Redirigiendo al acceso original de articulo en 19 segundos...
Inicio  /  Future Internet  /  Vol: 15 Par: 6 (2023)  /  Artículo
ARTÍCULO
TITULO

Deep Learning-Based Symptomizing Cyber Threats Using Adaptive 5G Shared Slice Security Approaches

Abdul Majeed    
Abdullah M. Alnajim    
Athar Waseem    
Aleem Khaliq    
Aqdas Naveed    
Shabana Habib    
Muhammad Islam and Sheroz Khan    

Resumen

In fifth Generation (5G) networks, protection from internal attacks, external breaches, violation of confidentiality, and misuse of network vulnerabilities is a challenging task. Various approaches, especially deep-learning (DL) prototypes, have been adopted in order to counter such challenges. For 5G network defense, DL module are recommended here in order to symptomize suspicious NetFlow data. This module behaves as a virtual network function (VNF) and is placed along a 5G network. The DL module as a cyber threat-symptomizing (CTS) unit acts as a virtual security scanner along the 5G network data analytic function (NWDAF) to monitor the network data. When the data were found to be suspicious, causing network bottlenecks and let-downs of end-user services, they were labeled as ?Anomalous?. For the best proactive and adaptive cyber defense system (PACDS), a logically organized modular approach has been followed to design the DL security module. In the application context, improvements have been made to input features dimension and computational complexity reduction with better response times and accuracy in outlier detection. Moreover, key performance indicators (KPIs) have been proposed for security module placement to secure interslice and intraslice communication channels from any internal or external attacks, also suggesting an adaptive defense mechanism and indicating its placement on a 5G network. Among the chosen DL models, the CNN model behaves as a stable model during behavior analysis in the results. The model classifies botnet-labeled data with 99.74% accuracy and higher precision.

Palabras claves

 Artículos similares

       
 
Zhongda Ren, Chuanjie Liu, Yafei Ou, Peng Zhang, Heshan Fan, Xiaolong Zhao, Heqin Cheng, Lizhi Teng, Ming Tang and Fengnian Zhou    
Effectively simulating the variation in suspended sediment concentration (SSC) in estuaries during typhoons is significant for the water quality and ecological conditions of estuarine shoal wetlands and their adjacent coastal waters. During typhoons, SSC... ver más
Revista: Water

 
Yuhwan Kim, Chang-Ho Choi, Chang-Young Park and Seonghyun Park    
In today?s society, where people spend over 90% of their time indoors, indoor air quality (IAQ) is crucial for sustaining human life. However, as various indoor activities such as cooking generate diverse types of pollutants in indoor spaces, IAQ has eme... ver más
Revista: Buildings

 
Minghao Liu, Qingxi Luo, Jianxiang Wang, Lingbo Sun, Tingting Xu and Enming Wang    
Land use/cover change (LUCC) refers to the phenomenon of changes in the Earth?s surface over time. Accurate prediction of LUCC is crucial for guiding policy formulation and resource management, contributing to the sustainable use of land, and maintaining... ver más

 
Ching-Lung Fan    
The emergence of deep learning-based classification methods has led to considerable advancements and remarkable performance in image recognition. This study introduces the Multiscale Feature Convolutional Neural Network (MSFCNN) for the extraction of com... ver más

 
Mihai Andronie, George Lazaroiu, Mariana Iatagan, Iulian Hurloiu, Roxana ?tefanescu, Adrian Dijmarescu and Irina Dijmarescu    
The objective of this systematic review was to analyze the recently published literature on the Internet of Robotic Things (IoRT) and integrate the insights it articulates on big data management algorithms, deep learning-based object detection technologi... ver más