2021
DOI: 10.5120/ijca2021921027
|View full text |Cite
|
Sign up to set email alerts
|

Machine Learning for Securing SDN based 5G Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(9 citation statements)
references
References 16 publications
0
9
0
Order By: Relevance
“…Previous studies used ML to detect DDoS attacks effectively on 5G mobile networks [19][20][21][22]. Especially final previous work is similar to our study in that it constructed a virtual 5G environment with a Kitsune dataset, and collected a 5G dataset on its own, which was used to perform detection [22].…”
Section: G Network Ddos Detection With ML Modelmentioning
confidence: 62%
See 2 more Smart Citations
“…Previous studies used ML to detect DDoS attacks effectively on 5G mobile networks [19][20][21][22]. Especially final previous work is similar to our study in that it constructed a virtual 5G environment with a Kitsune dataset, and collected a 5G dataset on its own, which was used to perform detection [22].…”
Section: G Network Ddos Detection With ML Modelmentioning
confidence: 62%
“…Alamri et al [21] analyzed an appropriate ML to protect SDN-based 5G networks from DDoS attacks. This previous work prepared an SDN-based 5G network with datasets (CICDDoS 2019, NSL-KDD) to build and test the proposed ML model.…”
Section: G Network Ddos Detection With ML Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…This section outlines research on anomaly detection using ML in 5G mobile networks. Alamri et al [ 21 ] analyzed appropriate ML models to protect 5G SDN controllers, which are targeted in DDoS attacks. The datasets used were CICDDoS201 and NSL-KDD, and the algorithms were XGBoost, RF, and logistic regression.…”
Section: Related Workmentioning
confidence: 99%
“…As a result, this paper performs quantitative operations on the data collected, and some of the equations are as follows: Definition 1: Eq. ( 1) is used to calculate the change rate of data traffic [22]. P i is the port number of the SDN switch, The number of sending bytes and transmission bytes of each port of SDN switch are represented by tx and rx, respectively.If the total amount of data on each port of the switch at moment t ST is:…”
Section: Indicators Of Quantitativementioning
confidence: 99%