Generative AI for Cyber Threat-Hunting in 6G-enabled IoT Networks

被引:11
作者
Ferrag, Mohamed Amine [1 ]
Debbah, Merouane [1 ]
Al-Hawawreh, Muna [2 ]
机构
[1] Technol Innovat Inst, Abu Dhabi 9639, U Arab Emirates
[2] Deakin Univ, Sch Informat Technol, Geelong, Australia
来源
2023 IEEE/ACM 23RD INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND INTERNET COMPUTING WORKSHOPS, CCGRIDW | 2023年
关键词
Generative AI; Security; GPT; GAN; IoT; 6G;
D O I
10.1109/CCGridW59191.2023.00018
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The next generation of cellular technology, 6G, is being developed to enable a wide range of new applications and services for the Internet of Things (IoT). One of 6G's main advantages for IoT applications is its ability to support much higher data rates and bandwidth as well as to support ultra-low latency. However, with this increased connectivity will come to an increased risk of cyber threats, as attackers will be able to exploit the large network of connected devices. Generative Artificial Intelligence (AI) can be used to detect and prevent cyber attacks by continuously learning and adapting to new threats and vulnerabilities. In this paper, we discuss the use of generative AI for cyber threat-hunting (CTH) in 6G-enabled IoT networks. Then, we propose a new generative adversarial network (GAN) and Transformer-based model for CTH in 6G-enabled IoT Networks. The experimental analysis results with a new cyber security dataset demonstrate that the Transformer-based security model for CTH can detect IoT attacks with a high overall accuracy of 95%. We examine the challenges and opportunities and conclude by highlighting the potential of generative AI in enhancing the security of 6G-enabled IoT networks and call for further research to be conducted in this area.
引用
收藏
页码:16 / 25
页数:10
相关论文
共 50 条
  • [21] Federated learning for 6G-enabled secure communication systems: a comprehensive survey
    Deepika Sirohi
    Neeraj Kumar
    Prashant Singh Rana
    Sudeep Tanwar
    Rahat Iqbal
    Mohammad Hijjii
    Artificial Intelligence Review, 2023, 56 : 11297 - 11389
  • [22] Poisoning Attacks in Federated Edge Learning for Digital Twin 6G-enabled IoTs: An Anticipatory Study
    Ferrag, Mohamed Amine
    Kantarci, Burak
    Cordeiro, Lucas C.
    Debbah, Merouane
    Choo, Kim-Kwang Raymond
    2023 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS, ICC WORKSHOPS, 2023, : 1253 - 1258
  • [23] A Secure Decentralized Spatial Crowdsourcing Scheme for 6G-Enabled Network in Box
    Zhang, Junwei
    Wang, Zhuzhu
    Wang, Dandan
    Zhang, Xinglong
    Gupta, Brij B.
    Liu, Ximeng
    Ma, Jianfeng
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (09) : 6160 - 6170
  • [24] A Life-long Learning Intrusion Detection System for 6G-Enabled IoV
    Korba, Abdelaziz Amara
    Sebaa, Souad
    Mabrouki, Malik
    Ghamri-Doudane, Yacine
    Benatchba, Karima
    20TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE, IWCMC 2024, 2024, : 1773 - 1778
  • [25] Multiple Nodes Access of Wireless Beam Modulation for 6G-Enabled Internet of Things
    Chen, Jienan
    Li, Shuai
    Xing, Jing
    Wang, Jian
    Fu, Shengli
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (20) : 15191 - 15204
  • [26] Millimeter-Wave and Sub-6-GHz Aperture-Shared Antenna and Array for Mobile Terminals Accessing 5G/6G-Enabled IoT Scenarios
    Xia, Xiaoyue
    Wu, Fan
    Yu, Chao
    Jiang, Zhihao
    Xu, Jun
    Tang, Si-Yuan
    Wang, Zuojun
    Yao, Yu
    Hong, Wei
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (10): : 18808 - 18823
  • [27] Generative AI-Enabled Vehicular Networks: Fundamentals, Framework, and Case Study
    Zhang, Ruichen
    Xiong, Ke
    Du, Hongyang
    Niyato, Dusit
    Kang, Jiawen
    Shen, Xuemin
    Poor, H. Vincent
    IEEE NETWORK, 2024, 38 (04): : 259 - 267
  • [28] Toward AI-Enabled Green 6G Networks: A Resource Management Perspective
    Alhussien, Nedaa
    Gulliver, T. Aaron
    IEEE ACCESS, 2024, 12 : 132972 - 132995
  • [29] Last Line of Defense: Reliability Through Inducing Cyber Threat Hunting With Deception in SCADA Networks
    Ajmal, Abdul Basit
    Alam, Masoom
    Khaliq, Awais Abdul
    Khan, Shawal
    Qadir, Zakria
    Mahmud, M. A. Parvez
    IEEE ACCESS, 2021, 9 : 126789 - 126800
  • [30] Generative AI-Enabled Blockchain Networks: Fundamentals, Applications, and Case Study
    Nguyen, Cong T.
    Liu, Yinqiu
    Du, Hongyang
    Hoang, Dinh Thai
    Niyato, Dusit
    Nguyen, Diep N.
    Mao, Shiwen
    IEEE NETWORK, 2025, 39 (02): : 232 - 241