Abstract
The 5G small stations are widely deployed to improve the capacity of the 5G communication system. However, increasing malicious attacks are hidden in the traffic of small stations. Therefore, it is of great significance to identify the encrypted malicious traffic in the 5G access network. However, the traffic transferred through the backhaul of 5G small base station is usually encrypted. To this end, a deep learning-based method to identify the signaling hijacking traffic on the access network is proposed. Firstly, a 5G signaling hijacking system is developed to address the vulnerabilities of small stations and generate practical malicious traffic. To identify encrypted malicious traffic from 5G backhaul links, a 1D-CNN recognition model based on data packets is constructed. Finally, the 1D-CNN model is tested and validated multiple dimensions. The extensive experiment results reveal that the proposed method can achieve a recognition accuracy of over 99.95%.
This work was supported by the National Key R &D Program of China No. 2021YFB2910105.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
https://www.miit.gov.cn/zwgk/zcjd/art/2023/art _9f5022af3cdf48789484117d9da03c58.html
Deng, W.: Network traffic classification based on deep learning. Xidian University (2020)
Roesch, M.: Network Intrusion Detection & Prevention System (Snort) (2017). https://www.snort.org
He, G., Wei, Q., Xiao, X., et al.: Confirmation method for the detection of malicious encrypted traffic with data privacy protection. J. Commun. 2, 156–170 (2022)
Wang, T., Ding, Y.: Network malicious encryption traffic identification method based on stacking. Commun. Technol. 7, 935–942 (2022)
Li, H., Zhang, S., Song, H., et al.: Robust malicious encrypted traffic detection based with multiple features. J. Cyber Secur. 2, 129–142 (2021)
Lin, W., Huamin, F., Biao, L., et al.: SSL VPN encrypted traffic identification based on hybrid method. Comput. Appl. Softw. 36(2), 315–322 (2019)
Guo, S., Su, Y.: Encrypted traffic classification method based on data stream. J. Comput. Appl. 41(5), 1386-l391 (2021)
Kang, P., Yang, W., Ma, H.: TLS malicious encrypted traffic identification research. Comput. Eng. Appl. 12, 1–11 (2022)
Pan, Y., Zhang, X., Jiang, H., et al.: A network traffic classification method based on graph convolution and LSTM. IEEE Access 9, 158261–158272 (2021)
Zhao, J., Li, Q., Liu, S., et al.: Towards traffic supervision in 6G: a graph neural network-based encrypted malicious traffic detection method. Sci. China (Inf. Sci.) 52, 270–286 (2022)
Zhou, Y., Liu, F., Wang, Y.: IPSec VPN encrypted traffic identification based on hybrid method. Comput. Sci. 48(4), 295–302 (2021)
Li, C., Dong, C., Niu, K., et al.: Mobile service traffic classification based on joint deep learning with attention mechanism. IEEE Access. 9, 74729–74738 (2021)
Chakraborty, I., Kelley, B.M., Gallagher, B.: Industrial control system device classification using network traffic features and neural network embeddings. Array 12, 100081 (2021)
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Gao, Z., Zhang, S. (2023). Research on Encrypted Malicious 5G Access Network Traffic Identification Based on Deep Learning. In: Yung, M., Chen, C., Meng, W. (eds) Science of Cyber Security . SciSec 2023. Lecture Notes in Computer Science, vol 14299. Springer, Cham. https://doi.org/10.1007/978-3-031-45933-7_29
Download citation
DOI: https://doi.org/10.1007/978-3-031-45933-7_29
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-45932-0
Online ISBN: 978-3-031-45933-7
eBook Packages: Computer ScienceComputer Science (R0)