2018
DOI: 10.1109/access.2018.2803446
|View full text |Cite
|
Sign up to set email alerts
|

A Self-Adaptive Deep Learning-Based System for Anomaly Detection in 5G Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
64
0
4

Year Published

2019
2019
2023
2023

Publication Types

Select...
7
3

Relationship

0
10

Authors

Journals

citations
Cited by 213 publications
(93 citation statements)
references
References 17 publications
0
64
0
4
Order By: Relevance
“…The introduction of fifth-generation (5G) mobile technology may very well make existing intrusion detection defenses obsolete. Maimó et al [158] proposes a novel way of quickly adapting to new data while using minimal computation resources. For their experiment, they used the CTU dataset [159] of different, real botnet attacks and labels.…”
Section: Network Intrusion Detectionmentioning
confidence: 99%
“…The introduction of fifth-generation (5G) mobile technology may very well make existing intrusion detection defenses obsolete. Maimó et al [158] proposes a novel way of quickly adapting to new data while using minimal computation resources. For their experiment, they used the CTU dataset [159] of different, real botnet attacks and labels.…”
Section: Network Intrusion Detectionmentioning
confidence: 99%
“…UK's 5G MNOs or service brokers can use AI to allow self-adaptation of security needs according to live 5G traffic flowing through VNF. The AI-based VNF can employ auto-scaling and deploy more 5G network resources, employ appropriate deep learning framework, or even the detection model, with a more suitable one to the given cyber-defense context [83]. c) Quantum Safety and Next Generation Ciphers for B5G Applications: In order to face the challenge of cryptographic vulnerability threats due to advancements in computing capabilities of adversaries, UK 5G rollout should consider quantum-resistant authentication and data distribution scheme, and lattice-based homomorphic encryption technology, which greatly reduces the network burden at the same time achieves strong security including privacy protection and anti-quantum attacks [84].…”
Section: Security Challengesmentioning
confidence: 99%
“…There are visible anomalies that appear directly in the incorrect operation of the information computer system. The anomalies may not have visible signs, but they can cause failures after a long time [6].…”
Section: Introductionmentioning
confidence: 99%