From the course: AI for Telecom: Network Optimization and Security in 5G/Edge Systems
Unlock this course with a free trial
Join today to access over 24,600 courses taught by industry experts.
Exercise: AI model for anomaly detection
From the course: AI for Telecom: Network Optimization and Security in 5G/Edge Systems
Exercise: AI model for anomaly detection
- [Instructor] Welcome to the lab session of the AI for Telecom course. The objective of this lab is to build an AI-based system using isolation forest in which we have to analyze the NRF logs and flag for any anomalies. There are five steps to this lab. In the first step, we will just upload the file. For example, NRF_Log is a standard log file of NRF, and then we will do the passing of that log file into a structured table. Then we will move that data into numerical values. In the fourth step, we will run the isolation forest algorithm, and lastly, we will interpret those anomalies. So there are two log files what we have, and you can see this in the GitHub file. To show you an example log file, here this is what the log file looks like. These are the standard NRF log messages, which you see in the NRF log file. So this is the normal log file, and then there is a bad log file, which is containing some extra lines of code. Here what you can see, these are the bad messages. For…