Fusing network traffic features with host traffic features for an improved 5G network intrusion detection system

被引:0
|
作者
Alars, Estabraq Saleem Abduljabbar [1 ]
Kurnaz, Sefer [1 ]
机构
[1] Altinbas Univ, Inst Sci, Dept Elect & Comp Engn, Istanbul, Turkey
来源
OPTIK | 2022年 / 271卷
关键词
Intrusion; Cluster; Detection; Wireless; Fusion; Network; Traffic; Monitoring; Nodes; FEATURE-SELECTION APPROACH; SUPPORT VECTOR MACHINE; HYBRID; CLASSIFIER; ENSEMBLE; PCA;
D O I
10.1016/j.ijleo.2022.170079
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
The point of this original high level examination is to perform melding network traffic highlights with have traffic highlights for a superior organization interruption discovery framework in Wireless Network (WN). The WNs are made out of a few sensors which are haphazardly or deterministically dispersed for information procurement and to advance the information to the door for additional investigation. WNs are utilized in numerous applications, for example, in medical care for in correspondence; in utilities, for example, in enterprises to screen the condition of gear and distinguish any breakdown during ordinary creation movement. By and large, WNs take estimations of the ideal application and send this data to a door, by which the client can decipher the data to accomplish the ideal reason. The fundamental significance of WNs in area of interruption discovery is that they can be prepared to recognize the interruption and ongoing assaults in the CIC IDS 2019 Dataset. The proposed framework has been prepared on 70% for training while 20% is utilized for testing and validation 10% for approval. To show the meaning of the planned component vector, we utilized a dataset comprising of different classes which addressed a subset of all current sorts of fusion networks. The work has acted in python pro-gramming language with a few tool kits of profound learning were being utilized for this reason. WNs directing conventions are intended to lay out courses between the source and objective hubs. What these directing shows do is that they rot the association into extra reasonable pieces and give ways to deal with splitting information between its neighbors first and subsequently all through the whole association. The location of fascinating libraries and strategies is ceaselessly creating, just like the possible results and decisions for tests. Executing the framework in python helps in decreasing syntactic unpredictability, increases execution diverged from executions in setting up tongues, and gives memory prosperity. How memory prosperity is a significant issue for the current interference acknowledgment frameworks has been seen by this advance investiga-tion, which have begun to port bits of their show unwinding reasoning to achieve a precision of 99.21% for recognizing all of the interferences inside the WN that use a parser age design to accomplish safe show parsing.
引用
收藏
页数:17
相关论文
共 50 条
  • [21] Analysis of NetFlow Features' Importance in Malicious Network Traffic Detection
    Campazas-Vega, Adrian
    Samuel Crespo-Martinez, Ignacio
    Manuel Guerrero-Higueras, Angel
    Alvarez-Aparicio, Claudia
    Matellan, Vicente
    14TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE IN SECURITY FOR INFORMATION SYSTEMS AND 12TH INTERNATIONAL CONFERENCE ON EUROPEAN TRANSNATIONAL EDUCATIONAL (CISIS 2021 AND ICEUTE 2021), 2022, 1400 : 52 - 61
  • [22] 5G-IoT-IDS: Intrusion Detection System for CIoT as Network Function in 5G Core Network
    Le, Tan Nhat Linh
    Salem, Boussad Ait
    Ahad, Emile Abdel
    Aitsaadi, Nadjib
    Du, Xiaojiang
    IEEE CONFERENCE ON GLOBAL COMMUNICATIONS, GLOBECOM, 2023, : 4773 - 4778
  • [23] Improving intrusion detection for imbalanced network traffic
    Thomas, Ciza
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (03) : 309 - 324
  • [24] Statistical traffic modeling for network intrusion detection
    Cabrera, JBD
    Ravichandran, B
    Mehra, RK
    8TH INTERNATIONAL SYMPOSIUM ON MODELING, ANALYSIS AND SIMULATION OF COMPUTER AND TELECOMMUNICATION SYSTEMS, PROCEEDINGS, 2000, : 466 - 473
  • [25] Deep Learning Network Intrusion Detection Based on Network Traffic
    Wang, Hanyang
    Zhou, Sirui
    Li, Honglei
    Hu, Juan
    Du, Xinran
    Zhou, Jinghui
    He, Yunlong
    Fu, Fa
    Yang, Houqun
    ARTIFICIAL INTELLIGENCE AND SECURITY, ICAIS 2022, PT III, 2022, 13340 : 194 - 207
  • [26] FIDS: A Federated Intrusion Detection System for 5G Smart Metering Network
    Mirzaee, Parya Haji
    Shojafar, Mohammad
    Pooranian, Zahra
    Asefy, Pedram
    Cruickshank, Haitham
    Tafazolli, Rahim
    2021 17TH INTERNATIONAL CONFERENCE ON MOBILITY, SENSING AND NETWORKING (MSN 2021), 2021, : 215 - 222
  • [27] Attack modeling and intrusion detection system for 5G wireless communication network
    Gupta, Akhil
    Jha, Rakesh Kumar
    Jain, Sanjeev
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (10)
  • [28] Intrusion Detection System on IoT with 5G Network Using Deep Learning
    Yadav, Neha
    Pande, Sagar
    Khamparia, Aditya
    Gupta, Deepak
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [29] On the use of prioritization and network slicing features for mission critical and commercial traffic multiplexing in 5G Radio Access Networks
    Wang, Shaoxuan
    Ferrus, Ramon
    2019 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2019, : 775 - 780
  • [30] Intrusion Detection System on IoT with 5G Network Using Deep Learning
    Yadav, Neha
    Pande, Sagar
    Khamparia, Aditya
    Gupta, Deepak
    Wireless Communications and Mobile Computing, 2022, 2022