Deep Learning-Based Symptomizing Cyber Threats Using Adaptive 5G Shared Slice Security Approaches

被引:8
|
作者
Majeed, Abdul [1 ]
Alnajim, Abdullah M. [2 ]
Waseem, Athar [1 ]
Khaliq, Aleem [1 ]
Naveed, Aqdas [1 ]
Habib, Shabana [2 ]
Islam, Muhammad [3 ]
Khan, Sheroz [3 ]
机构
[1] Int Islamic Univ, Fac Engn & Technol, Dept Elect Engn, Islamabad 44000, Pakistan
[2] Qassim Univ, Coll Comp, Dept Informat Technol, Buraydah 51452, Saudi Arabia
[3] Onaizah Coll, Onaizah Coll Engn & Informat Technol, Dept Elect Engn, Qasim 56447, Saudi Arabia
来源
FUTURE INTERNET | 2023年 / 15卷 / 06期
关键词
PACDS; VNF; vCTS; interslice; intraslice; NWDAF; 5G network; slice security; NETWORKS;
D O I
10.3390/fi15060193
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In fifth Generation (5G) networks, protection from internal attacks, external breaches, violation of confidentiality, and misuse of network vulnerabilities is a challenging task. Various approaches, especially deep-learning (DL) prototypes, have been adopted in order to counter such challenges. For 5G network defense, DL module are recommended here in order to symptomize suspicious NetFlow data. This module behaves as a virtual network function (VNF) and is placed along a 5G network. The DL module as a cyber threat-symptomizing (CTS) unit acts as a virtual security scanner along the 5G network data analytic function (NWDAF) to monitor the network data. When the data were found to be suspicious, causing network bottlenecks and let-downs of end-user services, they were labeled as "Anomalous". For the best proactive and adaptive cyber defense system (PACDS), a logically organized modular approach has been followed to design the DL security module. In the application context, improvements have been made to input features dimension and computational complexity reduction with better response times and accuracy in outlier detection. Moreover, key performance indicators (KPIs) have been proposed for security module placement to secure interslice and intraslice communication channels from any internal or external attacks, also suggesting an adaptive defense mechanism and indicating its placement on a 5G network. Among the chosen DL models, the CNN model behaves as a stable model during behavior analysis in the results. The model classifies botnet-labeled data with 99.74% accuracy and higher precision.
引用
收藏
页数:16
相关论文
共 50 条
  • [21] DL-SkLSTM approach for cyber security threats detection in 5G enabled IIoT
    Rajak A.
    Tripathi R.
    International Journal of Information Technology, 2024, 16 (1) : 13 - 20
  • [22] On the Performance of a Deep Learning-Based Anomaly Detection System for 5G Networks
    Fernandez Maimo, Lorenzo
    Garcia Clemente, Felix J.
    Gil Perez, Manuel
    Martinez Perez, Gregorio
    2017 IEEE SMARTWORLD, UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTED, SCALABLE COMPUTING & COMMUNICATIONS, CLOUD & BIG DATA COMPUTING, INTERNET OF PEOPLE AND SMART CITY INNOVATION (SMARTWORLD/SCALCOM/UIC/ATC/CBDCOM/IOP/SCI), 2017,
  • [23] Deep Learning-based Predictive Beam Management for 5G mmWave Systems
    Kaya, Aliye Ozge
    Viswanathan, Harish
    2021 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2021,
  • [24] Integration of Machine Learning-Based Attack Detectors into Defensive Exercises of a 5G Cyber Range
    Mozo, Alberto
    Pastor, Antonio
    Karamchandani, Amit
    de la Cal, Luis
    Rivera, Diego
    Moreno, Jose Ignacio
    APPLIED SCIENCES-BASEL, 2022, 12 (20):
  • [25] Deep Learning for Security Problems in 5G Heterogeneous Networks
    Lv, Zhihan
    Singh, Amit Kumar
    Li, Jinhua
    IEEE NETWORK, 2021, 35 (02): : 67 - 73
  • [26] On self-adaptive 5G network slice QoS management system: a deep reinforcement learning approach
    Sheng-Tzong Cheng
    Chang Yu He
    Ya-Jin Lyu
    Der-Jiunn Deng
    Wireless Networks, 2023, 29 : 1269 - 1279
  • [27] On self-adaptive 5G network slice QoS management system: a deep reinforcement learning approach
    Cheng, Sheng-Tzong
    He, Chang Yu
    Lyu, Ya-Jin
    Deng, Der-Jiunn
    WIRELESS NETWORKS, 2023, 29 (03) : 1269 - 1279
  • [28] Attacks and Threats Verification Based on 4G/5G Security Architecture
    Yang, Lie
    Weng, Chien-Erh
    Chen, Hsing-Chung
    Chen, Yang-Cheng-Kuang
    Yao, Yung-Cheng
    INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING, IMIS-2023, 2023, 177 : 240 - 249
  • [29] Deep Reinforcement Learning-Based Joint Scheduling of eMBB and URLLC in 5G Networks
    Li, Jing
    Zhang, Xing
    IEEE WIRELESS COMMUNICATIONS LETTERS, 2020, 9 (09) : 1543 - 1546
  • [30] 5G Service Function Chain Provisioning: A Deep Reinforcement Learning-Based Framework
    Tran, Thinh Duy
    Jaumard, Brigitte
    Duong, Quang Huy
    Nguyen, Kim-Khoa
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2024, 21 (06): : 6614 - 6629