Mitigation of Adversarial Attacks in 5G Networks with a Robust Intrusion Detection System Based on Extremely Randomized Trees and Infinite Feature Selection

Author:

Baldini Gianmarco1ORCID

Affiliation:

1. Joint Research Centre, European Commission, 21027 Ispra, Italy

Abstract

Intrusion Detection Systems (IDSs) are an important tool to mitigate cybersecurity threats in the ICT infrastructures. Preferable properties of the IDSs are the optimization of the attack detection accuracy and the minimization of the computing resources and time. A signification portion of IDSs presented in the research literature is based on Machine Learning (ML) and Deep Learning (DL) elements, but they may be prone to adversarial attacks, which may undermine the overall performance of the IDS algorithm. This paper proposes a novel IDS focused on the detection of cybersecurity attacks in 5G networks, which addresses in a simple but effective way two specific adversarial attacks: (1) tampering of the labeled set used to train the ML algorithm, (2) modification of the features in the training data set. The approach is based on the combination of two algorithms, which have been introduced recently in the research literature. The first algorithm is the Extremely Randomized Tree (ERT) algorithm, which enhances the capability of Decision Tree (DT) and Random Forest (RF) algorithms to perform classification in data sets, which are unbalanced and of large size as IDS data sets usually are (legitimate traffic messages are more numerous than attack related messages). The second algorithm is the recently introduced Infinite Feature Selection algorithm, which is used to optimize the choice of the hyper-parameter defined in the approach and improve the overall computing efficiency. The result of the application of the proposed approach on a recently published 5G IDS data set proves its robustness against adversarial attacks with different degrees of severity calculated as the percentage of the tampered data set samples.

Publisher

MDPI AG

Reference38 articles.

1. Li, J., Zhou, H., Wu, S., Luo, X., Wang, T., Zhan, X., and Ma, X. (2022, January 10–12). FOAP: Fine-Grained Open-World android app fingerprinting. Proceedings of the 31st USENIX Security Symposium (USENIX Security 22), Boston, MA, USA.

2. Ni, T., Lan, G., Wang, J., Zhao, Q., and Xu, W. (2023, January 9–11). Eavesdropping Mobile App Activity via Radio-Frequency Energy Harvesting. Proceedings of the 32nd USENIX Security Symposium (USENIX Security 23), Anaheim, CA, USA.

3. Survey of intrusion detection systems: Techniques, datasets and challenges;Khraisat;Cybersecurity,2019

4. Luo, J., Cao, H., Jiang, H., Yang, Y., and Chen, Z. (2023). MIMOCrypt: Multi-User Privacy-Preserving Wi-Fi Sensing via MIMO Encryption. arXiv.

5. Wang, T. (2020, January 18–21). High precision open-world website fingerprinting. Proceedings of the 2020 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA.

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3