Modelling of Cyber Attack Detection and Response System for 5G Network Using Machine Learning Technique

Main Article Content

Anthony Kwubeghari
Lucy Ifeyinwa Ezigbo
Francis Amaechi Okoye

Abstract

The rapid increase in the adoption of 5G networks has revolutionized communication technologies, enabling high-speed data transmission and connectivity across various domains. However, the advent of 5G technology comes with an increased risk of cyber-attacks and security breaches, necessitating the development of robust defence mechanisms to safeguard network infrastructure and mitigate potential threats. The work presents a novel approach for modelling a cyber-attack response system tailored specifically for 5G networks, leveraging machine learning techniques to enhance threat detection and response capabilities. The study introduced innovative methodologies, including the integration of standard backpropagation and dropout regularization technique. Furthermore, an intelligent cyber threat classification model that proactively detects and mitigates malware threats in 5G networks was developed. Additionally, a comprehensive cyber-attack response model designed to isolate threats from the network infrastructure and mitigate potential security risks was formulated. The result of testing the response algorithm with simulation, and considering quality of service such as throughput, latency and packet loss, showed 80.05%, 24.9ms and 4.09% respectively. During system integration of the model on 5G network with stimulated malware, the throughput reported 71.81%. Also, packet loss reported loss rate of 23.18%, while latency reported 178.98ms. Our findings contribute to the advancement of cybersecurity in 5G environments and lay the foundation for the development of robust cyber defence systems to safeguard critical network infrastructure against emerging threats.

Article Details

How to Cite
[1]
A. Kwubeghari, L. I. Ezigbo, and F. A. Okoye, “Modelling of Cyber Attack Detection and Response System for 5G Network Using Machine Learning Technique”, AJERD, vol. 7, no. 2, pp. 297-307, Sep. 2024.
Section
Articles

References

[1] Imanbayev, A., Tynymbayev, S., Odarchenko, R., Gnatyuk, S., Berdibayev, R., Baikenov, A.&Kaniyeva, N. (2022). Research of machine learning algorithms for the development of intrusion detection systems in 5G mobile networks and beyond. Sensors, 22, 9957. https://doi.org/10.3390/s22249957.
[2] Neha Yadav, Sagar Pande, Aditya Khamparia& Deepak Gupta (2022). Intrusion Detection System on IoT with 5G Network Using Deep Learning. Wireless Communication and Mobile Computing, ID 9304689. https://doi.org/10.1155/2022/9304689
[3] Casillas, R., Touchette, B., Tawalbeh, L. & Muheidat, F. (2020). 5G Technology Architecture: Network Implementation, Challenges and Visibility. Int. J. Comput. Sci. Inf. Secur. 18(1), 39–53.
[4] Maksim Iavich, Giorgi Iashvili, ZhadyraAvkurova, Serhii Dorozhynskyi & Andriy Fesenko (2021). Machine Learning Algorithms for 5G Networks Security and the Corresponding Testing Environment. CPITS-II-2021: Cybersecurity Providing in Information and Telecommunication Systems, 3187, 139-149.
[5] Obodoeze Fidelis C. and Francis A. Okoye (2018). Holistic Security Implementation. Journal of Trend in Scientific and Development (IJTSRD), 2(2), 598-607.
[6] Mozo, A., Pastor, A., Karamchandani, A., de la Cal, L., Rivera, D. & Moreno, J.I. (2022). Integration of Machine Learning-Based Attack Detectors into Defensive Exercises of a 5G Cyber Range. Appl. Sci. 2022, 12, 10349. https://doi.org/10.3390/app12201034.
[7] Sultana, N., Chilamkurti, N., Peng, W. & Alhadad, R. (2019). Survey on SDN Based Network Intrusion Detection System Using Machine Learning Approaches. Peer-Peer Netw. Appl. 2019(12), 493–501.
[8] Ogbeta L.K. & Nwobodo Lois (2023). Neuro based strategy for real time protection of wireless network ecosystem against DDOS attack. [J] I1SRED, 5(3), 79-98.
[9] Ogbuanya I.M. & Eke James (2023).Detection And Isolation Of Black-Hole In Wireless Broadband Ecosystem Using Artificial Intelligence. International Journal Of Real Time Applications And Computing System (IJORTACS), 2(2), 390-402.
[10] Oduah O. & Olofin B.B., (2023). Development of Multi Level Intrusion Detection System For Cloud Based Log Management Using Machine Learning Technique. International Journal of Real Time Applications And Computing System (IJORTACS), 1(7), 101-114.
[11] Beck, K., Beedle M. & Grenning J. (2001). The Agile Manifesto. Agile Alliance.http://agilemanifesto.org/
[12] Sun W., Tang J.&Bai C. (2019). Evaluation of university project based on partial least squares and dynamic back propagation neural network group.IEEE Access, 7, 69494–69503.
[13] Feng W., J. Tang &Liu T. X. (2019). Understanding dropouts in moocs,AAAI, 33, 517–524.
[14]The IEEE website [online]. Available: https://ieee-dataport.org/documents/5g-nidd-comprehensive-network-
intrusion-detection-dataset-generated-over-5G-wireless
[15] Birhakahwa, Kelvin &Tartibu, Lagouge. (2023). Enhancing Grain Moisture Prediction with Artificial Neural Networks and Computational Fluid Dynamic. International Conference on Artificial Intelligence and its Applications 2023. 181-188. https//doi.org/10.59200/ICARTI.2023.026
[16] Pechenizkiy, M., Tsymbal A. &Puuronen S., (2004). PCA-based feature transformation for classification: issues in medical diagnostics. Proceedings. 17th IEEE Symposium on Computer-Based Medical Systems, Bethesda, MD, USA, 535-540, doi: 10.1109/CBMS.2004.1311770.
[17] Salehin, I., & Kang, D. K. (2023). A Review on Dropout Regularization Approaches for Deep Neural Networks. Electronics, 12(14), 3106. doi: 10.3390/electronics12143106
[18] Brownlee, J. (2019). A Gentle Introduction to Dropout for Regularizing Deep Neural Networks. Machine Learning Mastery. https://machinelearningmastery.com/dropout-for-regularizing-deep-neural-networks/