2024
DOI: 10.1109/tetc.2022.3184112
|View full text |Cite
|
Sign up to set email alerts
|

Strategic Honeypot Deployment in Ultra-Dense Beyond 5G Networks: A Reinforcement Learning Approach

Abstract: The progression of Software Defined Networking (SDN) and the virtualisation technologies lead to the beyond 5G era, providing multiple benefits in the smart economies. However, despite the advantages, security issues still remain. In particular, SDN/NFV and cloud/edge computing are related to various security issues. Moreover, due to the wireless nature of the entities, they are prone to a wide range of cyberthreats. Therefore, the presence of appropriate intrusion detection mechanisms is critical. Although bo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 43 publications
0
3
0
Order By: Relevance
“…In [8], the authors introduce the use of wireless honeypots in ultra-dense Beyond 5G (B5G) networks. Moreover, the authors model and discuss the strategic deployment of honeypots in ultra-dense B5G networks.…”
Section: Related Workmentioning
confidence: 99%
“…In [8], the authors introduce the use of wireless honeypots in ultra-dense Beyond 5G (B5G) networks. Moreover, the authors model and discuss the strategic deployment of honeypots in ultra-dense B5G networks.…”
Section: Related Workmentioning
confidence: 99%
“…Deep learning models have gained significant attention in the context of cybersecurity using the various models being developed and tested for misuse and anomaly detection and to prevent or deter different types of intrusions [19]. The rise of deep learning has improved the conventional signature and specification-based detection solutions, making these crucial tools for protecting systems and networks against cyberattacks [20]. Deep learning is recognized for its ability to rapidly analyze data streams as a basis to actively deploy and adjust countermeasures for improved detection of malware attacks [21,22].…”
Section: Introductionmentioning
confidence: 99%
“…It operates by presenting itself on the internet as a potential target for attackers, usually a server or other highvalue asset, then collecting data and alerting defenders when an unauthorized person attempts to access the honeypot. Honeypots can be considered as a distinct from and alternative methods of defense that are frequently employed in the production environment as a preventative measure [10]- [13]. Honeypots operation consist of: computer (acts as s server full of vulnerabilities like opened ports), application (acts as common services like web, dynamic host configuration protocol) and data (spoofed high value assets and unencrypted data).…”
Section: Introductionmentioning
confidence: 99%