Mobile cellular network security vulnerability detection using machine learning

被引:0
|
作者
Chen G. [1 ]
Wang H. [1 ]
Zhang C. [1 ]
机构
[1] Lu’an Vocational Technical College, No. 1, Zhengyang Road, Anhui Province Lu’an City
关键词
intelligent monitoring; mobile cellular network; machine learning; MCN; ML; network security vulnerability; wireless communication;
D O I
10.1504/IJICT.2023.129955
中图分类号
学科分类号
摘要
Due to the low monitoring accuracy and duration of the traditional cellular mobile network security infringement monitoring system, a computerised cellular mobile network intelligent blank monitoring system is proposed. It connects the blank detection module to the scanner according to the data attributes to scan the blanks in the mobile cellular network. During the tracking of cyberspace signals, the data space of the system session is controlled. Mobile cells of cellular networks introduce machine intelligence data processing learning algorithms hidden in the data. Experimental results show that ML-based cellular mobile network vulnerability detection (VD-MCN) can effectively improve system control accuracy and cellular network security space control efficiency. However, there are still some things that are ignored to improve the development efficiency of MCN, and developers often only care about themselves. Whether the corresponding functions can be realised in the process of code reuse, or there is lack of understanding, inspection and testing of the reuse code, the integration of these, can achieve our expected results. Copyright © The Author(s) 2022. Published by Inderscience Publishers Ltd.
引用
收藏
页码:327 / 341
页数:14
相关论文
共 50 条
  • [41] Network anomaly detection and security defense technology based on machine learning: A review
    Liu, Ruixiao
    Shi, Jing
    Chen, Xingyu
    Lu, Cuiying
    COMPUTERS & ELECTRICAL ENGINEERING, 2024, 119
  • [42] Network Traffic Vulnerability Analysis using Machine Learning- A comparative approach
    Mallick, Shrabani
    Kushwaha, Dharmender Singh
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2020, 20 (06): : 28 - 35
  • [43] Network Intrusion Detection Using Machine Learning Anomaly Detection Algorithms
    Hanifi, Khadija
    Bank, Hasan
    Karsligil, M. Elif
    Yavuz, A. Gokhan
    Guvensan, M. Amac
    2017 25TH SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2017,
  • [44] Construction of a Security Vulnerability Identification System Based on Machine Learning
    Shi, Kebin
    Dai, Yonghui
    Xu, Jing
    JOURNAL OF SENSORS, 2020, 2020
  • [45] A Machine Learning Approach to Classify Security Patches into Vulnerability Types
    Wang, Xinda
    Wang, Shu
    Sun, Kun
    Batcheller, Archer
    Jajodia, Sushil
    2020 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2020,
  • [46] A Machine Learning Based Positioning Scheme Using Cellular Network Data
    Chen, Yu-An
    2024 11TH INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS-TAIWAN, ICCE-TAIWAN 2024, 2024, : 713 - 714
  • [47] Online Social Network Security: A Comparative Review Using Machine Learning and Deep Learning
    Chanchal Kumar
    Taran Singh Bharati
    Shiv Prakash
    Neural Processing Letters, 2021, 53 : 843 - 861
  • [48] iDetect for vulnerability detection in internet of things operating systems using machine learning
    Al-Boghdady, Abdullah
    El-Ramly, Mohammad
    Wassif, Khaled
    SCIENTIFIC REPORTS, 2022, 12 (01)
  • [49] Online Social Network Security: A Comparative Review Using Machine Learning and Deep Learning
    Kumar, Chanchal
    Bharati, Taran Singh
    Prakash, Shiv
    NEURAL PROCESSING LETTERS, 2021, 53 (01) : 843 - 861
  • [50] iDetect for vulnerability detection in internet of things operating systems using machine learning
    Abdullah Al-Boghdady
    Mohammad El-Ramly
    Khaled Wassif
    Scientific Reports, 12