基于SVM的5G网络网络攻击检测与缓解

IF 2 4区 计算机科学 Q2 Computer Science
Sulaiman Yousef Alshunaifi, Shailendra Mishra, Mohammed Alshehri
{"title":"基于SVM的5G网络网络攻击检测与缓解","authors":"Sulaiman Yousef Alshunaifi, Shailendra Mishra, Mohammed Alshehri","doi":"10.32604/iasc.2022.019121","DOIUrl":null,"url":null,"abstract":"5G technology is widely seen as a game-changer for the IT and telecommunications sectors. Benefits expected from 5G include lower latency, higher capacity, and greater levels of bandwidth. 5G also has the potential to provide additional bandwidth in terms of AI support, further increasing the benefits to the IT and telecom sectors. There are many security threats and organizational vulnerabilities that can be exploited by fraudsters to take over or damage corporate data. This research addresses cybersecurity issues and vulnerabilities in 4G (LTE) and 5G technology. The findings in this research were obtained by using primary and secondary data. Secondary data was collected by reviewing literature and conducting surveys. Primary data were obtained by conducting an experimental simulation using the support vector machine (SVM) approach. The results show that cybersecurity issues related to 4G and 5G need to be addressed to ensure integrity, confidentiality, and availability. All enterprises are constantly exposed to a variety of risks. Also implemented an efficient SVM-based attack detection and mitigation system for 5G network. The proposed intrusion detection system defends against security attacks in the 5G environment. The results show that the throughput and intrusion detection rate is higher while the latency, energy consumption, and packet loss ratio are low, indicating that the proposed intrusion detection and defense system has achieved better QoS. The security solutions are fast and effective in detecting and mitigating cyber-attacks.","PeriodicalId":50357,"journal":{"name":"Intelligent Automation and Soft Computing","volume":"411 1","pages":""},"PeriodicalIF":2.0000,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":"{\"title\":\"Cyber-Attack Detection and Mitigation Using SVM for 5G Network\",\"authors\":\"Sulaiman Yousef Alshunaifi, Shailendra Mishra, Mohammed Alshehri\",\"doi\":\"10.32604/iasc.2022.019121\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"5G technology is widely seen as a game-changer for the IT and telecommunications sectors. Benefits expected from 5G include lower latency, higher capacity, and greater levels of bandwidth. 5G also has the potential to provide additional bandwidth in terms of AI support, further increasing the benefits to the IT and telecom sectors. There are many security threats and organizational vulnerabilities that can be exploited by fraudsters to take over or damage corporate data. This research addresses cybersecurity issues and vulnerabilities in 4G (LTE) and 5G technology. The findings in this research were obtained by using primary and secondary data. Secondary data was collected by reviewing literature and conducting surveys. Primary data were obtained by conducting an experimental simulation using the support vector machine (SVM) approach. The results show that cybersecurity issues related to 4G and 5G need to be addressed to ensure integrity, confidentiality, and availability. All enterprises are constantly exposed to a variety of risks. Also implemented an efficient SVM-based attack detection and mitigation system for 5G network. The proposed intrusion detection system defends against security attacks in the 5G environment. The results show that the throughput and intrusion detection rate is higher while the latency, energy consumption, and packet loss ratio are low, indicating that the proposed intrusion detection and defense system has achieved better QoS. The security solutions are fast and effective in detecting and mitigating cyber-attacks.\",\"PeriodicalId\":50357,\"journal\":{\"name\":\"Intelligent Automation and Soft Computing\",\"volume\":\"411 1\",\"pages\":\"\"},\"PeriodicalIF\":2.0000,\"publicationDate\":\"2022-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"7\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Intelligent Automation and Soft Computing\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://doi.org/10.32604/iasc.2022.019121\",\"RegionNum\":4,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"Computer Science\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Intelligent Automation and Soft Computing","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.32604/iasc.2022.019121","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"Computer Science","Score":null,"Total":0}
引用次数: 7

摘要

5G技术被广泛视为IT和电信行业的游戏规则改变者。5G的预期好处包括更低的延迟、更高的容量和更高的带宽水平。5G还具有在人工智能支持方面提供额外带宽的潜力,从而进一步增加IT和电信部门的收益。有许多安全威胁和组织漏洞可以被欺诈者利用来接管或破坏公司数据。该研究解决了4G (LTE)和5G技术中的网络安全问题和漏洞。本研究的结果是通过使用第一手和二手数据得出的。通过文献回顾和调查收集辅助资料。采用支持向量机(SVM)方法进行实验模拟,获得初步数据。结果表明,需要解决与4G和5G相关的网络安全问题,以确保完整性、保密性和可用性。所有的企业都面临着各种各样的风险。实现了高效的基于svm的5G网络攻击检测与缓解系统。本文提出的入侵检测系统可以防范5G环境下的安全攻击。结果表明,该方法具有较高的吞吐量和入侵检测率,同时具有较低的时延、能耗和丢包率,表明该入侵检测与防御系统具有较好的QoS。安全解决方案在检测和减轻网络攻击方面快速有效。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Cyber-Attack Detection and Mitigation Using SVM for 5G Network
5G technology is widely seen as a game-changer for the IT and telecommunications sectors. Benefits expected from 5G include lower latency, higher capacity, and greater levels of bandwidth. 5G also has the potential to provide additional bandwidth in terms of AI support, further increasing the benefits to the IT and telecom sectors. There are many security threats and organizational vulnerabilities that can be exploited by fraudsters to take over or damage corporate data. This research addresses cybersecurity issues and vulnerabilities in 4G (LTE) and 5G technology. The findings in this research were obtained by using primary and secondary data. Secondary data was collected by reviewing literature and conducting surveys. Primary data were obtained by conducting an experimental simulation using the support vector machine (SVM) approach. The results show that cybersecurity issues related to 4G and 5G need to be addressed to ensure integrity, confidentiality, and availability. All enterprises are constantly exposed to a variety of risks. Also implemented an efficient SVM-based attack detection and mitigation system for 5G network. The proposed intrusion detection system defends against security attacks in the 5G environment. The results show that the throughput and intrusion detection rate is higher while the latency, energy consumption, and packet loss ratio are low, indicating that the proposed intrusion detection and defense system has achieved better QoS. The security solutions are fast and effective in detecting and mitigating cyber-attacks.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Intelligent Automation and Soft Computing
Intelligent Automation and Soft Computing 工程技术-计算机:人工智能
CiteScore
3.50
自引率
10.00%
发文量
429
审稿时长
10.8 months
期刊介绍: An International Journal seeks to provide a common forum for the dissemination of accurate results about the world of intelligent automation, artificial intelligence, computer science, control, intelligent data science, modeling and systems engineering. It is intended that the articles published in the journal will encompass both the short and the long term effects of soft computing and other related fields such as robotics, control, computer, vision, speech recognition, pattern recognition, data mining, big data, data analytics, machine intelligence, cyber security and deep learning. It further hopes it will address the existing and emerging relationships between automation, systems engineering, system of systems engineering and soft computing. The journal will publish original and survey papers on artificial intelligence, intelligent automation and computer engineering with an emphasis on current and potential applications of soft computing. It will have a broad interest in all engineering disciplines, computer science, and related technological fields such as medicine, biology operations research, technology management, agriculture and information technology.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信