Federated Learning based Anomaly Detection as an Enabler for Securing Network and Service Management Automation in Beyond 5G Networks

被引:19
作者
Jayasinghe, Suwani [1 ]
Siriwardhana, Yushan [1 ]
Porambage, Pawani [1 ]
Liyanage, Madhusanka [1 ,2 ]
Ylianttila, Mika [1 ]
机构
[1] Univ Oulu, Ctr Wireless Commun, Oulu, Finland
[2] Univ Coll Dublin, Sch Comp Sci, Dublin, Ireland
来源
2022 JOINT EUROPEAN CONFERENCE ON NETWORKS AND COMMUNICATIONS & 6G SUMMIT (EUCNC/6G SUMMIT) | 2022年
关键词
5G; beyond; Network automation; Security; Federated learning; ZSM;
D O I
10.1109/EuCNC/6GSummit54941.2022.9815754
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network automation is a necessity in order to meet the unprecedented demand in the future networks and zero touch network architecture is proposed to cater such requirements. Closed-loop and artificial intelligence are key enablers in this proposed architecture in critical elements such as security. Apart from the arising privacy concerns, machine learning models can also face resource limitations. Federated learning is a machine learning-based technique that addresses both privacy and communication efficiency issues. Therefore, we propose a federated learning-based model incorporating the ZSM architecture for network automation. The paper also contains the simulations and results of the proposed multi-stage federated learning model that uses the UNSW-NB15 dataset.
引用
收藏
页码:345 / 350
页数:6
相关论文
共 15 条
[1]  
[Anonymous], 2019, document ETSI GR ZSM 002
[2]  
Benzaid C, 2020, INSPIRE-5Gplus's White Paper on Intelligent Security Architecture for 5G and Beyond Networks, Version 2.0
[3]   ZSM Security: Threat Surface and Best Practices [J].
Benzaid, Chafika ;
Taleb, Tarik .
IEEE NETWORK, 2020, 34 (03) :124-133
[4]   A Self-Adaptive Deep Learning-Based System for Anomaly Detection in 5G Networks [J].
Fernandez Maimo, Lorenzo ;
Perales Gomez, Angel Luis ;
Garcia Clemente, Felix J. ;
Gil Perez, Manuel ;
Martinez Perez, Gregorio .
IEEE ACCESS, 2018, 6 :7700-7712
[5]   DeepFed: Federated Deep Learning for Intrusion Detection in Industrial Cyber-Physical Systems [J].
Li, Beibei ;
Wu, Yuhao ;
Song, Jiarui ;
Lu, Rongxing ;
Li, Tao ;
Zhao, Liang .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 17 (08) :5615-5624
[6]   Communication-Efficient Federated Learning for Anomaly Detection in Industrial Internet of Things [J].
Liu, Yi ;
Kumar, Neeraj ;
Xiong, Zehui ;
Lim, Wei Yang Bryan ;
Kang, Jiawen ;
Niyato, Dusit .
2020 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2020,
[7]  
Liu Y, 2020, CHINA COMMUN, V17, P105, DOI 10.23919/JCC.2020.09.009
[8]  
Moustafa N, 2015, 2015 MILITARY COMMUNICATIONS AND INFORMATION SYSTEMS CONFERENCE (MILCIS)
[9]   The Roadmap to 6G Security and Privacy [J].
Porambage, Pawani ;
Gur, Gurkan ;
Osorio, Diana Pamela Moya ;
Liyanage, Madhusanka ;
Gurtov, Andrei ;
Ylianttila, Mika .
IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY, 2021, 2 :1094-1122
[10]   A Zero-Touch Network Service Management Approach Using AI-Enabled CDR Analysis [J].
Rizwan, Ali ;
Jaber, Mona ;
Filali, Fethi ;
Imran, Ali ;
Abu-Dayya, Adnan .
IEEE ACCESS, 2021, 9 :157699-157714