Mobile cellular network security vulnerability detection using machine learning

被引:0
|
作者
Chen G. [1 ]
Wang H. [1 ]
Zhang C. [1 ]
机构
[1] Lu’an Vocational Technical College, No. 1, Zhengyang Road, Anhui Province Lu’an City
关键词
intelligent monitoring; mobile cellular network; machine learning; MCN; ML; network security vulnerability; wireless communication;
D O I
10.1504/IJICT.2023.129955
中图分类号
学科分类号
摘要
Due to the low monitoring accuracy and duration of the traditional cellular mobile network security infringement monitoring system, a computerised cellular mobile network intelligent blank monitoring system is proposed. It connects the blank detection module to the scanner according to the data attributes to scan the blanks in the mobile cellular network. During the tracking of cyberspace signals, the data space of the system session is controlled. Mobile cells of cellular networks introduce machine intelligence data processing learning algorithms hidden in the data. Experimental results show that ML-based cellular mobile network vulnerability detection (VD-MCN) can effectively improve system control accuracy and cellular network security space control efficiency. However, there are still some things that are ignored to improve the development efficiency of MCN, and developers often only care about themselves. Whether the corresponding functions can be realised in the process of code reuse, or there is lack of understanding, inspection and testing of the reuse code, the integration of these, can achieve our expected results. Copyright © The Author(s) 2022. Published by Inderscience Publishers Ltd.
引用
收藏
页码:327 / 341
页数:14
相关论文
共 50 条
  • [1] Strengthening Mobile Network Security Using Machine Learning
    Van Thuan Do
    Engelstad, Paal
    Feng, Boning
    Thanh Van Do
    MOBILE WEB AND INTELLIGENT INFORMATION SYSTEMS, (MOBIWIS 2016), 2016, 9847 : 173 - 183
  • [2] Drone Detection and Classification Using Cellular Network: A Machine Learning Approach
    Sheikh, Muhammad Usman
    Ghavimi, Fayezeh
    Ruttik, Kalle
    Jantti, Riku
    2019 IEEE 90TH VEHICULAR TECHNOLOGY CONFERENCE (VTC2019-FALL), 2019,
  • [3] Machine learning for mobile network payment security evaluation system
    Wang, Fei
    Yang, Nan
    Shakeel, P. Mohamed
    Saravanan, Vijayalakshmi
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2024, 35 (04)
  • [4] Network security threat detection under big data by using machine learning
    He, Jinbao
    Yang, Jie
    Ren, Kangjian
    Zhang, Wenjing
    Li, Guiquan
    International Journal of Network Security, 2019, 21 (05): : 768 - 773
  • [5] Vulnerability Detection on Mobile Applications Using State Machine Inference
    van der Lee, Wesley
    Verwer, Sicco
    2018 3RD IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (EUROS&PW 2018), 2018, : 1 - 10
  • [6] Enhancing Network Security: Leveraging Machine Learning for Intrusion Detection
    Rao, M. Veera V. Rama
    Rapaka, Anuj
    Prasad, M.
    Rao, P. B. V. Raja
    Satyanarayanamurty, P.
    Pokkuluri, Kiran Sree
    JOURNAL OF ELECTRICAL SYSTEMS, 2024, 20 (02) : 1555 - 1562
  • [7] Improving Network Security Using Machine Learning Techniques
    Akbar, Shaik
    Chandulal, J. A.
    Rao, K. Nageswara
    Kumar, G. Sudheer
    2012 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC), 2012, : 76 - 80
  • [8] Machine learning based mobile malware detection using highly imbalanced network traffic
    Chen, Zhenxiang
    Yan, Qiben
    Han, Hongbo
    Wang, Shanshan
    Peng, Lizhi
    Wang, Lin
    Yang, Bo
    INFORMATION SCIENCES, 2018, 433 : 346 - 364
  • [9] Vulnerability Assessment for Machine Learning Based Network Anomaly Detection System
    Ogawa, Yuji
    Kimura, Tomotaka
    Cheng, Jun
    2020 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS - TAIWAN (ICCE-TAIWAN), 2020,
  • [10] Optimizing software vulnerability detection using RoBERTa and machine learning
    Do, Cho Xuan
    Luu, Nguyen Trong
    Nguyen, Phuong Thi Lan
    AUTOMATED SOFTWARE ENGINEERING, 2024, 31 (02)