"abstract":"<div><p>With the rise of online chess, the increasing prevalence of automated chess bots, and recent high-profile cheating controversies, there is growing interest in developing effective methods for detecting bots in chess. Current approaches in this domain largely depend on analyzing player history, detecting anomalies, and conducting engine analysis to identify bot-like behavior after a game has concluded. However, these post-hoc techniques struggle to adapt to real-time detection scenarios, such as those required in dynamic cybersecurity contexts. This paper introduces a novel challenge: detecting bots during an ongoing game, enabling adaptive strategies based on the real-time identification of an opponent’s behavior. It further proposes an autonomic system leveraging self-adaptive properties to address this challenge as well as discussing the application of this bot detection to other domains.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"80 -","pages":"1183 - 1193"},"PeriodicalIF":2.2,"publicationDate":"2025-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145963601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-09-29DOI: 10.1007/s12243-025-01118-9
Beny Nugraha, Abhishek Venkatesh Jnanashree, Thomas Bauschert
Artificial intelligence (AI)-based intrusion detection systems (IDSs) markedly advance network security by leveraging machine learning (ML) and deep learning (DL) models for accurate, adaptive threat detection. Their main drawback, however, is an inherent “black-box” character that impedes trust, traceability, and regulatory compliance. To overcome this limitation, we propose an efficient explainable-AI (XAI) framework that enhances both robustness and interpretability. The two-stage process first couples a statistical selector (ANOVA) with global SHAP scores to retain only the ten most informative features, an approximately 70% dimensionality reduction, then retrains a lightweight XGBoost detector whose decisions are explained locally by SHAP and LIME. Cross-validating the two explanation modalities adds a reliability check absent from earlier hybrids, while the inclusion of a time-efficiency evaluation for explanation generation provides a new performance dimension that prior XAI-IDS studies have not addressed. To our knowledge, this is the first framework to jointly apply dual-stage statistical–model-based feature selection and SHAP–LIME cross-validation in IDS, enabling near-real-time explainability without sacrificing accuracy. Comprehensive experiments on three representative traces, CIC-DDoS2019 (legacy IP DDoS), CICIoT2023 (IoT malware), and 5 G PFCP (control-plane attacks), confirm the framework’s versatility: it sustains an F1 Score of at least 99 % while accelerating LIME explanation time from 36 to 4.9 s, an 87 % speed-up. These results demonstrate that high detection accuracy and transparent, near-real-time interpretability can be achieved simultaneously in modern IDS deployments.
{"title":"A versatile XAI-based framework for efficient and explainable intrusion detection systems","authors":"Beny Nugraha, Abhishek Venkatesh Jnanashree, Thomas Bauschert","doi":"10.1007/s12243-025-01118-9","DOIUrl":"10.1007/s12243-025-01118-9","url":null,"abstract":"<div><p>Artificial intelligence (AI)-based intrusion detection systems (IDSs) markedly advance network security by leveraging machine learning (ML) and deep learning (DL) models for accurate, adaptive threat detection. Their main drawback, however, is an inherent “black-box” character that impedes trust, traceability, and regulatory compliance. To overcome this limitation, we propose an efficient explainable-AI (XAI) framework that enhances both robustness and interpretability. The two-stage process first couples a statistical selector (ANOVA) with global SHAP scores to retain only the ten most informative features, an approximately 70% dimensionality reduction, then retrains a lightweight XGBoost detector whose decisions are explained locally by SHAP and LIME. Cross-validating the two explanation modalities adds a reliability check absent from earlier hybrids, while the inclusion of a time-efficiency evaluation for explanation generation provides a new performance dimension that prior XAI-IDS studies have not addressed. To our knowledge, this is the first framework to jointly apply dual-stage statistical–model-based feature selection and SHAP–LIME cross-validation in IDS, enabling near-real-time explainability without sacrificing accuracy. Comprehensive experiments on three representative traces, CIC-DDoS2019 (legacy IP DDoS), CICIoT2023 (IoT malware), and 5 G PFCP (control-plane attacks), confirm the framework’s versatility: it sustains an F1 Score of at least 99 % while accelerating LIME explanation time from 36 to 4.9 s, an 87 % speed-up. These results demonstrate that high detection accuracy and transparent, near-real-time interpretability can be achieved simultaneously in modern IDS deployments.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"80 -","pages":"1095 - 1120"},"PeriodicalIF":2.2,"publicationDate":"2025-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s12243-025-01118-9.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145963712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SBRC 2024 special issue—cross-layer advances for resilient and intelligent communication systems","authors":"Célio Albuquerque, Katia Obraczka, Diogo Menezes Ferrazani Mattos","doi":"10.1007/s12243-025-01116-x","DOIUrl":"10.1007/s12243-025-01116-x","url":null,"abstract":"","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"80 9-10","pages":"711 - 713"},"PeriodicalIF":2.2,"publicationDate":"2025-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145210376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-09-03DOI: 10.1007/s12243-025-01114-z
Ivana Burgetová, Petr Matoušek, Ondřej Ryšavý
Network traffic monitoring for security threat detection and network performance management is challenging due to the encryption of most communications. This article addresses the problem of identifying network applications associated with Transport Layer Security (TLS) connections. The evaluation of three primary approaches to classifying TLS-encrypted traffic was carried out: fingerprinting methods, Server Name Indication (SNI)–based identification, and machine learning–based classifiers. Each method has its own strengths and limitations: fingerprinting relies on a regularly updated database of known hashes, SNI is vulnerable to obfuscation or missing information, and AI techniques such as machine learning require sufficient labeled training data. A comparison of these methods highlights the challenges of identifying individual applications, as the TLS properties are significantly shared between applications. Nevertheless, even when identifying a collection of candidate applications, a valuable insight into network monitoring can be gained, and this can be achieved with high accuracy by all the methods considered. To facilitate further research in this area, a novel publicly available dataset of TLS communications has been created, with the communications annotated for popular desktop and mobile applications. Furthermore, the results of three different approaches to refine TLS traffic classification based on a combination of basic classifiers and context are presented. Finally, practical use cases are proposed, and future research directions are identified to further improve application identification methods.
{"title":"Towards identification of network applications in encrypted traffic","authors":"Ivana Burgetová, Petr Matoušek, Ondřej Ryšavý","doi":"10.1007/s12243-025-01114-z","DOIUrl":"10.1007/s12243-025-01114-z","url":null,"abstract":"<div><p>Network traffic monitoring for security threat detection and network performance management is challenging due to the encryption of most communications. This article addresses the problem of identifying network applications associated with Transport Layer Security (TLS) connections. The evaluation of three primary approaches to classifying TLS-encrypted traffic was carried out: fingerprinting methods, Server Name Indication (SNI)–based identification, and machine learning–based classifiers. Each method has its own strengths and limitations: fingerprinting relies on a regularly updated database of known hashes, SNI is vulnerable to obfuscation or missing information, and AI techniques such as machine learning require sufficient labeled training data. A comparison of these methods highlights the challenges of identifying individual applications, as the TLS properties are significantly shared between applications. Nevertheless, even when identifying a collection of candidate applications, a valuable insight into network monitoring can be gained, and this can be achieved with high accuracy by all the methods considered. To facilitate further research in this area, a novel publicly available dataset of TLS communications has been created, with the communications annotated for popular desktop and mobile applications. Furthermore, the results of three different approaches to refine TLS traffic classification based on a combination of basic classifiers and context are presented. Finally, practical use cases are proposed, and future research directions are identified to further improve application identification methods.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"80 -","pages":"1015 - 1032"},"PeriodicalIF":2.2,"publicationDate":"2025-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s12243-025-01114-z.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145963715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-08-01DOI: 10.1007/s12243-025-01112-1
Helga D. Balbi, Eduardo C. A. dos Santos, Diego Passos, Luiz C. S. Magalhães, Célio Albuquerque
Handoffs are common in wireless networks with high device density. Since the IEEE 802.11 standard does not specify the criteria for initiating these handoffs, their implementation varies by manufacturer. Most current solutions rely on the Received Signal Strength Indicator (RSSI) as a key performance metric, which often leads to unstable associations—a phenomenon often referred to as the “ping-pong” effect. To address this effect, we propose EWMAX and NDIST, two RSSI filtering mechanisms designed to enhance association stability with minimal delay in handoff triggering. Comparative tests demonstrate that both EWMAX and NDIST improve stability without significantly increasing delay. However, a comprehensive evaluation reveals that EWMAX dominates the majority of results on the Pareto frontier, often generating the best solutions. Specifically, EWMAX matched NDIST in stability and outperformed it with a 24.64% reduction in delay, demonstrating superior performance in the evaluated scenario.
{"title":"EWMAX and NDIST: RSSI filtering mechanisms for handoff algorithms in dense networks","authors":"Helga D. Balbi, Eduardo C. A. dos Santos, Diego Passos, Luiz C. S. Magalhães, Célio Albuquerque","doi":"10.1007/s12243-025-01112-1","DOIUrl":"10.1007/s12243-025-01112-1","url":null,"abstract":"<div><p>Handoffs are common in wireless networks with high device density. Since the IEEE 802.11 standard does not specify the criteria for initiating these handoffs, their implementation varies by manufacturer. Most current solutions rely on the Received Signal Strength Indicator (RSSI) as a key performance metric, which often leads to unstable associations—a phenomenon often referred to as the “ping-pong” effect. To address this effect, we propose EWMAX and NDIST, two RSSI filtering mechanisms designed to enhance association stability with minimal delay in handoff triggering. Comparative tests demonstrate that both EWMAX and NDIST improve stability without significantly increasing delay. However, a comprehensive evaluation reveals that EWMAX dominates the majority of results on the Pareto frontier, often generating the best solutions. Specifically, EWMAX matched NDIST in stability and outperformed it with a 24.64% reduction in delay, demonstrating superior performance in the evaluated scenario.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"80 9-10","pages":"759 - 774"},"PeriodicalIF":2.2,"publicationDate":"2025-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145210483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-07-16DOI: 10.1007/s12243-025-01107-y
Fatema EL-Husseini, Hassan N. Noura, Flavien Vernier
Machine learning(ML) has emerged as a fundamental element of innovation in several industries, providing unparalleled powers in data processing, decision-making, and automation. The growing use of ML systems has presented considerable security and privacy challenges, especially in resource-limited contexts such as IoT devices and edge computing platforms. This work examines lightweight security and privacy-preserving solutions designed to mitigate these vulnerabilities, emphasizing both cryptographic and non-cryptographic methods. The work presents a detailed classification of security vulnerabilities aimed at ML systems, encompassing data poisoning, adversarial attacks, model inversion, and training data breaches. It assesses cryptographic methods, including homomorphic encryption and safe multi-party computation, alongside non-cryptographic strategies such as differential privacy, defensive distillation, and federated learning. The work delineates significant obstacles, including processing overhead, adversarial robustness, scalability, and interaction with legacy systems, and proposes specific countermeasures to address these concerns. Additionally, the work integrates empirical evaluations and comparative benchmarks to guide practical deployment and indicates future research areas, highlighting the necessity for scalable cryptographic methodologies, sophisticated adversarial defenses, and interdisciplinary approaches to augment machine learning security and privacy. This article seeks to reconcile stringent security requirements with practical deployment limitations by offering actionable insights and novel methodologies, hence enabling the secure and dependable utilization of ML systems across many applications.
{"title":"Security and privacy-preserving for machine learning models: attacks, countermeasures, and future directions","authors":"Fatema EL-Husseini, Hassan N. Noura, Flavien Vernier","doi":"10.1007/s12243-025-01107-y","DOIUrl":"10.1007/s12243-025-01107-y","url":null,"abstract":"<div><p>Machine learning(ML) has emerged as a fundamental element of innovation in several industries, providing unparalleled powers in data processing, decision-making, and automation. The growing use of ML systems has presented considerable security and privacy challenges, especially in resource-limited contexts such as IoT devices and edge computing platforms. This work examines lightweight security and privacy-preserving solutions designed to mitigate these vulnerabilities, emphasizing both cryptographic and non-cryptographic methods. The work presents a detailed classification of security vulnerabilities aimed at ML systems, encompassing data poisoning, adversarial attacks, model inversion, and training data breaches. It assesses cryptographic methods, including homomorphic encryption and safe multi-party computation, alongside non-cryptographic strategies such as differential privacy, defensive distillation, and federated learning. The work delineates significant obstacles, including processing overhead, adversarial robustness, scalability, and interaction with legacy systems, and proposes specific countermeasures to address these concerns. Additionally, the work integrates empirical evaluations and comparative benchmarks to guide practical deployment and indicates future research areas, highlighting the necessity for scalable cryptographic methodologies, sophisticated adversarial defenses, and interdisciplinary approaches to augment machine learning security and privacy. This article seeks to reconcile stringent security requirements with practical deployment limitations by offering actionable insights and novel methodologies, hence enabling the secure and dependable utilization of ML systems across many applications.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"80 -","pages":"975 - 996"},"PeriodicalIF":2.2,"publicationDate":"2025-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145963654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-06-28DOI: 10.1007/s12243-025-01105-0
Caio Bruno B. de Souza, Marcos Rocha de M. Falcão, Maria G. Lima Damasceno, Renata K. Gomes Dos Reis, Andson M. Balieiro
Enabling the coexistence of multiple services on the same NFV-MEC network is challenging due to conflicting resource requirements, virtualization overhead, and potential processing failures, all within the strict resource constraints of the NFV-MEC node. Additionally, the critical nature of URLLC services often necessitates service prioritization, which can adversely impact the performance of eMBB applications. This paper addresses these challenges by designing a continuous-time Markov chain (CTMC)-based model that incorporates these features to analyze resource allocation for multiple coexisting services in an NFV-MEC system. Extensive analyses of energy consumption, availability, response time, and memory consumption are conducted across various system configurations. Results reveal that higher loads of URLLC services decrease system availability and increase response times for both service types. The study also finds that an increase in the number of containers does not necessarily lead to a proportional increase in energy consumption, and energy and memory consumption exhibit similar patterns due to their common usage during setup and active processing states. While increasing buffer size slightly improves service availability with minimal impact on energy consumption (as buffered requests do not use resources while in the queue), it negatively affects service response times.
{"title":"Resource management for multi-service coexistence in 5 G/6 G NFV-MEC networks","authors":"Caio Bruno B. de Souza, Marcos Rocha de M. Falcão, Maria G. Lima Damasceno, Renata K. Gomes Dos Reis, Andson M. Balieiro","doi":"10.1007/s12243-025-01105-0","DOIUrl":"10.1007/s12243-025-01105-0","url":null,"abstract":"<div><p>Enabling the coexistence of multiple services on the same NFV-MEC network is challenging due to conflicting resource requirements, virtualization overhead, and potential processing failures, all within the strict resource constraints of the NFV-MEC node. Additionally, the critical nature of URLLC services often necessitates service prioritization, which can adversely impact the performance of eMBB applications. This paper addresses these challenges by designing a continuous-time Markov chain (CTMC)-based model that incorporates these features to analyze resource allocation for multiple coexisting services in an NFV-MEC system. Extensive analyses of energy consumption, availability, response time, and memory consumption are conducted across various system configurations. Results reveal that higher loads of URLLC services decrease system availability and increase response times for both service types. The study also finds that an increase in the number of containers does not necessarily lead to a proportional increase in energy consumption, and energy and memory consumption exhibit similar patterns due to their common usage during setup and active processing states. While increasing buffer size slightly improves service availability with minimal impact on energy consumption (as buffered requests do not use resources while in the queue), it negatively affects service response times.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"80 9-10","pages":"835 - 850"},"PeriodicalIF":2.2,"publicationDate":"2025-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145210729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-06-20DOI: 10.1007/s12243-025-01102-3
Arthur Böckmann Grossi, Roberto Irajá Tavares da Costa Filho, Luciano Paschoal Gaspary
Given the widespread adoption of video conferencing platforms in recent years, the quality of the provided service has become crucial. The exchange of data, including audio and video, among participants in a video conference relies on a series of mechanisms and protocols that must operate properly to prevent communication degradation. This study examines the behavior of WebRTC-based video conferencing platforms when subjected to bandwidth restrictions. In this investigation, an analysis is carried out on Elos and Google Meet platforms using a cross-layer indicator-based approach to evaluate the quality of service of video conferencing applications. The results suggest that the platforms employ distinct approaches to handle scenarios of limited network capacity. By considering user mobility, our investigation allows to assess the quality of service delivered by each platform when subjected to varying network performance conditions within a videoconferencing session.
{"title":"On the quality of WebRTC-based videoconferencing under adverse and mobility scenarios","authors":"Arthur Böckmann Grossi, Roberto Irajá Tavares da Costa Filho, Luciano Paschoal Gaspary","doi":"10.1007/s12243-025-01102-3","DOIUrl":"10.1007/s12243-025-01102-3","url":null,"abstract":"<div><p>Given the widespread adoption of video conferencing platforms in recent years, the quality of the provided service has become crucial. The exchange of data, including audio and video, among participants in a video conference relies on a series of mechanisms and protocols that must operate properly to prevent communication degradation. This study examines the behavior of WebRTC-based video conferencing platforms when subjected to bandwidth restrictions. In this investigation, an analysis is carried out on Elos and Google Meet platforms using a cross-layer indicator-based approach to evaluate the quality of service of video conferencing applications. The results suggest that the platforms employ distinct approaches to handle scenarios of limited network capacity. By considering user mobility, our investigation allows to assess the quality of service delivered by each platform when subjected to varying network performance conditions within a videoconferencing session.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"80 9-10","pages":"851 - 866"},"PeriodicalIF":2.2,"publicationDate":"2025-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145210707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-06-18DOI: 10.1007/s12243-025-01103-2
Cleiton M. de Almeida, Rosa M. M. Leão, Edmundo de Souza e Silva
Detecting significant statistical changes in time series data, such as change points and anomalies, is crucial for various applications, including computer network performance monitoring. Despite the availability of many detection algorithms, applying these techniques to real-world data remains a challenging topic due to their distinct effectiveness in different domains. This study focuses on identifying change points and anomalies in throughput and latency time series data from residential networks, emphasizing online methods. We evaluate well-established methods like Shewhart, EWMA, and CUSUM, which are simple to implement, and identify their limitations in real-world scenarios. We propose simple modifications to these classical methods to enhance their effectiveness when applied to data from network measurements. Furthermore, we introduce a new and flexible method, based on the concept of weighted voting. It is designed to detect change points while providing useful information to assess confidence in the results. Our methods were evaluated on two datasets: one we collected using the NDT protocol in Brazil and another from the publicly available Shao Dataset, which includes labeled time series of latency. We discuss the limitations of traditional methods, the effectiveness of our proposed approaches, and how to apply those for real-time network quality monitoring.
{"title":"Inferring change points in unlabelled time series data collected from the network diagnosis tool","authors":"Cleiton M. de Almeida, Rosa M. M. Leão, Edmundo de Souza e Silva","doi":"10.1007/s12243-025-01103-2","DOIUrl":"10.1007/s12243-025-01103-2","url":null,"abstract":"<div><p>Detecting significant statistical changes in time series data, such as change points and anomalies, is crucial for various applications, including computer network performance monitoring. Despite the availability of many detection algorithms, applying these techniques to real-world data remains a challenging topic due to their distinct effectiveness in different domains. This study focuses on identifying change points and anomalies in throughput and latency time series data from residential networks, emphasizing online methods. We evaluate well-established methods like Shewhart, EWMA, and CUSUM, which are simple to implement, and identify their limitations in real-world scenarios. We propose simple modifications to these classical methods to enhance their effectiveness when applied to data from network measurements. Furthermore, we introduce a new and flexible method, based on the concept of weighted voting. It is designed to detect change points while providing useful information to assess confidence in the results. Our methods were evaluated on two datasets: one we collected using the NDT protocol in Brazil and another from the publicly available Shao Dataset, which includes labeled time series of latency. We discuss the limitations of traditional methods, the effectiveness of our proposed approaches, and how to apply those for real-time network quality monitoring.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"80 9-10","pages":"775 - 792"},"PeriodicalIF":2.2,"publicationDate":"2025-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145210708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-05-24DOI: 10.1007/s12243-025-01099-9
Abdellah Adib, Sofia Ben Jebara, Raja Elassali, Khalid Minaoui, Samir Saoudi
{"title":"ISIVC 2024 special issue—signal and audio processing, digital communications, and networking","authors":"Abdellah Adib, Sofia Ben Jebara, Raja Elassali, Khalid Minaoui, Samir Saoudi","doi":"10.1007/s12243-025-01099-9","DOIUrl":"10.1007/s12243-025-01099-9","url":null,"abstract":"","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"80 and networking","pages":"375 - 377"},"PeriodicalIF":2.2,"publicationDate":"2025-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145169779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}