AI-Based Malicious Encrypted Traffic Detection in 5G Data Collection and Secure Sharing

被引:0
|
作者
Han, Gang [1 ,2 ,3 ]
Zhang, Haohe [2 ,3 ]
Zhang, Zhongliang [1 ]
Ma, Yan [3 ]
Yang, Tiantian [3 ]
机构
[1] Hangzhou Dianzi Univ, Sch Management, Hangzhou 310005, Peoples R China
[2] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
[3] Xian Univ Posts & Telecommun, Shaanxi Key Lab Informat Commun Network & Secur, Xian 710121, Peoples R China
来源
ELECTRONICS | 2025年 / 14卷 / 01期
基金
中国国家自然科学基金;
关键词
deep learning; adversarial generative networks; hybrid neural networks; encrypt malicious traffic; domain adaptation;
D O I
10.3390/electronics14010051
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the development and widespread application of network information, new technologies led by 5G are emerging, resulting in an increasingly complex network security environment and more diverse attack methods. Unlike traditional networks, 5G networks feature higher connection density, faster data transmission speeds, and lower latency, which are widely applied in scenarios such as smart cities, the Internet of Things, and autonomous driving. The vast amounts of sensitive data generated by these applications become primary targets during the processes of collection and secure sharing, and unauthorized access or tampering could lead to severe data breaches and integrity issues. However, as 5G networks extensively employ encryption technologies to protect data transmission, attackers can hide malicious content within encrypted communication, rendering traditional content-based traffic detection methods ineffective for identifying malicious encrypted traffic. To address this challenge, this paper proposes a malicious encrypted traffic detection method based on reconstructive domain adaptation and adversarial hybrid neural networks. The proposed method integrates generative adversarial networks with ResNet, ResNeXt, and DenseNet to construct an adversarial hybrid neural network, aiming to tackle the challenges of encrypted traffic detection. On this basis, a reconstructive domain adaptation module is introduced to reduce the distribution discrepancy between the source domain and the target domain, thereby enhancing cross-domain detection capabilities. By preprocessing traffic data from public datasets, the proposed method is capable of extracting deep features from encrypted traffic without the need for decryption. The generator utilizes the adversarial hybrid neural network module to generate realistic malicious encrypted traffic samples, while the discriminator achieves sample classification through high-dimensional feature extraction. Additionally, the domain classifier within the reconstructive domain adaptation module further improves the model's stability and generalization across different network environments and time periods. Experimental results demonstrate that the proposed method significantly improves the accuracy and efficiency of malicious encrypted traffic detection in 5G network environments, effectively enhancing the detection performance of malicious traffic in 5G networks.
引用
收藏
页数:24
相关论文
共 50 条
  • [31] Enhancing Fan Engagement in a 5G Stadium With AI-Based Technologies and Live Streaming
    Wu, Cheng-Wen
    Shieh, Ming-Der
    Lien, Jenn-Jier James
    Yang, Jar-Ferr
    Chu, Wei-Ta
    Huang, Tsang-Hai
    Hsieh, Han-Chuan
    Chiu, Hung-Ta
    Tu, Kuo-Cheng
    Chen, Yen-Ting
    Lin, Shian-Yu
    Hu, Jia-Jun
    Lin, Chen-Huan
    Jheng, Cheng-Siang
    IEEE SYSTEMS JOURNAL, 2022, 16 (04): : 6590 - 6601
  • [32] Data sharing scheme for 5G IoT based on blockchain
    Ning, Weiye
    Xie, Xin
    Huang, Yuhui
    Hu, Fengping
    IWCMC 2021: 2021 17TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2021, : 327 - 329
  • [33] Research on Data Feature Processing and Detection of Encrypted Malicious Traffic in Graph Neural Networks
    Kan, Hong
    Ren, Ran
    International Journal of Network Security, 2024, 26 (06) : 985 - 991
  • [34] AI-based Accident Severity Detection Scheme for V2X Communication beyond 5G Networks
    Nair, Anuja
    Tanwar, Sudeep
    2023 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS, ICC WORKSHOPS, 2023, : 1002 - 1007
  • [35] Automated Multi-service 5G Session Timer via AI-based Network Data Analytics Function
    Kweon, K.
    Gutierrez-Estevez, D. M.
    Pujol-Roig, J.
    Jeong, S.
    2020 IEEE GLOBECOM WORKSHOPS (GC WKSHPS), 2020,
  • [36] Evaluation of AI-based Malware Detection in IoT Network Traffic
    Prazeres, Nuno
    Costa, Rogerio Luis de C.
    Santos, Leonel
    Rabadao, Carlos
    SECRYPT : PROCEEDINGS OF THE 19TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2022, : 580 - 585
  • [37] Encrypted 5G Over-The-Top Voice Traffic Identification Based on Deep Learning
    Qiao, Zhuang
    Zhai, Liuqun
    Zhang, Shunliang
    Zhang, Xiaohui
    26TH IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (IEEE ISCC 2021), 2021,
  • [38] HEIMDALL: an AI-based infrastructure for traffic monitoring and anomalies detection
    Atzori, Andrea
    Barra, Silvio
    Carta, Salvatore
    Fenu, Gianni
    Podda, Alessandro Sebastian
    2021 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS AND OTHER AFFILIATED EVENTS (PERCOM WORKSHOPS), 2021, : 154 - 159
  • [39] AI-Based Helmet Violation Detection for Traffic Management System
    Said, Yahia
    Alassaf, Yahya
    Ghodhbani, Refka
    Alsariera, Yazan Ahmad
    Saidani, Taoufik
    Ben Rhaiem, Olfa
    Makhdoum, Mohamad Khaled
    Hleili, Manel
    CMES-COMPUTER MODELING IN ENGINEERING & SCIENCES, 2024, 141 (01): : 733 - 749
  • [40] Emerging Trends in 5G Malicious Traffic Analysis: Enhancing Incremental Learning Intrusion Detection Strategies
    Wang, Zihao
    Fok, Kar Wai
    Thing, Vrizlynn L. L.
    2024 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE, CSR, 2024, : 114 - 119