AI-Based Malicious Encrypted Traffic Detection in 5G Data Collection and Secure Sharing

被引:0
|
作者
Han, Gang [1 ,2 ,3 ]
Zhang, Haohe [2 ,3 ]
Zhang, Zhongliang [1 ]
Ma, Yan [3 ]
Yang, Tiantian [3 ]
机构
[1] Hangzhou Dianzi Univ, Sch Management, Hangzhou 310005, Peoples R China
[2] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
[3] Xian Univ Posts & Telecommun, Shaanxi Key Lab Informat Commun Network & Secur, Xian 710121, Peoples R China
来源
ELECTRONICS | 2025年 / 14卷 / 01期
基金
中国国家自然科学基金;
关键词
deep learning; adversarial generative networks; hybrid neural networks; encrypt malicious traffic; domain adaptation;
D O I
10.3390/electronics14010051
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the development and widespread application of network information, new technologies led by 5G are emerging, resulting in an increasingly complex network security environment and more diverse attack methods. Unlike traditional networks, 5G networks feature higher connection density, faster data transmission speeds, and lower latency, which are widely applied in scenarios such as smart cities, the Internet of Things, and autonomous driving. The vast amounts of sensitive data generated by these applications become primary targets during the processes of collection and secure sharing, and unauthorized access or tampering could lead to severe data breaches and integrity issues. However, as 5G networks extensively employ encryption technologies to protect data transmission, attackers can hide malicious content within encrypted communication, rendering traditional content-based traffic detection methods ineffective for identifying malicious encrypted traffic. To address this challenge, this paper proposes a malicious encrypted traffic detection method based on reconstructive domain adaptation and adversarial hybrid neural networks. The proposed method integrates generative adversarial networks with ResNet, ResNeXt, and DenseNet to construct an adversarial hybrid neural network, aiming to tackle the challenges of encrypted traffic detection. On this basis, a reconstructive domain adaptation module is introduced to reduce the distribution discrepancy between the source domain and the target domain, thereby enhancing cross-domain detection capabilities. By preprocessing traffic data from public datasets, the proposed method is capable of extracting deep features from encrypted traffic without the need for decryption. The generator utilizes the adversarial hybrid neural network module to generate realistic malicious encrypted traffic samples, while the discriminator achieves sample classification through high-dimensional feature extraction. Additionally, the domain classifier within the reconstructive domain adaptation module further improves the model's stability and generalization across different network environments and time periods. Experimental results demonstrate that the proposed method significantly improves the accuracy and efficiency of malicious encrypted traffic detection in 5G network environments, effectively enhancing the detection performance of malicious traffic in 5G networks.
引用
收藏
页数:24
相关论文
共 50 条
  • [41] Anomaly Detection Method for Integrated Encrypted Malicious Traffic Based on RFCNN-GRU
    Zhao, Huiqi
    Ma, Yaowen
    Fan, Fang
    Zhang, Huajie
    FRONTIERS IN CYBER SECURITY, FCS 2023, 2024, 1992 : 457 - 471
  • [42] Enhanced AI-Based CSI Prediction Solutions for Massive MIMO in 5G and 6G Systems
    Burghal, Daoud
    Li, Yang
    Madadi, Pranav
    Hu, Yeqing
    Jeon, Jeongho
    Cho, Joonyoung
    Molisch, Andreas F.
    Zhang, Jianzhong
    IEEE ACCESS, 2023, 11 : 117810 - 117825
  • [43] Efficient and Secure Data Sharing for 5G Flying Drones: A Blockchain-Enabled Approach
    Feng, Chaosheng
    Yu, Keping
    Bashir, Ali Kashif
    Al-Otaibi, Yasser D.
    Lu, Yang
    Chen, Shengbo
    Zhang, Di
    IEEE NETWORK, 2021, 35 (01): : 130 - 137
  • [44] 5G based SmartCity Convergence Service Platform for Data sharing
    Kim, Jiyeon
    Jang, Sooyoung
    Jee, Deockgu
    Ko, Eunjin
    Choi, Seung Han
    Han, Mi Kyong
    11TH INTERNATIONAL CONFERENCE ON ICT CONVERGENCE: DATA, NETWORK, AND AI IN THE AGE OF UNTACT (ICTC 2020), 2020, : 1522 - 1524
  • [45] GRADE:Deep learning and garlic routing-based secure data sharing framework for IIoT beyond 5G
    Nilesh Kumar Jadav
    Riya Kakkar
    Harsh Mankodiya
    Rajesh Gupta
    Sudeep Tanwar
    Smita Agrawal
    Ravi Sharma
    Digital Communications and Networks, 2023, 9 (02) : 422 - 435
  • [46] Encrypted 5G Smallcell Backhaul Traffic Classification Using Deep Learning
    Gao, Zongning
    Zhang, Shunliang
    SCIENCE OF CYBER SECURITY, SCISEC 2022 WORKSHOPS, 2022, 1680 : 16 - 27
  • [47] AI-based anomaly detection in tunnel excavation data
    Macke, Sebastian
    Munsch, Stephan
    Stascheit, Janosch
    Maidl, Ulrich
    Hegemann, Felix
    Geomechanik und Tunnelbau, 2024, 17 (04): : 312 - 323
  • [48] GRADE: Deep learning and garlic routing-based secure data sharing framework for IIoT beyond 5G
    Jadav, Nilesh Kumar
    Kakkar, Riya
    Mankodiya, Harsh
    Gupta, Rajesh
    Tanwar, Sudeep
    Agrawal, Smita
    Sharma, Ravi
    DIGITAL COMMUNICATIONS AND NETWORKS, 2023, 9 (02) : 422 - 435
  • [49] AI-based preeclampsia detection and prediction with electrocardiogram data
    Butler, Liam
    Gunturkun, Fatma
    Chinthala, Lokesh
    Karabayir, Ibrahim
    Tootooni, Mohammad S.
    Bakir-Batu, Berna
    Celik, Turgay
    Akbilgic, Oguz
    Davis, Robert L.
    FRONTIERS IN CARDIOVASCULAR MEDICINE, 2024, 11
  • [50] BSDCE-IoV: Blockchain-Based Secure Data Collection and Exchange Scheme for IoV in 5G Environment
    Karim, Sulaiman M.
    Habbal, Adib
    Chaudhry, Shehzad Ashraf
    Irshad, Azeem
    IEEE ACCESS, 2023, 11 : 36158 - 36175