Inicio  /  Future Internet  /  Vol: 15 Par: 6 (2023)  /  Artículo
ARTÍCULO
TITULO

Deep Learning-Based Symptomizing Cyber Threats Using Adaptive 5G Shared Slice Security Approaches

Abdul Majeed    
Abdullah M. Alnajim    
Athar Waseem    
Aleem Khaliq    
Aqdas Naveed    
Shabana Habib    
Muhammad Islam and Sheroz Khan    

Resumen

In fifth Generation (5G) networks, protection from internal attacks, external breaches, violation of confidentiality, and misuse of network vulnerabilities is a challenging task. Various approaches, especially deep-learning (DL) prototypes, have been adopted in order to counter such challenges. For 5G network defense, DL module are recommended here in order to symptomize suspicious NetFlow data. This module behaves as a virtual network function (VNF) and is placed along a 5G network. The DL module as a cyber threat-symptomizing (CTS) unit acts as a virtual security scanner along the 5G network data analytic function (NWDAF) to monitor the network data. When the data were found to be suspicious, causing network bottlenecks and let-downs of end-user services, they were labeled as ?Anomalous?. For the best proactive and adaptive cyber defense system (PACDS), a logically organized modular approach has been followed to design the DL security module. In the application context, improvements have been made to input features dimension and computational complexity reduction with better response times and accuracy in outlier detection. Moreover, key performance indicators (KPIs) have been proposed for security module placement to secure interslice and intraslice communication channels from any internal or external attacks, also suggesting an adaptive defense mechanism and indicating its placement on a 5G network. Among the chosen DL models, the CNN model behaves as a stable model during behavior analysis in the results. The model classifies botnet-labeled data with 99.74% accuracy and higher precision.

Palabras claves

 Artículos similares

       
 
Jianlong Ye, Hongchuan Yu, Gaoyang Liu, Jiong Zhou and Jiangpeng Shu    
Component identification and depth estimation are important for detecting the integrity of post-disaster structures. However, traditional manual methods might be time-consuming, labor-intensive, and influenced by subjective judgments of inspectors. Deep-... ver más
Revista: Buildings

 
Minghao Liu, Qingxi Luo, Jianxiang Wang, Lingbo Sun, Tingting Xu and Enming Wang    
Land use/cover change (LUCC) refers to the phenomenon of changes in the Earth?s surface over time. Accurate prediction of LUCC is crucial for guiding policy formulation and resource management, contributing to the sustainable use of land, and maintaining... ver más

 
Ching-Lung Fan    
The emergence of deep learning-based classification methods has led to considerable advancements and remarkable performance in image recognition. This study introduces the Multiscale Feature Convolutional Neural Network (MSFCNN) for the extraction of com... ver más

 
Yuhwan Kim, Chang-Ho Choi, Chang-Young Park and Seonghyun Park    
In today?s society, where people spend over 90% of their time indoors, indoor air quality (IAQ) is crucial for sustaining human life. However, as various indoor activities such as cooking generate diverse types of pollutants in indoor spaces, IAQ has eme... ver más
Revista: Buildings

 
Kemal Haciefendioglu, Ahmet Can Altunisik and Tugba Abdioglu    
The efficient and precise identification of cracks in masonry stone structures caused by natural or human-induced factors within a specific region holds significant importance in detecting damage and subsequent secondary harm. In recent times, remote sen... ver más
Revista: Buildings