Dynamic management of a deep learning-based anomaly detection system for 5G networks

被引:48
作者
Fernandez Maimo, Lorenzo [1 ]
Huertas Celdran, Alberto [2 ]
Gil Perez, Manuel [2 ]
Garcia Clemente, Felix J. [1 ]
Martinez Perez, Gregorio [2 ]
机构
[1] Univ Murcia, Dept Ingn & Tecnol Comp, E-30071 Murcia, Spain
[2] Univ Murcia, Dept Ingn Informac & Comunicac, E-30071 Murcia, Spain
基金
欧盟地平线“2020”;
关键词
Deep learning; Anomaly detection; Virtualization; 5G mobile networks; BOTNET DETECTION; ARCHITECTURE; SECURITY;
D O I
10.1007/s12652-018-0813-4
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Fog and mobile edge computing (MEC) will play a key role in the upcoming fifth generation (5G) mobile networks to support decentralized applications, data analytics and management into the network itself by using a highly distributed compute model. Furthermore, increasing attention is paid to providing user-centric cybersecurity solutions, which particularly require collecting, processing and analyzing significantly large amount of data traffic and huge number of network connections in 5G networks. In this regard, this paper proposes a MEC-oriented solution in 5G mobile networks to detect network anomalies in real-time and in autonomic way. Our proposal uses deep learning techniques to analyze network flows and to detect network anomalies. Moreover, it uses policies in order to provide an efficient and dynamic management system of the computing resources used in the anomaly detection process. The paper presents relevant aspects of the deployment of the proposal and experimental results to show its performance.
引用
收藏
页码:3083 / 3097
页数:15
相关论文
共 26 条
[1]  
Abadi M, 2016, PROCEEDINGS OF OSDI'16: 12TH USENIX SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, P265
[2]   Fog Computing for the Internet of Things: Security and Privacy Issues [J].
Alrawais, Arwa ;
Alhothaily, Abdulrahman ;
Hu, Chunqiang ;
Cheng, Xiuzhen .
IEEE INTERNET COMPUTING, 2017, 21 (02) :34-42
[3]   New facets of mobile botnet: architecture and evaluation [J].
Anagnostopoulos, Marios ;
Kambourakis, Georgios ;
Gritzalis, Stefanos .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2016, 15 (05) :455-473
[4]  
[Anonymous], 2017, CAFFE2 NEW HIGHTWEIG
[5]  
[Anonymous], TECHNICAL REPORT
[6]   A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection [J].
Buczak, Anna L. ;
Guven, Erhan .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (02) :1153-1176
[7]   Semantic Pooling for Complex Event Analysis in Untrimmed Videos [J].
Chang, Xiaojun ;
Yu, Yao-Liang ;
Yang, Yi ;
Xing, Eric P. .
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2017, 39 (08) :1617-1632
[8]   Compound Rank-k Projections for Bilinear Analysis [J].
Chang, Xiaojun ;
Nie, Feiping ;
Wang, Sen ;
Yang, Yi ;
Zhou, Xiaofang ;
Zhang, Chengqi .
IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2016, 27 (07) :1502-1513
[9]  
Chen Jing, 2017, Wuhan University Journal of Natural Sciences, V22, P103, DOI 10.1007/s11859-017-1223-8
[10]   A Self-Adaptive Deep Learning-Based System for Anomaly Detection in 5G Networks [J].
Fernandez Maimo, Lorenzo ;
Perales Gomez, Angel Luis ;
Garcia Clemente, Felix J. ;
Gil Perez, Manuel ;
Martinez Perez, Gregorio .
IEEE ACCESS, 2018, 6 :7700-7712