Deep Learning-Based Symptomizing Cyber Threats Using Adaptive 5G Shared Slice Security Approaches

被引:8
|
作者
Majeed, Abdul [1 ]
Alnajim, Abdullah M. [2 ]
Waseem, Athar [1 ]
Khaliq, Aleem [1 ]
Naveed, Aqdas [1 ]
Habib, Shabana [2 ]
Islam, Muhammad [3 ]
Khan, Sheroz [3 ]
机构
[1] Int Islamic Univ, Fac Engn & Technol, Dept Elect Engn, Islamabad 44000, Pakistan
[2] Qassim Univ, Coll Comp, Dept Informat Technol, Buraydah 51452, Saudi Arabia
[3] Onaizah Coll, Onaizah Coll Engn & Informat Technol, Dept Elect Engn, Qasim 56447, Saudi Arabia
来源
FUTURE INTERNET | 2023年 / 15卷 / 06期
关键词
PACDS; VNF; vCTS; interslice; intraslice; NWDAF; 5G network; slice security; NETWORKS;
D O I
10.3390/fi15060193
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In fifth Generation (5G) networks, protection from internal attacks, external breaches, violation of confidentiality, and misuse of network vulnerabilities is a challenging task. Various approaches, especially deep-learning (DL) prototypes, have been adopted in order to counter such challenges. For 5G network defense, DL module are recommended here in order to symptomize suspicious NetFlow data. This module behaves as a virtual network function (VNF) and is placed along a 5G network. The DL module as a cyber threat-symptomizing (CTS) unit acts as a virtual security scanner along the 5G network data analytic function (NWDAF) to monitor the network data. When the data were found to be suspicious, causing network bottlenecks and let-downs of end-user services, they were labeled as "Anomalous". For the best proactive and adaptive cyber defense system (PACDS), a logically organized modular approach has been followed to design the DL security module. In the application context, improvements have been made to input features dimension and computational complexity reduction with better response times and accuracy in outlier detection. Moreover, key performance indicators (KPIs) have been proposed for security module placement to secure interslice and intraslice communication channels from any internal or external attacks, also suggesting an adaptive defense mechanism and indicating its placement on a 5G network. Among the chosen DL models, the CNN model behaves as a stable model during behavior analysis in the results. The model classifies botnet-labeled data with 99.74% accuracy and higher precision.
引用
收藏
页数:16
相关论文
共 50 条
  • [41] DTL-5G: Deep transfer learning-based DDoS attack detection in 5G and beyond networks
    Farzaneh, Behnam
    Shahriar, Nashid
    Al Muktadir, Abu Hena
    Towhid, Md. Shamim
    Khosravani, Mohammad Sadegh
    COMPUTER COMMUNICATIONS, 2024, 228
  • [42] Traffic analysis for 5G network slice based on machine learning
    Feng Xie
    Dongxue Wei
    Zhencheng Wang
    EURASIP Journal on Wireless Communications and Networking, 2021
  • [43] Traffic analysis for 5G network slice based on machine learning
    Xie, Feng
    Wei, Dongxue
    Wang, Zhencheng
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2021, 2021 (01)
  • [44] Security of Deep Learning Models in 5G Networks: Proposition of Security Assessment Process
    Ftaimi, Asmaa
    Mazri, Tomader
    NETWORKING, INTELLIGENT SYSTEMS AND SECURITY, 2022, 237 : 393 - 407
  • [45] 5G Signal Identification Using Deep Learning
    Alhazmi, Mohsen H.
    Alymani, Mofadal
    Alhazmi, Hatim
    Almarhabi, Alhussain
    Samarkandi, Abdullah
    Yao, Yu-Dong
    2020 29TH WIRELESS AND OPTICAL COMMUNICATIONS CONFERENCE (WOCC), 2020, : 199 - 203
  • [46] DDoS Attacks Detection and Mitigation in 5G and Beyond Networks: A Deep Learning-based Approach
    Bousalem, Badre
    Silva, Vinicius F.
    Langar, Rami
    Cherrier, Sylvain
    2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, : 1259 - 1264
  • [47] A survey of 5G network systems: trends and Deep Learning approaches
    Muniz de Castro, Lucas G.
    Santos, Adriano E.
    Luiz, Daniel E.
    Junior, Waldir S.
    Carvalho, Celso B.
    2022 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS - TAIWAN, IEEE ICCE-TW 2022, 2022, : 25 - 26
  • [48] 5G Traffic Prediction Based on Deep Learning
    Gao, Zihang
    COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE, 2022, 2022
  • [49] Cyber security in smart cities: A review of deep learning-based applications and case studies
    Chen, Dongliang
    Wawrzynski, Pawel
    Lv, Zhihan
    SUSTAINABLE CITIES AND SOCIETY, 2021, 66
  • [50] A machine learning-based design of PRACH receiver in 5G
    Modina, Naresh
    Ferrari, Riccardo
    Magarini, Maurizio
    10TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT 2019) / THE 2ND INTERNATIONAL CONFERENCE ON EMERGING DATA AND INDUSTRY 4.0 (EDI40 2019) / AFFILIATED WORKSHOPS, 2019, 151 : 1100 - 1107