Modeling for Malicious Traffic Detection in 6G Next Generation Networks

H. Ghorbani, M. Mohammadzadeh, M. Ahmadzadegan
{"title":"Modeling for Malicious Traffic Detection in 6G Next Generation Networks","authors":"H. Ghorbani, M. Mohammadzadeh, M. Ahmadzadegan","doi":"10.1109/ICTE-V50708.2020.9113777","DOIUrl":null,"url":null,"abstract":"Based on the digitalization of the world and the increasing use of data, we can say that the next ten years will see a huge leap in the use of data in virtualization, automation, health and more. One of the infrastructures to reach the digitalization goals of the world is new communication networks with more capabilities, including high speed, low latency, more coverage and more. 5G networks and later 6G can provide us with this infrastructure. According to 6G (KPIS) targeting, IoT equipment, and distributed systems, data volumes are beyond the tolerance of cyber systems for data analysis. On the other hand, as technology evolves, its abuse will increase, and attacks on data exploitation will become more and more diverse. The main weaknesses of distributed and IoT systems, which are their computing power and power, will remain the same, and hackers will make the most of these weaknesses and will use new methods and ways to anonymize their activities. So there is a need for a system to identify and counter potential abuses of capabilities and data volume in next generation networks, especially 5G and 6G, more than ever. In this paper, we present a theory for work and activity on the creation of malicious traffic identification modeling in 5G and 6G networks. And finally we can come up with a solution to create more security in the future.","PeriodicalId":348195,"journal":{"name":"2020 International Conference on Technology and Entrepreneurship - Virtual (ICTE-V)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 International Conference on Technology and Entrepreneurship - Virtual (ICTE-V)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICTE-V50708.2020.9113777","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 10

Abstract

Based on the digitalization of the world and the increasing use of data, we can say that the next ten years will see a huge leap in the use of data in virtualization, automation, health and more. One of the infrastructures to reach the digitalization goals of the world is new communication networks with more capabilities, including high speed, low latency, more coverage and more. 5G networks and later 6G can provide us with this infrastructure. According to 6G (KPIS) targeting, IoT equipment, and distributed systems, data volumes are beyond the tolerance of cyber systems for data analysis. On the other hand, as technology evolves, its abuse will increase, and attacks on data exploitation will become more and more diverse. The main weaknesses of distributed and IoT systems, which are their computing power and power, will remain the same, and hackers will make the most of these weaknesses and will use new methods and ways to anonymize their activities. So there is a need for a system to identify and counter potential abuses of capabilities and data volume in next generation networks, especially 5G and 6G, more than ever. In this paper, we present a theory for work and activity on the creation of malicious traffic identification modeling in 5G and 6G networks. And finally we can come up with a solution to create more security in the future.
6G下一代网络中恶意流量检测的建模
基于世界的数字化和越来越多的数据使用,我们可以说,未来十年将在虚拟化、自动化、健康等领域看到数据使用的巨大飞跃。实现世界数字化目标的基础设施之一是具有更多功能的新型通信网络,包括高速、低延迟、更广的覆盖范围等等。5G网络和后来的6G网络可以为我们提供这种基础设施。根据6G (KPIS)目标、物联网设备和分布式系统,数据量超出了网络系统对数据分析的承受能力。另一方面,随着技术的发展,其滥用将会增加,对数据利用的攻击将变得越来越多样化。分布式和物联网系统的主要弱点,即它们的计算能力和能力,将保持不变,黑客将充分利用这些弱点,并将使用新的方法和方式来匿名化他们的活动。因此,比以往任何时候都更需要一个系统来识别和应对下一代网络,特别是5G和6G中潜在的功能和数据量滥用。在本文中,我们提出了在5G和6G网络中创建恶意流量识别建模的工作和活动理论。最后,我们可以想出一个解决方案,在未来创造更多的安全。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信