Abstract
As the number of devices connected through mobile networks increase exponentially, the communication demands a broader range of services that can be provided by the fifth generation of communication networks (5G). However, with the increase of devices sharing data and services, the surface of attack also increases, leading to known and unknown threats that can affect the quality of the communications. An efficient way to detect threats in this scenario, is by analyzing the behavior of the data in the network. The use of machine learning algorithms for this type of application is on the rise, as they are an efficient way for detecting and classifying anomalies. In this work, three different machine learning techniques are tested to detect cyberattacks targeting the integrity of the communication where Botnet, DoS and infiltration attacks were launched. Additionally, two dimensionality reduction techniques were compared to evaluate the performance of the AI techniques under constrained information scenarios. Results show that the selection of the machine learning technique is crucial to obtain better results for given attack scenarios and different dimensions.
Original language | English |
---|---|
Title of host publication | 2022 IEEE/ACS 19th International Conference on Computer Systems and Applications, AICCSA 2022 - Proceedings |
Publisher | IEEE Computer Society |
ISBN (Electronic) | 9798350310085 |
DOIs | |
State | Published - 2022 |
Event | 19th IEEE/ACS International Conference on Computer Systems and Applications, AICCSA 2022 - Abu Dhabi, United Arab Emirates Duration: 5 Dec 2022 → 7 Dec 2022 |
Publication series
Name | Proceedings of IEEE/ACS International Conference on Computer Systems and Applications, AICCSA |
---|---|
Volume | 2022-December |
ISSN (Print) | 2161-5322 |
ISSN (Electronic) | 2161-5330 |
Conference
Conference | 19th IEEE/ACS International Conference on Computer Systems and Applications, AICCSA 2022 |
---|---|
Country/Territory | United Arab Emirates |
City | Abu Dhabi |
Period | 5/12/22 → 7/12/22 |
Bibliographical note
Publisher Copyright:© 2022 IEEE.
Keywords
- 5G
- Internet of things
- anomaly behavior analysis
- artificial intelligence
- cyber security
- machine learning