scholarly journals Anomaly based Intrusion Detection using Neural Networks in 5G Network

Author(s):  
Thota Guna Durga Prashanth

Abstract: Ensuring the organizations of tomorrow is set to be a difficult space due to expanding digital protection dangers and enlarging assault surfaces made by the Internet of Things (IoT), expanded organization heterogeneity, expanded utilization of virtualisation innovations and circulated structures. This paper proposes SDS (Software Defined Security) which is a method gives mechanized, adaptable and versatile framework. SDS will tackle momentum progresses in AI to plan a CNN (Convolutional Neural Network) utilizing NAS (Neural Architecture Search) to distinguish irregular organization traffic. SDS can be applied to an interruption location framework to make a more proactive and start to finish protection for a 5G organization. To test this presumption, ordinary and irregular organization streams from a mimicked climate have been gathered and examined with a CNN. The outcomes from this strategy are promising as the model has recognized harmless traffic with a 100% exactness rate and irregular traffic with a 96.4% identification rate. This exhibits the viability of organization stream investigation for an assortment of normal pernicious assaults and furthermore gives a suitable alternative to discovery of encoded vindictive organization traffic. Keywords: 5G Security, IoT Security, Automated Intrusion Detection Systems, Convolutional Neural Networks, Artificial Intelligence, Software Defined Security

2012 ◽  
Vol 50 (No. 1) ◽  
pp. 35-40 ◽  
Author(s):  
A. Veselý ◽  
D. Brechlerová

Security of an information system is its very important property, especially today, when computers are interconnected via internet. Because no system can be absolutely secure, the timely and accurate detection of intrusions is necessary. For this purpose, Intrusion Detection Systems (IDS) were designed. There are two basic models of IDS: misuse IDS and anomaly IDS. Misuse systems detect intrusions by looking for activity that corresponds to the known signatures of intrusions or vulnerabilities. Anomaly systems detect intrusions by searching for an abnormal system activity. Most IDS commercial tools are misuse systems with rule-based expert system structure. However, these techniques are less successful when attack characteristics vary from built-in signatures. Artificial neural networks offer the potential to resolve these problems. As far as anomaly systems are concerned, it is very difficult to build them, because it is difficult to define the normal and abnormal behaviour of a system. Also for building anomaly system, neural networks can be used, because they can learn to discriminate the normal and abnormal behaviour of a system from examples. Therefore, they offer a promising technique for building anomaly systems. This paper presents an overview of the applicability of neural networks in building intrusion systems and discusses advantages and drawbacks of neural network technology.


Sign in / Sign up

Export Citation Format

Share Document