Abstract
The amount of traffic carried over wireless networks is growing rapidly and is being driven by many factors. The telecommunications industry is undergoing a major transformation towards 5G networks in order to fulfill the needs of existing and emerging use cases. The paper studies the existing vulnerabilities of the 5G ecosystem. Considering this study, we propose a new cyber security model that considers machine learning algorithms. The function contains Firewall and IDS/IPS. We integrate the described model into an existing 5G architecture. The methodology and the pseudo code of the algorithmic core is provided. The paper also studies the efficiency of this approach. The tests are performed in a test laboratory, which includes a server and 60 raspberry pi hardware systems that are used in order to simulate attacks on the server. The tests show that the offered approach identifies DOS/DDOS attack much better than methods described in the related works. The paper also suggests the improvement strategy, which will be implemented in the future versions of the system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Andrews, J.G., et al.: What will 5G be? IEEE J. Sel. Areas Commun. 32(6), 1065–1082 (2014). https://doi.org/10.1109/jsac.2014.2328098
Osseiran, A., et al.: Scenarios for 5G mobile and wireless communications: the vision of the METIS project. IEEE Commun. Mag. 52(5), 26–35 (2014). https://doi.org/10.1109/mcom.2014.6815890
Shafi, M., et al.: 5G: a tutorial overview of standards, trials, challenges, deployment, and practice. IEEE J. Sel. Areas Commun. 35(6), 1201–1221 (2017). https://doi.org/10.1109/jsac.2017.2692307
Agiwal, M., Roy, A., Saxena, N.: Next generation 5G wireless networks: a comprehensive survey. In: IEEE Communications Surveys and Tutorials, vol. 18, no. 3, pp. 1617–1655, Thirdquarter (2016). https://doi.org/10.1109/comst.2016.2532458
Cui, J., Zhang, X., Zhong, H., Ying, Z., Liu, L.: RSMA: reputation system-based lightweight message authentication framework and protocol for 5G-enabled vehicular networks. IEEE Internet Things J. 6(4), 6417–6428 (2019). https://doi.org/10.1109/jiot.2019.2895136
Ni, J., Lin, X., Shen, X.S.: Efficient and secure service-oriented authentication supporting network slicing for 5G-enabled IoT. IEEE J. Sel. Areas Commun. 36(3), 644–657 (2018). https://doi.org/10.1109/jsac.2018.2815418
Foukas, X., Patounas, G., Elmokashfi, A., Marina, M.K.: Network slicing in 5G: survey and challenges. IEEE Commun. Mag. 55(5), 94–100 (2017). https://doi.org/10.1109/mcom.2017.1600951
Li, X., et al.: Network slicing for 5G: challenges and opportunities. IEEE Internet Comput. 21(5), 20–27 (2017). https://doi.org/10.1109/mic.2017.3481355
Huawei 5G Security White Paper (2019). https://www-file.huawei.com/-/media/corporate/pdf/trust-center/huawei-5g-security-white-paper-4th.pdf
5G Americas: The evolution of Security in 5G (2019). https://www.5gamericas.org/files/4715/6450/22-67/5G_Security_White_Paper_07-26-19_FINAL.pdf
Report on EU coordinated risk assessment of 5G (2019). https://ec.europa.eu/comm-ission/presscorner/detail/en/IP_19_6049
Sun, Y., Tian, Z., Li, M., Zhu, C., Guizani, N.: Automated attack and defense framework toward 5G security. IEEE Netw. 34(5), 247–253 (2020). https://doi.org/10.1109/mnet.011.1900635
Shaik, A., Borgaonkar, R.: New Vulnerabilities in 5G Networks. Black Hat USA Conference (2019)
Ă–zgĂĽr, A., Erdem, H.: A review of KDD99 dataset usage in intrusion detection and machine learning between 2010 and 2015. PeerJ Preprints-4:e1954v1 (2010). https://doi.org/10.7287/peerj.preprints.1954v1
Li, J., Zhao, Z., Li, R.: Machine learning-based IDS for software-defined 5G network. IET Netw. 7(2) (2017)
Wang, Y.: A Novel Intrusion Detection System Based on Advanced Naive Bayesian Classification. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 211. Springer, Cham. https://doi.org/10.1007/978-3-319-72823-0_53
Iwendi, C., Khan, S., Anajemba, J.H., Mittal, M., Alenezi, M., Alazab, M.: The use of ensemble models for multiple class and binary class classification for improving intrusion detection systems. Sensors 20, 2559 (2020)
Acknowledgment
The work was financed by Shota Rustaveli National Science Foundation and Caucasus University in the frame of the [CARYS-19-121] grant and Caucasus University grant project.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Iavich, M., Gnatyuk, S., Odarchenko, R., Bocu, R., Simonov, S. (2021). The Novel System of Attacks Detection in 5G. In: Barolli, L., Woungang, I., Enokido, T. (eds) Advanced Information Networking and Applications. AINA 2021. Lecture Notes in Networks and Systems, vol 226. Springer, Cham. https://doi.org/10.1007/978-3-030-75075-6_47
Download citation
DOI: https://doi.org/10.1007/978-3-030-75075-6_47
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-75074-9
Online ISBN: 978-3-030-75075-6
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)