Intrusion Detection Scheme With Dimensionality Reduction in Next Generation Networks

被引:32
作者
Sood, Keshav [1 ]
Nosouhi, Mohammad Reza [1 ]
Nguyen, Dinh Duc Nha [1 ]
Jiang, Frank [1 ]
Chowdhury, Morshed [1 ]
Doss, Robin [1 ]
机构
[1] Deakin Univ, Sch Informat Technol, Ctr Cyber Secur Res & Innovat CSRI, Geelong, Vic 3220, Australia
关键词
5G security; network security; next generation networks; anomaly detection; dimensionality reduction; ANOMALY DETECTION; DEEP; SYSTEM; IOT;
D O I
10.1109/TIFS.2022.3233777
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Due to millions of heterogeneous physical nodes, multiple-vendor and multi-tenant domains, and technologies etc., 5G has greatly expanded the threat landscape. Particularly from the high rate of traffic and ultra-low latency requirement of applications in 5G networks, the detection of the network traffic anomalies in real-time is critical. The conventional security approaches lack compatibility with modern network designs and are not much effective in 5G settings. We propose a two-stage network traffic anomaly detection system compatible with ETSI-NFV standard 5G architecture. Our architecture consists of two modules, i.e., (a) Dimensionality Reduction to compress the sample size at the edge of 5G networks and (b) Deep Neural Network classifier (DNN) that detects traffic anomalies. We have conducted our experiments using OMNET++ and ETSI-NFV (OSM MANO) 5G orchestration real platform deployed on AWS cloud systems. We have used the UNSW-NB15 data set and have shown that at dimensionality reduction factor of 81% the detection accuracy obtained is 98%. The proposal is compared with other recent approaches to show the overall merit of the architecture.
引用
收藏
页码:965 / 979
页数:15
相关论文
共 47 条
[1]   Deep and Machine Learning Approaches for Anomaly-Based Intrusion Detection of Imbalanced Network Traffic [J].
Abdulhammed, Razan ;
Faezipour, Miad ;
Abuzneid, Abdelshakour ;
AbuMallouh, Arafat .
IEEE SENSORS LETTERS, 2019, 3 (01)
[2]   A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security [J].
Al-Garadi, Mohammed Ali ;
Mohamed, Amr ;
Al-Ali, Abdulla Khalid ;
Du, Xiaojiang ;
Ali, Ihsan ;
Guizani, Mohsen .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (03) :1646-1685
[3]   Deep Learning Approach Combining Sparse Autoencoder With SVM for Network Intrusion Detection [J].
Al-Qatf, Majjed ;
Yu Lasheng ;
Al-Habib, Mohammed ;
Al-Sabahi, Kamal .
IEEE ACCESS, 2018, 6 :52843-52856
[4]   IoTProtect: A Machine-Learning Based IoT Intrusion Detection System [J].
Alani, Mohammed M. .
2022 6TH INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, SECURITY AND PRIVACY, CSP 2022, 2022, :61-65
[5]  
[Anonymous], FEW WORDS NEXT GENER
[6]  
[Anonymous], The open source network intrusion detection system
[7]   A Survey of Deep Learning Methods for Cyber Security [J].
Berman, Daniel S. ;
Buczak, Anna L. ;
Chavis, Jeffrey S. ;
Corbett, Cherita L. .
INFORMATION, 2019, 10 (04)
[8]  
Bottou Leon., 1991, P NEURO N MES, V91, pEC2
[9]   A Survey on Security Aspects for 3GPP 5G Networks [J].
Cao, Jin ;
Ma, Maode ;
Li, Hui ;
Ma, Ruhui ;
Sun, Yunqing ;
Yu, Pu ;
Xiong, Lihui .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (01) :170-195
[10]  
Chen Z., 2021, China Cyber Security Annual Conference, P71