Mobile cellular network security vulnerability detection using machine learning

被引:0
|
作者
Chen G. [1 ]
Wang H. [1 ]
Zhang C. [1 ]
机构
[1] Lu’an Vocational Technical College, No. 1, Zhengyang Road, Anhui Province Lu’an City
关键词
intelligent monitoring; mobile cellular network; machine learning; MCN; ML; network security vulnerability; wireless communication;
D O I
10.1504/IJICT.2023.129955
中图分类号
学科分类号
摘要
Due to the low monitoring accuracy and duration of the traditional cellular mobile network security infringement monitoring system, a computerised cellular mobile network intelligent blank monitoring system is proposed. It connects the blank detection module to the scanner according to the data attributes to scan the blanks in the mobile cellular network. During the tracking of cyberspace signals, the data space of the system session is controlled. Mobile cells of cellular networks introduce machine intelligence data processing learning algorithms hidden in the data. Experimental results show that ML-based cellular mobile network vulnerability detection (VD-MCN) can effectively improve system control accuracy and cellular network security space control efficiency. However, there are still some things that are ignored to improve the development efficiency of MCN, and developers often only care about themselves. Whether the corresponding functions can be realised in the process of code reuse, or there is lack of understanding, inspection and testing of the reuse code, the integration of these, can achieve our expected results. Copyright © The Author(s) 2022. Published by Inderscience Publishers Ltd.
引用
收藏
页码:327 / 341
页数:14
相关论文
共 50 条
  • [1] Drone Detection and Classification Using Cellular Network: A Machine Learning Approach
    Sheikh, Muhammad Usman
    Ghavimi, Fayezeh
    Ruttik, Kalle
    Jantti, Riku
    2019 IEEE 90TH VEHICULAR TECHNOLOGY CONFERENCE (VTC2019-FALL), 2019,
  • [2] Enhancing Network Security: Leveraging Machine Learning for Intrusion Detection
    Rao, M. Veera V. Rama
    Rapaka, Anuj
    Prasad, M.
    Rao, P. B. V. Raja
    Satyanarayanamurty, P.
    Pokkuluri, Kiran Sree
    JOURNAL OF ELECTRICAL SYSTEMS, 2024, 20 (02) : 1555 - 1562
  • [3] Machine learning based mobile malware detection using highly imbalanced network traffic
    Chen, Zhenxiang
    Yan, Qiben
    Han, Hongbo
    Wang, Shanshan
    Peng, Lizhi
    Wang, Lin
    Yang, Bo
    INFORMATION SCIENCES, 2018, 433 : 346 - 364
  • [4] Mobile Keylogger Detection Using Machine Learning Technique
    Gunalakshmii, S.
    Ezhumalai, P.
    2014 IEEE INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND SYSTEMS (ICCCS'14), 2014, : 51 - 56
  • [5] Enhancing Network Security using Hybrid Machine Learning Techniques
    Sirenjeevi, P.
    Dhanakoti, V.
    2024 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATION AND APPLIED INFORMATICS, ACCAI 2024, 2024,
  • [6] VULNERABILITY DETECTION IN CYBER-PHYSICAL SYSTEM USING MACHINE LEARNING
    Bharathi, V
    Kumar, C. N. S. Vinoth
    SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2024, 25 (01): : 577 - 592
  • [7] A Survey on Ethereum Smart Contract Vulnerability Detection Using Machine Learning
    Surucu, Onur
    Yeprem, Uygar
    Wilkinson, Connor
    Hilal, Waleed
    Gadsden, S. Andrew
    Yawney, John
    Alsadi, Naseem
    Giuliano, Alessandro
    DISRUPTIVE TECHNOLOGIES IN INFORMATION SCIENCES VI, 2022, 12117
  • [8] An investigation of machine learning-based intrusion detection system in mobile ad hoc network
    Singh, C. Edwin
    Vigila, S. Maria Celestin
    INTERNATIONAL JOURNAL OF INTELLIGENT ENGINEERING INFORMATICS, 2023, 11 (01) : 54 - 70
  • [9] Detection of DNS Tunneling in Mobile Networks Using Machine Learning
    Van Thuan Do
    Engelstad, Paal
    Feng, Boning
    Thanh Van Do
    INFORMATION SCIENCE AND APPLICATIONS 2017, ICISA 2017, 2017, 424 : 221 - 230
  • [10] Network Intrusion Detection using Hybrid Machine Learning
    Chuang, Po-Jen
    Li, Si-Han
    2019 INTERNATIONAL CONFERENCE ON FUZZY THEORY AND ITS APPLICATIONS (IFUZZY), 2019, : 289 - 293