AI Classifiers Comparison for Network Anomaly Behavior Analysis

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

As the number of devices connected through mobile networks increase exponentially, the communication demands a broader range of services that can be provided by the fifth generation of communication networks (5G). However, with the increase of devices sharing data and services, the surface of attack also increases, leading to known and unknown threats that can affect the quality of the communications. An efficient way to detect threats in this scenario, is by analyzing the behavior of the data in the network. The use of machine learning algorithms for this type of application is on the rise, as they are an efficient way for detecting and classifying anomalies. In this work, three different machine learning techniques are tested to detect cyberattacks targeting the integrity of the communication where Botnet, DoS and infiltration attacks were launched. Additionally, two dimensionality reduction techniques were compared to evaluate the performance of the AI techniques under constrained information scenarios. Results show that the selection of the machine learning technique is crucial to obtain better results for given attack scenarios and different dimensions.

Original languageEnglish
Title of host publication2022 IEEE/ACS 19th International Conference on Computer Systems and Applications, AICCSA 2022 - Proceedings
PublisherIEEE Computer Society
ISBN (Electronic)9798350310085
DOIs
StatePublished - 2022
Event19th IEEE/ACS International Conference on Computer Systems and Applications, AICCSA 2022 - Abu Dhabi, United Arab Emirates
Duration: 5 Dec 20227 Dec 2022

Publication series

NameProceedings of IEEE/ACS International Conference on Computer Systems and Applications, AICCSA
Volume2022-December
ISSN (Print)2161-5322
ISSN (Electronic)2161-5330

Conference

Conference19th IEEE/ACS International Conference on Computer Systems and Applications, AICCSA 2022
Country/TerritoryUnited Arab Emirates
CityAbu Dhabi
Period5/12/227/12/22

Bibliographical note

Publisher Copyright:
© 2022 IEEE.

Keywords

  • 5G
  • Internet of things
  • anomaly behavior analysis
  • artificial intelligence
  • cyber security
  • machine learning

Fingerprint

Dive into the research topics of 'AI Classifiers Comparison for Network Anomaly Behavior Analysis'. Together they form a unique fingerprint.

Cite this