Wireless Intrusion and Attack Detection for 5G Networks using Deep Learning Techniques

被引:0
|
作者
Alenazi, Bayana [1 ]
Idris, Hala Eldaw [1 ]
机构
[1] Jouf Univ, Collage Comp & Informat Sci, Al Jouf, Saudi Arabia
关键词
Wireless intrusion detection system; 5G; autoencoder; deep learning; attack detection; SYSTEM;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A Wireless Intrusion Detection System is an important part of any system or company connected to the internet and has a wireless connection inside it because of the increasing number of internal or external attacks on the network. These WIDS systems are used to predict and detect wireless network attacks such as flooding, DoS attack, and evil- twin that badly affect system availability. Artificial intelligence (Machine Learning, Deep Learning) are popular techniques used as a good solution to build effective network intrusion detection. That's because of the ability of these algorithms to learn complicated behaviors and then use the learned system for discovering and detecting network attacks. In this work, we have performed an autoencoder with a DNN deep algorithm for protecting the companies by detecting intrusion and attacks in 5G wireless networks. We used the Aegean Wi-Fi Intrusion dataset (AWID). Our WIDS resulted in a very good performance with an accuracy of 99% for the dataset attack types: Flooding, Impersonation, and Injection.
引用
收藏
页码:851 / 856
页数:6
相关论文
共 50 条
  • [41] Deep Learning for Physical-Layer 5G Wireless Techniques: Opportunities, Challenges and Solutions
    Huang, Hongji
    Guo, Song
    Gui, Guan
    Yang, Zhen
    Zhang, Jianhua
    Sari, Hikmet
    Adachi, Fumiyuki
    IEEE WIRELESS COMMUNICATIONS, 2020, 27 (01) : 214 - 222
  • [42] Intrusion Detection Techniques for Mobile Wireless Networks
    Yongguang Zhang
    Wenke Lee
    Yi-An Huang
    Wireless Networks, 2003, 9 : 545 - 556
  • [43] Intrusion Detection Using Big Data and Deep Learning Techniques
    Faker, Osama
    Dogdu, Erdogan
    PROCEEDINGS OF THE 2019 ANNUAL ACM SOUTHEAST CONFERENCE (ACMSE 2019), 2019, : 86 - 93
  • [44] Radio Resource Allocation for 5G Networks Using Deep Reinforcement Learning
    Munaye, Yirga Yayeh
    Lin, Hsin-Piao
    Lin, Ding-Bing
    Juang, Rong-Terng
    Tarekegn, Getaneh Berie
    Jeng, Shiann-Shiun
    2021 30TH WIRELESS AND OPTICAL COMMUNICATIONS CONFERENCE (WOCC 2021), 2021, : 66 - 69
  • [45] Anomaly-Based Intrusion Detection System for DDoS Attack with Deep Learning Techniques
    Agostinello, Davide
    Genovese, Angelo
    Piuri, Vincenzo
    PROCEEDINGS OF THE 20TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, SECRYPT 2023, 2023, : 267 - 275
  • [46] A comprehensive review on landmine detection using deep learning techniques in 5G environment: open issues and challenges
    Barnawi, Ahmed
    Budhiraja, Ishan
    Kumar, Krishan
    Kumar, Neeraj
    Alzahrani, Bander
    Almansour, Amal
    Noor, Adeeb
    NEURAL COMPUTING & APPLICATIONS, 2022, 34 (24): : 21657 - 21676
  • [47] A comprehensive review on landmine detection using deep learning techniques in 5G environment: open issues and challenges
    Ahmed Barnawi
    Ishan Budhiraja
    Krishan Kumar
    Neeraj Kumar
    Bander Alzahrani
    Amal Almansour
    Adeeb Noor
    Neural Computing and Applications, 2022, 34 : 21657 - 21676
  • [48] Intrusion detection in wireless networks using clustering techniques with expert analysis
    Khoshgoftaar, TM
    Nath, SV
    Zhong, S
    Seliya, N
    ICMLA 2005: FOURTH INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS, PROCEEDINGS, 2005, : 120 - 125
  • [49] Reinforcement learning for Admission Control in 5G Wireless Networks
    Raaijmakers, Youri
    Mandelli, Silvio
    Doll, Mark
    2021 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2021,
  • [50] On the Performance of a Deep Learning-Based Anomaly Detection System for 5G Networks
    Fernandez Maimo, Lorenzo
    Garcia Clemente, Felix J.
    Gil Perez, Manuel
    Martinez Perez, Gregorio
    2017 IEEE SMARTWORLD, UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTED, SCALABLE COMPUTING & COMMUNICATIONS, CLOUD & BIG DATA COMPUTING, INTERNET OF PEOPLE AND SMART CITY INNOVATION (SMARTWORLD/SCALCOM/UIC/ATC/CBDCOM/IOP/SCI), 2017,