2023
DOI: 10.1109/access.2023.3325721
|View full text |Cite
|
Sign up to set email alerts
|

Real-Time Clustering Based on Deep Embeddings for Threat Detection in 6G Networks

Emilio Paolini,
Luca Valcarenghi,
Luca Maggiani
et al.

Abstract: Trials and deployments of sixth Generation (6G) wireless networks, delivering extreme capacity, reliability, and efficiency, are expected as early as 2030. Attempts from both industry and academia are trying to define the next generation network infrastructure. 6G will set in motion the fourth industrial revolution, delivering global, integrated intelligence. In this scenario, Artificial Intelligence (AI)-assisted architecture for 6G networks will realize knowledge discovery, automatic network adjustment and i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(2 citation statements)
references
References 27 publications
(35 reference statements)
0
1
0
Order By: Relevance
“…This can overwhelm servers and leave legitimate requests unanswered when concurrent connection limits are reached. These tactics underscore the challenges in defending against such disruptive attacks [8,66,67]. Detecting these attacks allows organizations to protect their online services, maintain server availability, and ensure a consistent user experience.…”
Section: Data Preparationmentioning
confidence: 99%
“…This can overwhelm servers and leave legitimate requests unanswered when concurrent connection limits are reached. These tactics underscore the challenges in defending against such disruptive attacks [8,66,67]. Detecting these attacks allows organizations to protect their online services, maintain server availability, and ensure a consistent user experience.…”
Section: Data Preparationmentioning
confidence: 99%
“…Another approach focuses on predictive modeling techniques to anticipate network anomalies and security breaches based on historical CDR data. By employing time-series analysis, clustering algorithms, and regression models, researchers predict potential security incidents such as network congestion, denial-of-service (DoS) attacks, and unauthorized access attempts [ 11 ]. These predictive models enable mobile network operators to implement preemptive measures to mitigate against risks and ensure uninterrupted service delivery to users.…”
Section: Literature Reviewmentioning
confidence: 99%