Fusing network traffic features with host traffic features for an improved 5G network intrusion detection system

被引:0
|
作者
Alars, Estabraq Saleem Abduljabbar [1 ]
Kurnaz, Sefer [1 ]
机构
[1] Altinbas Univ, Inst Sci, Dept Elect & Comp Engn, Istanbul, Turkey
来源
OPTIK | 2022年 / 271卷
关键词
Intrusion; Cluster; Detection; Wireless; Fusion; Network; Traffic; Monitoring; Nodes; FEATURE-SELECTION APPROACH; SUPPORT VECTOR MACHINE; HYBRID; CLASSIFIER; ENSEMBLE; PCA;
D O I
10.1016/j.ijleo.2022.170079
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
The point of this original high level examination is to perform melding network traffic highlights with have traffic highlights for a superior organization interruption discovery framework in Wireless Network (WN). The WNs are made out of a few sensors which are haphazardly or deterministically dispersed for information procurement and to advance the information to the door for additional investigation. WNs are utilized in numerous applications, for example, in medical care for in correspondence; in utilities, for example, in enterprises to screen the condition of gear and distinguish any breakdown during ordinary creation movement. By and large, WNs take estimations of the ideal application and send this data to a door, by which the client can decipher the data to accomplish the ideal reason. The fundamental significance of WNs in area of interruption discovery is that they can be prepared to recognize the interruption and ongoing assaults in the CIC IDS 2019 Dataset. The proposed framework has been prepared on 70% for training while 20% is utilized for testing and validation 10% for approval. To show the meaning of the planned component vector, we utilized a dataset comprising of different classes which addressed a subset of all current sorts of fusion networks. The work has acted in python pro-gramming language with a few tool kits of profound learning were being utilized for this reason. WNs directing conventions are intended to lay out courses between the source and objective hubs. What these directing shows do is that they rot the association into extra reasonable pieces and give ways to deal with splitting information between its neighbors first and subsequently all through the whole association. The location of fascinating libraries and strategies is ceaselessly creating, just like the possible results and decisions for tests. Executing the framework in python helps in decreasing syntactic unpredictability, increases execution diverged from executions in setting up tongues, and gives memory prosperity. How memory prosperity is a significant issue for the current interference acknowledgment frameworks has been seen by this advance investiga-tion, which have begun to port bits of their show unwinding reasoning to achieve a precision of 99.21% for recognizing all of the interferences inside the WN that use a parser age design to accomplish safe show parsing.
引用
收藏
页数:17
相关论文
共 50 条
  • [1] Retraction notice to Fusing network traffic features with host traffic features for an improved 5G network intrusion detection system Optik 271 (2022) 170079 (Optik (2022) 271, (S0030402622013377), (10.1016/j.ijleo.2022.170079))
    Abduljabbar Alars, Estabraq Saleem
    Kurnaz, Sefer
    Optik, 2023, 292
  • [2] Traffic monitoring system for 5G core network
    Kim, Eungha
    Choi, Young-il
    2019 ELEVENTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS (ICUFN 2019), 2019, : 671 - 673
  • [3] Constructing important features from massive network traffic for lightweight intrusion detection
    Wang, Wei
    He, Yongzhong
    Liu, Jiqiang
    Gombault, Sylvain
    IET INFORMATION SECURITY, 2015, 9 (06) : 374 - 379
  • [4] Network traffic features for anomaly detection in specific industrial control system network
    Mantere, Matti (matti.mantere@vtt.fi), 1600, MDPI AG (05):
  • [5] Network Traffic Features for Anomaly Detection in Specific Industrial Control System Network
    Mantere, Matti
    Sailio, Mirko
    Noponen, Sami
    FUTURE INTERNET, 2013, 5 (04) : 460 - 473
  • [6] Analysis of network traffic features for anomaly detection
    Iglesias, Felix
    Zseby, Tanja
    MACHINE LEARNING, 2015, 101 (1-3) : 59 - 84
  • [7] Analysis of network traffic features for anomaly detection
    Félix Iglesias
    Tanja Zseby
    Machine Learning, 2015, 101 : 59 - 84
  • [8] Traffic Control System Based on 5G Communication Network
    Li, Aijuan
    Yuan, Wenchang
    Huang, Xin
    Qiu, Xuyun
    Ban, Xiaodong
    Zhang, Yuxing
    2019 IEEE 28TH INTERNATIONAL SYMPOSIUM ON INDUSTRIAL ELECTRONICS (ISIE), 2019, : 1950 - 1955
  • [9] Enhancing network intrusion detection systems with combined network and host traffic features using deep learning: deep learning and IoT perspective
    Alars, Estabraq Saleem Abduljabbar
    Kurnaz, Sefer
    DISCOVER COMPUTING, 2024, 27 (01)
  • [10] Using Deep Reinforcement Learning for Selecting Network Traffic Features in Intrusion Detection Systems
    Belikov, V. V.
    PROGRAMMING AND COMPUTER SOFTWARE, 2022, 48 (06) : 359 - 368