IDEAS home Printed from https://ideas.repec.org/a/gam/jftint/v15y2023i6p193-d1157162.html
   My bibliography  Save this article

Deep Learning-Based Symptomizing Cyber Threats Using Adaptive 5G Shared Slice Security Approaches

Author

Listed:
  • Abdul Majeed

    (Department of Electrical Engineering, Faculty of Engineering and Technology, International Islamic University, Islamabad 44000, Pakistan)

  • Abdullah M. Alnajim

    (Department of Information Technology, College of Computer, Qassim University, Buraydah 51452, Saudi Arabia)

  • Athar Waseem

    (Department of Electrical Engineering, Faculty of Engineering and Technology, International Islamic University, Islamabad 44000, Pakistan)

  • Aleem Khaliq

    (Department of Electrical Engineering, Faculty of Engineering and Technology, International Islamic University, Islamabad 44000, Pakistan)

  • Aqdas Naveed

    (Department of Electrical Engineering, Faculty of Engineering and Technology, International Islamic University, Islamabad 44000, Pakistan)

  • Shabana Habib

    (Department of Information Technology, College of Computer, Qassim University, Buraydah 51452, Saudi Arabia)

  • Muhammad Islam

    (Department of Electrical Engineering, Onaizah College of Engineering and Information Technology, Onaizah Colleges, Qassim 56447, Saudi Arabia)

  • Sheroz Khan

    (Department of Electrical Engineering, Onaizah College of Engineering and Information Technology, Onaizah Colleges, Qassim 56447, Saudi Arabia)

Abstract

In fifth Generation (5G) networks, protection from internal attacks, external breaches, violation of confidentiality, and misuse of network vulnerabilities is a challenging task. Various approaches, especially deep-learning (DL) prototypes, have been adopted in order to counter such challenges. For 5G network defense, DL module are recommended here in order to symptomize suspicious NetFlow data. This module behaves as a virtual network function (VNF) and is placed along a 5G network. The DL module as a cyber threat-symptomizing (CTS) unit acts as a virtual security scanner along the 5G network data analytic function (NWDAF) to monitor the network data. When the data were found to be suspicious, causing network bottlenecks and let-downs of end-user services, they were labeled as “Anomalous”. For the best proactive and adaptive cyber defense system (PACDS), a logically organized modular approach has been followed to design the DL security module. In the application context, improvements have been made to input features dimension and computational complexity reduction with better response times and accuracy in outlier detection. Moreover, key performance indicators (KPIs) have been proposed for security module placement to secure interslice and intraslice communication channels from any internal or external attacks, also suggesting an adaptive defense mechanism and indicating its placement on a 5G network. Among the chosen DL models, the CNN model behaves as a stable model during behavior analysis in the results. The model classifies botnet-labeled data with 99.74% accuracy and higher precision.

Suggested Citation

  • Abdul Majeed & Abdullah M. Alnajim & Athar Waseem & Aleem Khaliq & Aqdas Naveed & Shabana Habib & Muhammad Islam & Sheroz Khan, 2023. "Deep Learning-Based Symptomizing Cyber Threats Using Adaptive 5G Shared Slice Security Approaches," Future Internet, MDPI, vol. 15(6), pages 1-16, May.
  • Handle: RePEc:gam:jftint:v:15:y:2023:i:6:p:193-:d:1157162
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/1999-5903/15/6/193/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/1999-5903/15/6/193/
    Download Restriction: no
    ---><---

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jftint:v:15:y:2023:i:6:p:193-:d:1157162. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.