Skip to main content

The Novel System of Attacks Detection in 5G

  • Conference paper
  • First Online:
Advanced Information Networking and Applications (AINA 2021)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 226))

Abstract

The amount of traffic carried over wireless networks is growing rapidly and is being driven by many factors. The telecommunications industry is undergoing a major transformation towards 5G networks in order to fulfill the needs of existing and emerging use cases. The paper studies the existing vulnerabilities of the 5G ecosystem. Considering this study, we propose a new cyber security model that considers machine learning algorithms. The function contains Firewall and IDS/IPS. We integrate the described model into an existing 5G architecture. The methodology and the pseudo code of the algorithmic core is provided. The paper also studies the efficiency of this approach. The tests are performed in a test laboratory, which includes a server and 60 raspberry pi hardware systems that are used in order to simulate attacks on the server. The tests show that the offered approach identifies DOS/DDOS attack much better than methods described in the related works. The paper also suggests the improvement strategy, which will be implemented in the future versions of the system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Andrews, J.G., et al.: What will 5G be? IEEE J. Sel. Areas Commun. 32(6), 1065–1082 (2014). https://doi.org/10.1109/jsac.2014.2328098

    Article  Google Scholar 

  2. Osseiran, A., et al.: Scenarios for 5G mobile and wireless communications: the vision of the METIS project. IEEE Commun. Mag. 52(5), 26–35 (2014). https://doi.org/10.1109/mcom.2014.6815890

    Article  Google Scholar 

  3. Shafi, M., et al.: 5G: a tutorial overview of standards, trials, challenges, deployment, and practice. IEEE J. Sel. Areas Commun. 35(6), 1201–1221 (2017). https://doi.org/10.1109/jsac.2017.2692307

    Article  Google Scholar 

  4. Agiwal, M., Roy, A., Saxena, N.: Next generation 5G wireless networks: a comprehensive survey. In: IEEE Communications Surveys and Tutorials, vol. 18, no. 3, pp. 1617–1655, Thirdquarter (2016). https://doi.org/10.1109/comst.2016.2532458

  5. Cui, J., Zhang, X., Zhong, H., Ying, Z., Liu, L.: RSMA: reputation system-based lightweight message authentication framework and protocol for 5G-enabled vehicular networks. IEEE Internet Things J. 6(4), 6417–6428 (2019). https://doi.org/10.1109/jiot.2019.2895136

    Article  Google Scholar 

  6. Ni, J., Lin, X., Shen, X.S.: Efficient and secure service-oriented authentication supporting network slicing for 5G-enabled IoT. IEEE J. Sel. Areas Commun. 36(3), 644–657 (2018). https://doi.org/10.1109/jsac.2018.2815418

    Article  Google Scholar 

  7. Foukas, X., Patounas, G., Elmokashfi, A., Marina, M.K.: Network slicing in 5G: survey and challenges. IEEE Commun. Mag. 55(5), 94–100 (2017). https://doi.org/10.1109/mcom.2017.1600951

    Article  Google Scholar 

  8. Li, X., et al.: Network slicing for 5G: challenges and opportunities. IEEE Internet Comput. 21(5), 20–27 (2017). https://doi.org/10.1109/mic.2017.3481355

    Article  Google Scholar 

  9. Huawei 5G Security White Paper (2019). https://www-file.huawei.com/-/media/corporate/pdf/trust-center/huawei-5g-security-white-paper-4th.pdf

  10. 5G Americas: The evolution of Security in 5G (2019). https://www.5gamericas.org/files/4715/6450/22-67/5G_Security_White_Paper_07-26-19_FINAL.pdf

  11. Report on EU coordinated risk assessment of 5G (2019). https://ec.europa.eu/comm-ission/presscorner/detail/en/IP_19_6049

  12. Sun, Y., Tian, Z., Li, M., Zhu, C., Guizani, N.: Automated attack and defense framework toward 5G security. IEEE Netw. 34(5), 247–253 (2020). https://doi.org/10.1109/mnet.011.1900635

    Article  Google Scholar 

  13. Shaik, A., Borgaonkar, R.: New Vulnerabilities in 5G Networks. Black Hat USA Conference (2019)

    Google Scholar 

  14. Ă–zgĂĽr, A., Erdem, H.: A review of KDD99 dataset usage in intrusion detection and machine learning between 2010 and 2015. PeerJ Preprints-4:e1954v1 (2010). https://doi.org/10.7287/peerj.preprints.1954v1

  15. Li, J., Zhao, Z., Li, R.: Machine learning-based IDS for software-defined 5G network. IET Netw. 7(2) (2017)

    Google Scholar 

  16. Wang, Y.: A Novel Intrusion Detection System Based on Advanced Naive Bayesian Classification. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 211. Springer, Cham. https://doi.org/10.1007/978-3-319-72823-0_53

  17. Iwendi, C., Khan, S., Anajemba, J.H., Mittal, M., Alenezi, M., Alazab, M.: The use of ensemble models for multiple class and binary class classification for improving intrusion detection systems. Sensors 20, 2559 (2020)

    Google Scholar 

Download references

Acknowledgment

The work was financed by Shota Rustaveli National Science Foundation and Caucasus University in the frame of the [CARYS-19-121] grant and Caucasus University grant project.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Maksim Iavich .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Iavich, M., Gnatyuk, S., Odarchenko, R., Bocu, R., Simonov, S. (2021). The Novel System of Attacks Detection in 5G. In: Barolli, L., Woungang, I., Enokido, T. (eds) Advanced Information Networking and Applications. AINA 2021. Lecture Notes in Networks and Systems, vol 226. Springer, Cham. https://doi.org/10.1007/978-3-030-75075-6_47

Download citation

Publish with us

Policies and ethics