Author:
Shreyas T J ,Ilyaz Pasha M ,Sindhu A M ,T Hrushikesh ,U Kiran
Abstract
The telecommunications industry is advancing rapidly with the introduction of 5G technology, which promises enhanced broadband cellular networks. However, alongside the benefits come challenges, particularly in ensuring the security of these networks against cyber attacks. This paper focuses on Network Anomaly Detection (NAD) in 5G, aiming to detect and prevent abnormal behaviors within the network that could signify potential security threats. Various methods, including machine learning algorithms, are explored to achieve effective NAD. Specifically, the KNN and K-prototype algorithms are tested alongside an integrated approach, with the integrated method demonstrating superior performance.
Reference9 articles.
1. Mohiuddin A, Abdun NM, Jiankun H. Outlier detec- tion. In The State of the Art in Intrusion Prevention and Detection, Al-Sakib Khan Pathan (ed). Chapter: 1, Publisher: CRC Press: New York, USA, 2014. DOI: 10.1201/b16390-3
2. Bilge L, Balzarotti D, Robertson W, Kirda E, Kruegel C. Disclosure: detecting botnet command and control servers through large-scale NetFlow analysis. Proceed- ings of the 28th Annual Computer Security Applica- tions Conference. 2012, 129–138
3. Münz G, Li S, Carle G. Traffic anomaly detection using k-means clustering. In Proceedings of Performance, Reliability and Dependability Evaluation of Communi- cation Networks and Distributed Systems, 4 GI / ITG Workshop MMBnet. Hamburg, Germany. 2007
4. Hofstede R, Bartos V, Sperotto A, Pras A. Towards real-time intrusion detection for NetFlow and IPFIX. In: 9th International Conference on Network and Ser- vice Management, CNSM 2013, October 2013, Zürich, Switzerland. 2013, 14–18
5. Lazarevic A, Ertoz L, Kumar V, Ozgur A, Srivastava J. A comparative study of anomaly detection schemes in network intrusion detection. In Proceedings of the Third SIAM International Conference on Data Mining. 2003