Mobile cellular network security vulnerability detection using machine learning

被引:0
|
作者
Chen G. [1 ]
Wang H. [1 ]
Zhang C. [1 ]
机构
[1] Lu’an Vocational Technical College, No. 1, Zhengyang Road, Anhui Province Lu’an City
关键词
intelligent monitoring; mobile cellular network; machine learning; MCN; ML; network security vulnerability; wireless communication;
D O I
10.1504/IJICT.2023.129955
中图分类号
学科分类号
摘要
Due to the low monitoring accuracy and duration of the traditional cellular mobile network security infringement monitoring system, a computerised cellular mobile network intelligent blank monitoring system is proposed. It connects the blank detection module to the scanner according to the data attributes to scan the blanks in the mobile cellular network. During the tracking of cyberspace signals, the data space of the system session is controlled. Mobile cells of cellular networks introduce machine intelligence data processing learning algorithms hidden in the data. Experimental results show that ML-based cellular mobile network vulnerability detection (VD-MCN) can effectively improve system control accuracy and cellular network security space control efficiency. However, there are still some things that are ignored to improve the development efficiency of MCN, and developers often only care about themselves. Whether the corresponding functions can be realised in the process of code reuse, or there is lack of understanding, inspection and testing of the reuse code, the integration of these, can achieve our expected results. Copyright © The Author(s) 2022. Published by Inderscience Publishers Ltd.
引用
收藏
页码:327 / 341
页数:14
相关论文
共 50 条
  • [31] Detection of Malware in the Network Using Machine Learning Techniques
    Yogesh, B.
    Reddy, G.Suresh
    Proceedings - 2022 International Conference on Recent Trends in Microelectronics, Automation, Computing and Communications Systems, ICMACC 2022, 2022, : 204 - 211
  • [32] Network Intrusion Detection Using Machine Learning Techniques
    Almutairi, Yasmeen
    Alhazmi, Bader
    Munshi, Amr
    ADVANCES IN SCIENCE AND TECHNOLOGY-RESEARCH JOURNAL, 2022, 16 (03) : 193 - 206
  • [33] IP Network Anomaly Detection using Machine Learning
    Nair, Roshan
    Kasula, Chaithanya Pramodh
    Vankayala, Sravanthi
    Chakraborty, Niloy
    2019 IEEE 5TH INTERNATIONAL CONFERENCE FOR CONVERGENCE IN TECHNOLOGY (I2CT), 2019,
  • [34] Software security with natural language processing and vulnerability scoring using machine learning approach
    Verma B.K.
    Yadav A.K.
    Journal of Ambient Intelligence and Humanized Computing, 2024, 15 (04) : 2641 - 2651
  • [35] Machine Learning Methods for Software Vulnerability Detection
    Chernis, Boris
    Verma, Rakesh
    IWSPA '18: PROCEEDINGS OF THE FOURTH ACM INTERNATIONAL WORKSHOP ON SECURITY AND PRIVACY ANALYTICS, 2018, : 31 - 39
  • [36] Computer and network security: intrusion detection system using mobile agent
    Bourekkache, Samir
    Kazar, Okba
    Aloui, Ahmed
    Hamouda, Ghazali
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2022, 14 (04) : 318 - 340
  • [37] Intensive analysis of intrusion detection methodology over Mobile Adhoc Network using machine learning strategies
    Rajesh, M., V
    MATERIALS TODAY-PROCEEDINGS, 2022, 51 : 156 - 160
  • [38] Peak Hour Performance Prediction based on Machine Learning for LTE Mobile Cellular Network
    de los Angeles Carrion-Herrera, Maria
    Rohoden, Katty
    Ludena-Gonzalez, Patricia
    Francisco Martinez-Curipoma, Javier
    2022 IEEE ANDESCON, 2022, : 79 - 84
  • [39] A Study of Vulnerability Detection and Prevention on Computer Network Security
    Yang, Xiaohong
    Chen, Yuefeng
    MECHATRONICS AND INDUSTRIAL INFORMATICS, PTS 1-4, 2013, 321-324 : 2630 - +
  • [40] Machine Learning: Research on Detection of Network Security Vulnerabilities by Extracting and Matching Features
    Xue Y.
    Journal of Cyber Security and Mobility, 2023, 12 (05): : 697 - 710