Mobile cellular network security vulnerability detection using machine learning

被引:0
|
作者
Chen G. [1 ]
Wang H. [1 ]
Zhang C. [1 ]
机构
[1] Lu’an Vocational Technical College, No. 1, Zhengyang Road, Anhui Province Lu’an City
关键词
intelligent monitoring; mobile cellular network; machine learning; MCN; ML; network security vulnerability; wireless communication;
D O I
10.1504/IJICT.2023.129955
中图分类号
学科分类号
摘要
Due to the low monitoring accuracy and duration of the traditional cellular mobile network security infringement monitoring system, a computerised cellular mobile network intelligent blank monitoring system is proposed. It connects the blank detection module to the scanner according to the data attributes to scan the blanks in the mobile cellular network. During the tracking of cyberspace signals, the data space of the system session is controlled. Mobile cells of cellular networks introduce machine intelligence data processing learning algorithms hidden in the data. Experimental results show that ML-based cellular mobile network vulnerability detection (VD-MCN) can effectively improve system control accuracy and cellular network security space control efficiency. However, there are still some things that are ignored to improve the development efficiency of MCN, and developers often only care about themselves. Whether the corresponding functions can be realised in the process of code reuse, or there is lack of understanding, inspection and testing of the reuse code, the integration of these, can achieve our expected results. Copyright © The Author(s) 2022. Published by Inderscience Publishers Ltd.
引用
收藏
页码:327 / 341
页数:14
相关论文
共 50 条
  • [11] Network anomaly detection and security defense technology based on machine learning: A review
    Liu, Ruixiao
    Shi, Jing
    Chen, Xingyu
    Lu, Cuiying
    COMPUTERS & ELECTRICAL ENGINEERING, 2024, 119
  • [12] Machine Learning: Research on Detection of Network Security Vulnerabilities by Extracting and Matching Features
    Xue Y.
    Journal of Cyber Security and Mobility, 2023, 12 (05): : 697 - 710
  • [13] Machine Learning Methods for Software Vulnerability Detection
    Chernis, Boris
    Verma, Rakesh
    IWSPA '18: PROCEEDINGS OF THE FOURTH ACM INTERNATIONAL WORKSHOP ON SECURITY AND PRIVACY ANALYTICS, 2018, : 31 - 39
  • [14] Intensive analysis of intrusion detection methodology over Mobile Adhoc Network using machine learning strategies
    Rajesh, M., V
    MATERIALS TODAY-PROCEEDINGS, 2022, 51 : 156 - 160
  • [15] A Machine Learning Based Positioning Scheme Using Cellular Network Data
    Chen, Yu-An
    2024 11TH INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS-TAIWAN, ICCE-TAIWAN 2024, 2024, : 713 - 714
  • [16] A Systematic Literature Review on Automated Software Vulnerability Detection Using Machine Learning
    Harzevili, Nima shiri
    Belle, Alvine boaye
    Wang, Junjie
    Wang, Song
    Jiang, Zhen ming
    Nagappan, Nachiappan
    ACM COMPUTING SURVEYS, 2025, 57 (03)
  • [17] Online Social Network Security: A Comparative Review Using Machine Learning and Deep Learning
    Kumar, Chanchal
    Bharati, Taran Singh
    Prakash, Shiv
    NEURAL PROCESSING LETTERS, 2021, 53 (01) : 843 - 861
  • [18] Online Social Network Security: A Comparative Review Using Machine Learning and Deep Learning
    Chanchal Kumar
    Taran Singh Bharati
    Shiv Prakash
    Neural Processing Letters, 2021, 53 : 843 - 861
  • [19] Machine Learning-Based Attack Detection for Wireless Sensor Network Security Using Hidden Markov Models
    Affane, M. Anselme R.
    Satori, Hassan
    Boutazart, Youssef
    Ezzine, Abderahim
    Satori, Khalid
    WIRELESS PERSONAL COMMUNICATIONS, 2024, 135 (04) : 1965 - 1992
  • [20] Malware Detection in Android Mobile Platform using Machine Learning Algorithms
    Al Ali, Mariam
    Svetinovic, Davor
    Aung, Zeyar
    Lukman, Suryani
    2017 INTERNATIONAL CONFERENCE ON INFOCOM TECHNOLOGIES AND UNMANNED SYSTEMS (TRENDS AND FUTURE DIRECTIONS) (ICTUS), 2017, : 763 - 768