Deep Learning-Based Symptomizing Cyber Threats Using Adaptive 5G Shared Slice Security Approaches

被引:8
|
作者
Majeed, Abdul [1 ]
Alnajim, Abdullah M. [2 ]
Waseem, Athar [1 ]
Khaliq, Aleem [1 ]
Naveed, Aqdas [1 ]
Habib, Shabana [2 ]
Islam, Muhammad [3 ]
Khan, Sheroz [3 ]
机构
[1] Int Islamic Univ, Fac Engn & Technol, Dept Elect Engn, Islamabad 44000, Pakistan
[2] Qassim Univ, Coll Comp, Dept Informat Technol, Buraydah 51452, Saudi Arabia
[3] Onaizah Coll, Onaizah Coll Engn & Informat Technol, Dept Elect Engn, Qasim 56447, Saudi Arabia
来源
FUTURE INTERNET | 2023年 / 15卷 / 06期
关键词
PACDS; VNF; vCTS; interslice; intraslice; NWDAF; 5G network; slice security; NETWORKS;
D O I
10.3390/fi15060193
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In fifth Generation (5G) networks, protection from internal attacks, external breaches, violation of confidentiality, and misuse of network vulnerabilities is a challenging task. Various approaches, especially deep-learning (DL) prototypes, have been adopted in order to counter such challenges. For 5G network defense, DL module are recommended here in order to symptomize suspicious NetFlow data. This module behaves as a virtual network function (VNF) and is placed along a 5G network. The DL module as a cyber threat-symptomizing (CTS) unit acts as a virtual security scanner along the 5G network data analytic function (NWDAF) to monitor the network data. When the data were found to be suspicious, causing network bottlenecks and let-downs of end-user services, they were labeled as "Anomalous". For the best proactive and adaptive cyber defense system (PACDS), a logically organized modular approach has been followed to design the DL security module. In the application context, improvements have been made to input features dimension and computational complexity reduction with better response times and accuracy in outlier detection. Moreover, key performance indicators (KPIs) have been proposed for security module placement to secure interslice and intraslice communication channels from any internal or external attacks, also suggesting an adaptive defense mechanism and indicating its placement on a 5G network. Among the chosen DL models, the CNN model behaves as a stable model during behavior analysis in the results. The model classifies botnet-labeled data with 99.74% accuracy and higher precision.
引用
收藏
页数:16
相关论文
共 50 条
  • [1] Machine Learning-based Slice Management in 5G Networks for Emergency Scenarios
    Arora, Apoorva
    Dimitrovski, Toni
    Litjens, Remco
    Zhang, Haibin
    2021 JOINT EUROPEAN CONFERENCE ON NETWORKS AND COMMUNICATIONS & 6G SUMMIT (EUCNC/6G SUMMIT), 2021, : 193 - 198
  • [2] A Self-Adaptive Deep Learning-Based System for Anomaly Detection in 5G Networks
    Fernandez Maimo, Lorenzo
    Perales Gomez, Angel Luis
    Garcia Clemente, Felix J.
    Gil Perez, Manuel
    Martinez Perez, Gregorio
    IEEE ACCESS, 2018, 6 : 7700 - 7712
  • [3] A Deep Learning-Based Smart Framework for Cyber-Physical and Satellite System Security Threats Detection
    Ashraf, Imran
    Narra, Manideep
    Umer, Muhammad
    Majeed, Rizwan
    Sadiq, Saima
    Javaid, Fawad
    Rasool, Nouman
    ELECTRONICS, 2022, 11 (04)
  • [4] RL-NSB: Reinforcement Learning-Based 5G Network Slice Broker
    Sciancalepore, Vincenzo
    Costa-Perez, Xavier
    Banchs, Albert
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2019, 27 (04) : 1543 - 1557
  • [5] Deep Learning-Based Autodetection of 5G NR mmWave Waveforms
    Lee, Taekyun
    Mahadevan, Abhinav
    Kim, Hyeji
    Andrews, Jeffrey G.
    ICC 2024 - IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2024, : 1625 - 1630
  • [6] Deep Learning-Based Throughput Prediction in 5G Cellular Networks
    Batool, Iqra
    Fouda, Mostafa M.
    Fadlullah, Zubair Md
    2024 INTERNATIONAL CONFERENCE ON SMART APPLICATIONS, COMMUNICATIONS AND NETWORKING, SMARTNETS-2024, 2024,
  • [7] Deep Learning-Based Handover Prediction for 5G and Beyond Networks
    Lima, Joao P. S. H.
    de Medeiros, Alvaro A. M.
    de Aguiar, Eduardo P.
    Silva, Edelberto F.
    de Sousa, Vicente A.
    Nunes, Marcelo L.
    Reis, Alysson L.
    ICC 2023-IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2023, : 3468 - 3473
  • [8] Deep learning-based 5G indoor positioning in a manufacturing environment
    Vietz, Hannes
    Loecklin, Andreas
    Ammar, Hamza Ben Haj
    Weyrich, Michael
    2022 IEEE 27TH INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES AND FACTORY AUTOMATION (ETFA), 2022,
  • [9] Deep Reinforcement Learning-Based Network Slicing for beyond 5G
    Suh, Kyungjoo
    Kim, Sunwoo
    Ahn, Yongjun
    Kim, Seungnyun
    Ju, Hyungyu
    Shim, Byonghyo
    IEEE Access, 2022, 10 : 7384 - 7395
  • [10] Deep Reinforcement Learning-Based Network Slicing for Beyond 5G
    Suh, Kyungjoo
    Kim, Sunwoo
    Ahn, Yongjun
    Kim, Seungnyun
    Ju, Hyungyu
    Shim, Byonghyo
    IEEE ACCESS, 2022, 10 : 7384 - 7395