Modelling of Cyber Attack Detection and Response System for 5G Network Using Machine Learning Technique
Main Article Content
Abstract
The rapid increase in the adoption of 5G networks has revolutionized communication technologies, enabling high-speed data transmission and connectivity across various domains. However, the advent of 5G technology comes with an increased risk of cyber-attacks and security breaches, necessitating the development of robust defence mechanisms to safeguard network infrastructure and mitigate potential threats. The work presents a novel approach for modelling a cyber-attack response system tailored specifically for 5G networks, leveraging machine learning techniques to enhance threat detection and response capabilities. The study introduced innovative methodologies, including the integration of standard backpropagation and dropout regularization technique. Furthermore, an intelligent cyber threat classification model that proactively detects and mitigates malware threats in 5G networks was developed. Additionally, a comprehensive cyber-attack response model designed to isolate threats from the network infrastructure and mitigate potential security risks was formulated. The result of testing the response algorithm with simulation, and considering quality of service such as throughput, latency and packet loss, showed 80.05%, 24.9ms and 4.09% respectively. During system integration of the model on 5G network with stimulated malware, the throughput reported 71.81%. Also, packet loss reported loss rate of 23.18%, while latency reported 178.98ms. Our findings contribute to the advancement of cybersecurity in 5G environments and lay the foundation for the development of robust cyber defence systems to safeguard critical network infrastructure against emerging threats.
Article Details
References
Imanbayev, A., Tynymbayev, S., Odarchenko, R., Gnatyuk, S., Berdibayev, R., Baikenov, A.&Kaniyeva, N. (2022). Research of machine learning algorithms for the development of intrusion detection systems in 5G mobile networks and beyond. Sensors, 22, 9957. https://doi.org/10.3390/s22249957. DOI: https://doi.org/10.3390/s22249957
Neha Yadav, Sagar Pande, Aditya Khamparia& Deepak Gupta (2022). Intrusion Detection System on IoT with 5G Network Using Deep Learning. Wireless Communication and Mobile Computing, ID 9304689. https://doi.org/10.1155/2022/9304689 DOI: https://doi.org/10.1155/2022/9304689
Casillas, R., Touchette, B., Tawalbeh, L. & Muheidat, F. (2020). 5G Technology Architecture: Network Implementation, Challenges and Visibility. Int. J. Comput. Sci. Inf. Secur. 18(1), 39–53.
Maksim Iavich, Giorgi Iashvili, ZhadyraAvkurova, Serhii Dorozhynskyi & Andriy Fesenko (2021). Machine Learning Algorithms for 5G Networks Security and the Corresponding Testing Environment. CPITS-II-2021: Cybersecurity Providing in Information and Telecommunication Systems, 3187, 139-149.
Obodoeze Fidelis C. and Francis A. Okoye (2018). Holistic Security Implementation. Journal of Trend in Scientific and Development (IJTSRD), 2(2), 598-607. DOI: https://doi.org/10.31142/ijtsrd9457
Mozo, A., Pastor, A., Karamchandani, A., de la Cal, L., Rivera, D. & Moreno, J.I. (2022). Integration of Machine Learning-Based Attack Detectors into Defensive Exercises of a 5G Cyber Range. Appl. Sci. 2022, 12, 10349. https://doi.org/10.3390/app12201034. DOI: https://doi.org/10.3390/app122010349
Sultana, N., Chilamkurti, N., Peng, W. & Alhadad, R. (2019). Survey on SDN Based Network Intrusion Detection System Using Machine Learning Approaches. Peer-Peer Netw. Appl. 2019(12), 493–501. DOI: https://doi.org/10.1007/s12083-017-0630-0
Ogbeta L.K. & Nwobodo Lois (2023). Neuro based strategy for real time protection of wireless network ecosystem against DDOS attack. [J] I1SRED, 5(3), 79-98.
Ogbuanya I.M. & Eke James (2023).Detection And Isolation Of Black-Hole In Wireless Broadband Ecosystem Using Artificial Intelligence. International Journal Of Real Time Applications And Computing System (IJORTACS), 2(2), 390-402.
Oduah O. & Olofin B.B., (2023). Development of Multi Level Intrusion Detection System For Cloud Based Log Management Using Machine Learning Technique. International Journal of Real Time Applications And Computing System (IJORTACS), 1(7), 101-114.
Beck, K., Beedle M. & Grenning J. (2001). The Agile Manifesto. Agile Alliance.http://agilemanifesto.org/
Sun W., Tang J.&Bai C. (2019). Evaluation of university project based on partial least squares and dynamic back propagation neural network group.IEEE Access, 7, 69494–69503. DOI: https://doi.org/10.1109/ACCESS.2019.2919135
Feng W., J. Tang &Liu T. X. (2019). Understanding dropouts in moocs,AAAI, 33, 517–524. DOI: https://doi.org/10.1609/aaai.v33i01.3301517
The IEEE website [online]. Available: https://ieee-dataport.org/documents/5g-nidd-comprehensive-network-
intrusion-detection-dataset-generated-over-5G-wireless
Birhakahwa, Kelvin &Tartibu, Lagouge. (2023). Enhancing Grain Moisture Prediction with Artificial Neural Networks and Computational Fluid Dynamic. International Conference on Artificial Intelligence and its Applications 2023. 181-188. https//doi.org/10.59200/ICARTI.2023.026 DOI: https://doi.org/10.59200/ICARTI.2023.026
Pechenizkiy, M., Tsymbal A. &Puuronen S., (2004). PCA-based feature transformation for classification: issues in medical diagnostics. Proceedings. 17th IEEE Symposium on Computer-Based Medical Systems, Bethesda, MD, USA, 535-540, doi: 10.1109/CBMS.2004.1311770. DOI: https://doi.org/10.1109/CBMS.2004.1311770
Salehin, I., & Kang, D. K. (2023). A Review on Dropout Regularization Approaches for Deep Neural Networks. Electronics, 12(14), 3106. doi: 10.3390/electronics12143106 DOI: https://doi.org/10.3390/electronics12143106
Brownlee, J. (2019). A Gentle Introduction to Dropout for Regularizing Deep Neural Networks. Machine Learning Mastery. https://machinelearningmastery.com/dropout-for-regularizing-deep-neural-networks/