Analysis of Anomaly Detection and Identification Methods in 5G Traffic

被引:4
|
作者
Radivilova, Tamara [1 ]
Kirichenko, Lyudmyla [2 ]
Lemeshko, Oleksandr [1 ]
Ageyev, Dmytro [1 ]
Mulesa, Oksana [3 ]
Ilkov, Andrii [4 ]
机构
[1] Kharkiv Natl Univ Radio Elect, VV Popovskyy Dept Infocommun Engn, Kharkiv, Ukraine
[2] Kharkiv Natl Univ Radio Elect, Dept Appl Math, Kharkiv, Ukraine
[3] Uzhgorod Natl Univ, Dept Software Syst, Uzhgorod, Ukraine
[4] Ivan Kozhedub Kharkiv Natl Air Force Univ, Educ Dept, Kharkiv, Ukraine
关键词
anomaly detection; traffic; decision tree; clustering analysis; entropy; survival; Hurst parameter;
D O I
10.1109/IDAACS53288.2021.9660920
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Anomaly detection is an important task in 5G technology and many other areas of human life. In this paper, statistical methods of data analysis, such as survival analysis, time series analysis (fractal), classification method (decision trees), cluster analysis (DBSCAN), entropy method were chosen to detect anomalies. A description of the selected methods is given. Simulation modeling of these methods on the example of telecommunication network traffic was performed. As anomalies were chosen DDoS attacks, UDP-flood, TCP SYN, ARP attacks and HTTP flood. A comparative analysis of the performance of these methods for the identification of anomalies (attacks) on the probability of detecting anomalies, the probability of false positive detection, the running time of each method to detect the anomaly. Experimental results showed that the decision tree method is the best in all comparison parameters. The entropy analysis method is slightly slower, and it gives slightly more false positives. This is followed by the cluster analysis method, which is slightly worse at identifying anomalies. Then the fractal analysis method showed a lower probability of identifying anomalies, a higher probability of false positives and a longer running time. The worst was the survival analysis method.
引用
收藏
页码:1108 / 1113
页数:6
相关论文
共 50 条
  • [1] Insight of Anomaly Detection with NWDAF in 5G
    Yuan, Yachao
    Gehrmann, Christian
    Sternby, Jakob
    Barriga, Luis
    2022 INTERNATIONAL CONFERENCE ON COMPUTER, INFORMATION AND TELECOMMUNICATION SYSTEMS, CITS, 2022, : 81 - 86
  • [2] Network Traffic Anomaly Prediction for Beyond 5G Networks
    Koursioumpas, Nikolaos
    Magoula, Lina
    Barmpounakis, Sokratis
    Stavrakakis, Ioannis
    2022 IEEE 33RD ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS (IEEE PIMRC), 2022, : 589 - 594
  • [3] Anomaly Detection in 5G using Variational Autoencoders
    Islam, Amanul
    Chang, Sang-Yoon
    Kim, Jinoh
    Kim, Jonghyun
    2024 SILICON VALLEY CYBERSECURITY CONFERENCE, SVCC 2024, 2024,
  • [4] Boosted Ensemble Learning for Anomaly Detection in 5G RAN
    Sundqvist, Tobias
    Bhuyan, Monowar H.
    Forsman, Johan
    Elmroth, Erik
    ARTIFICIAL INTELLIGENCE APPLICATIONS AND INNOVATIONS, AIAI 2020, PT I, 2020, 583 : 15 - 30
  • [5] Anomaly Detection for 5G Softwarized Infrastructures with Federated Learning
    Bin Ruba, Salah
    Yellas, Nour El-Houda
    Secci, Stefano
    2022 1ST INTERNATIONAL CONFERENCE ON 6G NETWORKING (6GNET), 2022,
  • [6] ADSeq-5GCN: Anomaly Detection from Network Traffic Sequences in 5G Core Network Control Plane
    Tian, Zixu
    Patil, Rajendra
    Gurusamy, Mohan
    McCloud, Joshua
    2023 IEEE 24TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE SWITCHING AND ROUTING, HPSR, 2023,
  • [7] Identification of Source Applications for Enhanced Traffic Analysis and Anomaly Detection
    Zuquete, Andre
    Rocha, Miguel
    2012 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2012, : 6694 - 6698
  • [8] An Anomaly Detection Algorithm Based on Ensemble Learning for 5G Environment
    Lei, Lifeng
    Kou, Liang
    Zhan, Xianghao
    Zhang, Jilin
    Ren, Yongjian
    SENSORS, 2022, 22 (19)
  • [9] Efficient Network Anomaly Detection for Edge Gateway Defense in 5G
    Xu, Shengjie
    Fang, Dongfeng
    Sharif, Hamid
    2019 IEEE GLOBECOM WORKSHOPS (GC WKSHPS), 2019,
  • [10] Using Anomaly Detection Techniques for Securing 5G Infrastructure and Applications
    Priovolos, Athanasios
    Lioprasitis, Dimitris
    Gardikis, Georgios
    Costicoglou, Socrates
    2021 IEEE INTERNATIONAL MEDITERRANEAN CONFERENCE ON COMMUNICATIONS AND NETWORKING (IEEE MEDITCOM 2021), 2021, : 519 - 524