Enhancing Security in 5G Edge Networks: Predicting Real-Time Zero Trust Attacks Using Machine Learning in SDN Environments

被引:0
|
作者
Ashfaq, Fiza [1 ]
Wasim, Muhammad [1 ]
Shah, Mumtaz Ali [2 ]
Ahad, Abdul [3 ,4 ]
Pires, Ivan Miguel [5 ]
机构
[1] KUST, Dept Comp Sci, UMT Sialkot Campus, Sialkot 51040, Pakistan
[2] Univ Wah, Dept Comp Sci, Wah Cantt 47040, Pakistan
[3] Northwestern Polytech Univ, Sch Software, Xian 710072, Peoples R China
[4] Istanbul Tech Univ ITU, Dept Elect & Commun Engn, TR-34469 Istanbul, Turkiye
[5] Univ Aveiro, Inst Telecomunicacoes, Escola Super Tecnol & Gestao Agueda, P-3810193 Agueda, Portugal
关键词
cyber security; SDN; machine learning; zero trust; real-time; intrusion detection; intrusion prevention; FRAMEWORK;
D O I
10.3390/s25061905
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
The Internet has been vulnerable to several attacks as it has expanded, including spoofing, viruses, malicious code attacks, and Distributed Denial of Service (DDoS). The three main types of attacks most frequently reported in the current period are viruses, DoS attacks, and DDoS attacks. Advanced DDoS and DoS attacks are too complex for traditional security solutions, such as intrusion detection systems and firewalls, to detect. The combination of machine learning methods with AI-based machine learning has led to the introduction of several novel attack detection systems. Due to their remarkable performance, machine learning models, in particular, have been essential in identifying DDoS attacks. However, there is a considerable gap in the work on real-time detection of such attacks. This study uses Mininet with the POX Controller to simulate an environment to detect DDoS attacks in real-time settings. The CICDDoS2019 dataset identifies and classifies such attacks in the simulated environment. In addition, a virtual software-defined network (SDN) is used to collect network information from the surrounding area. When an attack occurs, the pre-trained models are used to analyze the traffic and predict the attack in real-time. The performance of the proposed methodology is evaluated based on two metrics: accuracy and detection time. The results reveal that the proposed model achieves an accuracy of 99% within 1 s of the detection time.
引用
收藏
页数:29
相关论文
共 50 条
  • [1] Security and 5G: Attack mitigation using Reinforcement Learning in SDN networks
    Alvaro Fernandez-Carrasco, Jose
    Segurola-Gil, Lander
    Zola, Francesco
    Orduna-Urrutia, Raul
    2022 IEEE FUTURE NETWORKS WORLD FORUM, FNWF, 2022, : 622 - 627
  • [2] Real-time Anomaly Detection in SDN Architecture using Integrated SIEM and Machine Learning for Enhancing Network Security
    Sebbar, Anass
    Cherqi, Othmane
    Chougdali, Khalid
    Boulmalf, Mohammed
    IEEE CONFERENCE ON GLOBAL COMMUNICATIONS, GLOBECOM, 2023, : 1795 - 1800
  • [3] Enhancing the Security of SDN in 5G: A Hybrid Feature Selection Based Ensemble Machine Learning Framework for Classification of Cyber-Attacks
    Mahendra Pratap Singh
    Virendra Pratap Haimashreelakshmi
    Maanak Singh
    undefined Gupta
    SN Computer Science, 6 (3)
  • [4] Enhancing Security in 5G Networks: A Hybrid Machine Learning Approach for Attack Classification
    Kholidy, Hisham A.
    Berrouachedi, Abdelkader
    Benkhelifa, Elhadj
    Jaziri, Rakia
    2023 20TH ACS/IEEE INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, AICCSA, 2023,
  • [5] Attacks against Machine Learning Models in 5G Networks
    Zolotukhin, Mikhail
    Zhang, Di
    Miraghaie, Parsa
    Hamalainen, Timo
    Ke, Wang
    Dunderfelt, Marja
    2022 6TH EUROPEAN CONFERENCE ON ELECTRICAL ENGINEERING & COMPUTER SCIENCE, ELECS, 2022, : 106 - 114
  • [6] Intelligent Real-Time IoT Traffic Steering in 5G Edge Networks
    Math, Sa
    Tam, Prohim
    Kim, Seokhoon
    CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 67 (03): : 3433 - 3450
  • [7] 5GC-SDP: Security Enhancement of 5G Core Networks With Zero Trust
    Yan, Zeqing
    Yu, Guangxi
    Zhan, Mengqi
    Zhang, Yan
    Hu, Jiaxi
    PROCEEDINGS OF THE 2024 27 TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, CSCWD 2024, 2024, : 1597 - 1602
  • [8] On Sustained Zero Trust Conceptualization Security for Mobile Core Networks in 5G and Beyond
    Bello, Yahuza
    Hussein, Ahmed Refaey
    Ulema, Mehmet
    Koilpillai, Juanita
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2022, 19 (02): : 1876 - 1889
  • [9] Near real-time security system applied to SDN environments in IoT networks using convolutional neural network
    de Assis, Marcos V. O.
    Carvalho, Luiz F.
    Rodrigues, Joel J. P. C.
    Lloret, Jaime
    Proenca Jr, Mario L.
    COMPUTERS & ELECTRICAL ENGINEERING, 2020, 86
  • [10] Real-Time Video Adaptation in Virtualised 5G Networks
    Salva-Garcia, Pablo
    Alcaraz-Calero, Jose M.
    Wang, Qi
    Barros, Maria
    Gavras, Anastasius
    PROCEEDINGS OF THE IEEE LCN: 2019 44TH ANNUAL IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2019), 2019, : 214 - 217