AI-Based Malicious Encrypted Traffic Detection in 5G Data Collection and Secure Sharing

被引:0
|
作者
Han, Gang [1 ,2 ,3 ]
Zhang, Haohe [2 ,3 ]
Zhang, Zhongliang [1 ]
Ma, Yan [3 ]
Yang, Tiantian [3 ]
机构
[1] Hangzhou Dianzi Univ, Sch Management, Hangzhou 310005, Peoples R China
[2] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
[3] Xian Univ Posts & Telecommun, Shaanxi Key Lab Informat Commun Network & Secur, Xian 710121, Peoples R China
来源
ELECTRONICS | 2025年 / 14卷 / 01期
基金
中国国家自然科学基金;
关键词
deep learning; adversarial generative networks; hybrid neural networks; encrypt malicious traffic; domain adaptation;
D O I
10.3390/electronics14010051
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the development and widespread application of network information, new technologies led by 5G are emerging, resulting in an increasingly complex network security environment and more diverse attack methods. Unlike traditional networks, 5G networks feature higher connection density, faster data transmission speeds, and lower latency, which are widely applied in scenarios such as smart cities, the Internet of Things, and autonomous driving. The vast amounts of sensitive data generated by these applications become primary targets during the processes of collection and secure sharing, and unauthorized access or tampering could lead to severe data breaches and integrity issues. However, as 5G networks extensively employ encryption technologies to protect data transmission, attackers can hide malicious content within encrypted communication, rendering traditional content-based traffic detection methods ineffective for identifying malicious encrypted traffic. To address this challenge, this paper proposes a malicious encrypted traffic detection method based on reconstructive domain adaptation and adversarial hybrid neural networks. The proposed method integrates generative adversarial networks with ResNet, ResNeXt, and DenseNet to construct an adversarial hybrid neural network, aiming to tackle the challenges of encrypted traffic detection. On this basis, a reconstructive domain adaptation module is introduced to reduce the distribution discrepancy between the source domain and the target domain, thereby enhancing cross-domain detection capabilities. By preprocessing traffic data from public datasets, the proposed method is capable of extracting deep features from encrypted traffic without the need for decryption. The generator utilizes the adversarial hybrid neural network module to generate realistic malicious encrypted traffic samples, while the discriminator achieves sample classification through high-dimensional feature extraction. Additionally, the domain classifier within the reconstructive domain adaptation module further improves the model's stability and generalization across different network environments and time periods. Experimental results demonstrate that the proposed method significantly improves the accuracy and efficiency of malicious encrypted traffic detection in 5G network environments, effectively enhancing the detection performance of malicious traffic in 5G networks.
引用
收藏
页数:24
相关论文
共 50 条
  • [21] AI-based Anomaly Detection for Data-driven Decisions in Secure Smart Cities
    Laemmel, Philipp
    Borgert, Stephan
    Brunzel, Lisa
    Darius, Paul
    ERCIM NEWS, 2024, (138):
  • [22] Blockchain-based secure and trusted data sharing scheme for autonomous vehicle underlying 5G
    Kakkar, Riya
    Gupta, Rajesh
    Agrawal, Smita
    Tanwar, Sudeep
    Sharma, Ravi
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 67
  • [23] AI-Based Intrusion Detection for a Secure Internet of Things (IoT)
    Aljohani, Reham
    Bushnag, Anas
    Alessa, Ali
    JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2024, 32 (03)
  • [24] AI-based antenna technology for 5G software-defined radio platform
    Wang, Lan-Hsin
    Hsiao, Fu-Ren
    Zhang, Yu-Xuan
    Chiu, Tsung-Wen
    2018 INTERNATIONAL SYMPOSIUM ON ANTENNAS AND PROPAGATION (ISAP), 2018,
  • [25] A Survey on Green Enablers: A Study on the Energy Efficiency of AI-Based 5G Networks
    Ezzeddine, Zeinab
    Khalil, Ayman
    Zeddini, Besma
    Ouslimani, Habiba Hafdallah
    SENSORS, 2024, 24 (14)
  • [26] Transfer Learning to adapt 5G AI-based Fingerprint Localization across Environments
    Stahlke, Maximilian
    Feigl, Tobias
    Garcia, Mario H. Casta Neda
    Stirling-Gallacher, Richard A.
    Seitz, Jochen
    Mutschler, Christopher
    2022 IEEE 95TH VEHICULAR TECHNOLOGY CONFERENCE (VTC2022-SPRING), 2022,
  • [27] Encrypted Malicious Traffic Detection Based on Graph Convolutional Network and Temporal Dissection
    Liu, Yuchen
    Wang, Shanshan
    Jin Au-yeung
    Chen, Zhenxiang
    PROCEEDINGS OF THE 2024 27 TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, CSCWD 2024, 2024, : 187 - 192
  • [28] Encrypted malicious traffic detection based on natural language processing and deep learning
    Zang, Xiaodong
    Wang, Tongliang
    Zhang, Xinchang
    Gong, Jian
    Gao, Peng
    Zhang, Guowei
    COMPUTER NETWORKS, 2024, 250
  • [29] AI-Based Autonomous Control, Management, and Orchestration in 5G: From Standards to Algorithms
    Bega, Dario
    Gramaglia, Marco
    Perez, Ramon
    Fiore, Marco
    Banchs, Albert
    Costa-Perez, Xavier
    IEEE NETWORK, 2020, 34 (06): : 14 - 20
  • [30] INTELLIGENT COGNITIVE RADIO IN 5G: AI-BASED HIERARCHICAL COGNITIVE CELLULAR NETWORKS
    Wang, Dan
    Song, Bin
    Chen, Dong
    Du, Xiaojiang
    IEEE WIRELESS COMMUNICATIONS, 2019, 26 (03) : 54 - 61