Anomaly Detection in 6G Networks Using Machine Learning Methods

While the cloudification of networks with a micro-services-oriented design is a well-known feature of 5G, the 6G era of networks is closely related to intelligent network orchestration and management. Consequently, artificial intelligence (AI), machine learning (ML), and deep learning (DL) have a bi...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Electronics (Basel) 2023-08, Vol.12 (15), p.3300
Hauptverfasser: Saeed, Mamoon M., Saeed, Rashid A., Abdelhaq, Maha, Alsaqour, Raed, Hasan, Mohammad Kamrul, Mokhtar, Rania A.
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue 15
container_start_page 3300
container_title Electronics (Basel)
container_volume 12
creator Saeed, Mamoon M.
Saeed, Rashid A.
Abdelhaq, Maha
Alsaqour, Raed
Hasan, Mohammad Kamrul
Mokhtar, Rania A.
description While the cloudification of networks with a micro-services-oriented design is a well-known feature of 5G, the 6G era of networks is closely related to intelligent network orchestration and management. Consequently, artificial intelligence (AI), machine learning (ML), and deep learning (DL) have a big part to play in the 6G paradigm that is being imagined. Future end-to-end automation of networks requires proactive threat detection, the use of clever mitigation strategies, and confirmation that 6G networks will be self-sustaining. To strengthen and consolidate the role of AI in safeguarding 6G networks, this article explores how AI may be employed in 6G security. In order to achieve this, a novel anomaly detection system for 6G networks (AD6GNs) based on ensemble learning (EL) for communication networks was redeveloped in this study. The first stage in the EL-ADCN process is pre-processing. The second stage is the feature selection approach. It applies the reimplemented hybrid approach using a comparison of the ensemble learning and feature selection random forest algorithms (CFS-RF). NB2015, CIC_IDS2017, NSL KDD, and CICDDOS2019 are the three datasets, each given a reduced dimensionality, and the top subset characteristic for each is determined separately. Hybrid EL techniques are used in the third step to find intrusions. The average voting methodology is employed as an aggregation method, and two classifiers—support vector machines (SVM) and random forests (RF)—are modified to be used as EL algorithms for bagging and adaboosting, respectively. Testing the concept of the last step involves employing classification forms that are binary and multi-class. The best experimental results were obtained by applying 30, 35, 40, and 40 features of the reimplemented system to the three datasets: NSL_KDD, UNSW_NB2015, CIC_IDS2017, and CICDDOS2019. For the NSL_KDD dataset, the accuracy was 99.5% with a false alarm rate of 0.0038; the accuracy was 99.9% for the UNSW_NB2015 dataset with a false alarm rate of 0.0076; and the accuracy was 99.8% for the CIC_IDS2017 dataset with a false alarm rate of 0.0009. However, the accuracy was 99.95426% for the CICDDOS2019 dataset, with a false alarm rate of 0.00113.
doi_str_mv 10.3390/electronics12153300
format Article
fullrecord <record><control><sourceid>gale_proqu</sourceid><recordid>TN_cdi_proquest_journals_2849020894</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><galeid>A760514759</galeid><sourcerecordid>A760514759</sourcerecordid><originalsourceid>FETCH-LOGICAL-c361t-c00db4783cef06a490495b840ff8c5e213e731a20471706fe27061c2ff9549973</originalsourceid><addsrcrecordid>eNptUE1LAzEQDaJg0f4CLwuet04-drM5SalahaoXe17SdNKmbpOabJH-e6P14MEZmBke772BR8gVhRHnCm6wQ9PH4J1JlNGKc4ATMmAgVamYYqd_7nMyTGkDuRTlDYcBuR37sNXdobjDPtu44Avni3pavGD_GeJ7KubJ-VXxrM3aeSxmqKP_AbBfh2W6JGdWdwmHv_uCzB_u3yaP5ex1-jQZz0rDa9qXBmC5ELLhBi3UWigQqlo0AqxtTIWMcpScagZCUgm1RZYnNcxaVQmlJL8g10ffXQwfe0x9uwn76PPLljXZjkGjRGaNjqyV7rB13oY-apN7iVtngkfrMj6WNVRUyEplAT8KTAwpRbTtLrqtjoeWQvudbvtPuvwLB6Ftsg</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2849020894</pqid></control><display><type>article</type><title>Anomaly Detection in 6G Networks Using Machine Learning Methods</title><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><source>MDPI - Multidisciplinary Digital Publishing Institute</source><creator>Saeed, Mamoon M. ; Saeed, Rashid A. ; Abdelhaq, Maha ; Alsaqour, Raed ; Hasan, Mohammad Kamrul ; Mokhtar, Rania A.</creator><creatorcontrib>Saeed, Mamoon M. ; Saeed, Rashid A. ; Abdelhaq, Maha ; Alsaqour, Raed ; Hasan, Mohammad Kamrul ; Mokhtar, Rania A.</creatorcontrib><description>While the cloudification of networks with a micro-services-oriented design is a well-known feature of 5G, the 6G era of networks is closely related to intelligent network orchestration and management. Consequently, artificial intelligence (AI), machine learning (ML), and deep learning (DL) have a big part to play in the 6G paradigm that is being imagined. Future end-to-end automation of networks requires proactive threat detection, the use of clever mitigation strategies, and confirmation that 6G networks will be self-sustaining. To strengthen and consolidate the role of AI in safeguarding 6G networks, this article explores how AI may be employed in 6G security. In order to achieve this, a novel anomaly detection system for 6G networks (AD6GNs) based on ensemble learning (EL) for communication networks was redeveloped in this study. The first stage in the EL-ADCN process is pre-processing. The second stage is the feature selection approach. It applies the reimplemented hybrid approach using a comparison of the ensemble learning and feature selection random forest algorithms (CFS-RF). NB2015, CIC_IDS2017, NSL KDD, and CICDDOS2019 are the three datasets, each given a reduced dimensionality, and the top subset characteristic for each is determined separately. Hybrid EL techniques are used in the third step to find intrusions. The average voting methodology is employed as an aggregation method, and two classifiers—support vector machines (SVM) and random forests (RF)—are modified to be used as EL algorithms for bagging and adaboosting, respectively. Testing the concept of the last step involves employing classification forms that are binary and multi-class. The best experimental results were obtained by applying 30, 35, 40, and 40 features of the reimplemented system to the three datasets: NSL_KDD, UNSW_NB2015, CIC_IDS2017, and CICDDOS2019. For the NSL_KDD dataset, the accuracy was 99.5% with a false alarm rate of 0.0038; the accuracy was 99.9% for the UNSW_NB2015 dataset with a false alarm rate of 0.0076; and the accuracy was 99.8% for the CIC_IDS2017 dataset with a false alarm rate of 0.0009. However, the accuracy was 99.95426% for the CICDDOS2019 dataset, with a false alarm rate of 0.00113.</description><identifier>ISSN: 2079-9292</identifier><identifier>EISSN: 2079-9292</identifier><identifier>DOI: 10.3390/electronics12153300</identifier><language>eng</language><publisher>Basel: MDPI AG</publisher><subject>6G mobile communication ; Accuracy ; Algorithms ; Anomalies ; Artificial intelligence ; Classification ; Communication networks ; Data security ; Datasets ; Deep learning ; Discriminant analysis ; False alarms ; Intelligent networks ; Intrusion detection systems ; Machine learning ; Methods ; Mobile communication systems ; Optimization ; Safety and security measures ; Support vector machines ; Wireless communication systems ; Wireless communications</subject><ispartof>Electronics (Basel), 2023-08, Vol.12 (15), p.3300</ispartof><rights>COPYRIGHT 2023 MDPI AG</rights><rights>2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c361t-c00db4783cef06a490495b840ff8c5e213e731a20471706fe27061c2ff9549973</citedby><cites>FETCH-LOGICAL-c361t-c00db4783cef06a490495b840ff8c5e213e731a20471706fe27061c2ff9549973</cites><orcidid>0000-0002-9872-081X ; 0000-0001-5511-0205 ; 0000-0003-2350-5661</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27924,27925</link.rule.ids></links><search><creatorcontrib>Saeed, Mamoon M.</creatorcontrib><creatorcontrib>Saeed, Rashid A.</creatorcontrib><creatorcontrib>Abdelhaq, Maha</creatorcontrib><creatorcontrib>Alsaqour, Raed</creatorcontrib><creatorcontrib>Hasan, Mohammad Kamrul</creatorcontrib><creatorcontrib>Mokhtar, Rania A.</creatorcontrib><title>Anomaly Detection in 6G Networks Using Machine Learning Methods</title><title>Electronics (Basel)</title><description>While the cloudification of networks with a micro-services-oriented design is a well-known feature of 5G, the 6G era of networks is closely related to intelligent network orchestration and management. Consequently, artificial intelligence (AI), machine learning (ML), and deep learning (DL) have a big part to play in the 6G paradigm that is being imagined. Future end-to-end automation of networks requires proactive threat detection, the use of clever mitigation strategies, and confirmation that 6G networks will be self-sustaining. To strengthen and consolidate the role of AI in safeguarding 6G networks, this article explores how AI may be employed in 6G security. In order to achieve this, a novel anomaly detection system for 6G networks (AD6GNs) based on ensemble learning (EL) for communication networks was redeveloped in this study. The first stage in the EL-ADCN process is pre-processing. The second stage is the feature selection approach. It applies the reimplemented hybrid approach using a comparison of the ensemble learning and feature selection random forest algorithms (CFS-RF). NB2015, CIC_IDS2017, NSL KDD, and CICDDOS2019 are the three datasets, each given a reduced dimensionality, and the top subset characteristic for each is determined separately. Hybrid EL techniques are used in the third step to find intrusions. The average voting methodology is employed as an aggregation method, and two classifiers—support vector machines (SVM) and random forests (RF)—are modified to be used as EL algorithms for bagging and adaboosting, respectively. Testing the concept of the last step involves employing classification forms that are binary and multi-class. The best experimental results were obtained by applying 30, 35, 40, and 40 features of the reimplemented system to the three datasets: NSL_KDD, UNSW_NB2015, CIC_IDS2017, and CICDDOS2019. For the NSL_KDD dataset, the accuracy was 99.5% with a false alarm rate of 0.0038; the accuracy was 99.9% for the UNSW_NB2015 dataset with a false alarm rate of 0.0076; and the accuracy was 99.8% for the CIC_IDS2017 dataset with a false alarm rate of 0.0009. However, the accuracy was 99.95426% for the CICDDOS2019 dataset, with a false alarm rate of 0.00113.</description><subject>6G mobile communication</subject><subject>Accuracy</subject><subject>Algorithms</subject><subject>Anomalies</subject><subject>Artificial intelligence</subject><subject>Classification</subject><subject>Communication networks</subject><subject>Data security</subject><subject>Datasets</subject><subject>Deep learning</subject><subject>Discriminant analysis</subject><subject>False alarms</subject><subject>Intelligent networks</subject><subject>Intrusion detection systems</subject><subject>Machine learning</subject><subject>Methods</subject><subject>Mobile communication systems</subject><subject>Optimization</subject><subject>Safety and security measures</subject><subject>Support vector machines</subject><subject>Wireless communication systems</subject><subject>Wireless communications</subject><issn>2079-9292</issn><issn>2079-9292</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><recordid>eNptUE1LAzEQDaJg0f4CLwuet04-drM5SalahaoXe17SdNKmbpOabJH-e6P14MEZmBke772BR8gVhRHnCm6wQ9PH4J1JlNGKc4ATMmAgVamYYqd_7nMyTGkDuRTlDYcBuR37sNXdobjDPtu44Avni3pavGD_GeJ7KubJ-VXxrM3aeSxmqKP_AbBfh2W6JGdWdwmHv_uCzB_u3yaP5ex1-jQZz0rDa9qXBmC5ELLhBi3UWigQqlo0AqxtTIWMcpScagZCUgm1RZYnNcxaVQmlJL8g10ffXQwfe0x9uwn76PPLljXZjkGjRGaNjqyV7rB13oY-apN7iVtngkfrMj6WNVRUyEplAT8KTAwpRbTtLrqtjoeWQvudbvtPuvwLB6Ftsg</recordid><startdate>20230801</startdate><enddate>20230801</enddate><creator>Saeed, Mamoon M.</creator><creator>Saeed, Rashid A.</creator><creator>Abdelhaq, Maha</creator><creator>Alsaqour, Raed</creator><creator>Hasan, Mohammad Kamrul</creator><creator>Mokhtar, Rania A.</creator><general>MDPI AG</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SP</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>HCIFZ</scope><scope>L7M</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><orcidid>https://orcid.org/0000-0002-9872-081X</orcidid><orcidid>https://orcid.org/0000-0001-5511-0205</orcidid><orcidid>https://orcid.org/0000-0003-2350-5661</orcidid></search><sort><creationdate>20230801</creationdate><title>Anomaly Detection in 6G Networks Using Machine Learning Methods</title><author>Saeed, Mamoon M. ; Saeed, Rashid A. ; Abdelhaq, Maha ; Alsaqour, Raed ; Hasan, Mohammad Kamrul ; Mokhtar, Rania A.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c361t-c00db4783cef06a490495b840ff8c5e213e731a20471706fe27061c2ff9549973</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>6G mobile communication</topic><topic>Accuracy</topic><topic>Algorithms</topic><topic>Anomalies</topic><topic>Artificial intelligence</topic><topic>Classification</topic><topic>Communication networks</topic><topic>Data security</topic><topic>Datasets</topic><topic>Deep learning</topic><topic>Discriminant analysis</topic><topic>False alarms</topic><topic>Intelligent networks</topic><topic>Intrusion detection systems</topic><topic>Machine learning</topic><topic>Methods</topic><topic>Mobile communication systems</topic><topic>Optimization</topic><topic>Safety and security measures</topic><topic>Support vector machines</topic><topic>Wireless communication systems</topic><topic>Wireless communications</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Saeed, Mamoon M.</creatorcontrib><creatorcontrib>Saeed, Rashid A.</creatorcontrib><creatorcontrib>Abdelhaq, Maha</creatorcontrib><creatorcontrib>Alsaqour, Raed</creatorcontrib><creatorcontrib>Hasan, Mohammad Kamrul</creatorcontrib><creatorcontrib>Mokhtar, Rania A.</creatorcontrib><collection>CrossRef</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>SciTech Premium Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><jtitle>Electronics (Basel)</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Saeed, Mamoon M.</au><au>Saeed, Rashid A.</au><au>Abdelhaq, Maha</au><au>Alsaqour, Raed</au><au>Hasan, Mohammad Kamrul</au><au>Mokhtar, Rania A.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Anomaly Detection in 6G Networks Using Machine Learning Methods</atitle><jtitle>Electronics (Basel)</jtitle><date>2023-08-01</date><risdate>2023</risdate><volume>12</volume><issue>15</issue><spage>3300</spage><pages>3300-</pages><issn>2079-9292</issn><eissn>2079-9292</eissn><abstract>While the cloudification of networks with a micro-services-oriented design is a well-known feature of 5G, the 6G era of networks is closely related to intelligent network orchestration and management. Consequently, artificial intelligence (AI), machine learning (ML), and deep learning (DL) have a big part to play in the 6G paradigm that is being imagined. Future end-to-end automation of networks requires proactive threat detection, the use of clever mitigation strategies, and confirmation that 6G networks will be self-sustaining. To strengthen and consolidate the role of AI in safeguarding 6G networks, this article explores how AI may be employed in 6G security. In order to achieve this, a novel anomaly detection system for 6G networks (AD6GNs) based on ensemble learning (EL) for communication networks was redeveloped in this study. The first stage in the EL-ADCN process is pre-processing. The second stage is the feature selection approach. It applies the reimplemented hybrid approach using a comparison of the ensemble learning and feature selection random forest algorithms (CFS-RF). NB2015, CIC_IDS2017, NSL KDD, and CICDDOS2019 are the three datasets, each given a reduced dimensionality, and the top subset characteristic for each is determined separately. Hybrid EL techniques are used in the third step to find intrusions. The average voting methodology is employed as an aggregation method, and two classifiers—support vector machines (SVM) and random forests (RF)—are modified to be used as EL algorithms for bagging and adaboosting, respectively. Testing the concept of the last step involves employing classification forms that are binary and multi-class. The best experimental results were obtained by applying 30, 35, 40, and 40 features of the reimplemented system to the three datasets: NSL_KDD, UNSW_NB2015, CIC_IDS2017, and CICDDOS2019. For the NSL_KDD dataset, the accuracy was 99.5% with a false alarm rate of 0.0038; the accuracy was 99.9% for the UNSW_NB2015 dataset with a false alarm rate of 0.0076; and the accuracy was 99.8% for the CIC_IDS2017 dataset with a false alarm rate of 0.0009. However, the accuracy was 99.95426% for the CICDDOS2019 dataset, with a false alarm rate of 0.00113.</abstract><cop>Basel</cop><pub>MDPI AG</pub><doi>10.3390/electronics12153300</doi><orcidid>https://orcid.org/0000-0002-9872-081X</orcidid><orcidid>https://orcid.org/0000-0001-5511-0205</orcidid><orcidid>https://orcid.org/0000-0003-2350-5661</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 2079-9292
ispartof Electronics (Basel), 2023-08, Vol.12 (15), p.3300
issn 2079-9292
2079-9292
language eng
recordid cdi_proquest_journals_2849020894
source Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals; MDPI - Multidisciplinary Digital Publishing Institute
subjects 6G mobile communication
Accuracy
Algorithms
Anomalies
Artificial intelligence
Classification
Communication networks
Data security
Datasets
Deep learning
Discriminant analysis
False alarms
Intelligent networks
Intrusion detection systems
Machine learning
Methods
Mobile communication systems
Optimization
Safety and security measures
Support vector machines
Wireless communication systems
Wireless communications
title Anomaly Detection in 6G Networks Using Machine Learning Methods
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-19T19%3A49%3A00IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-gale_proqu&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Anomaly%20Detection%20in%206G%20Networks%20Using%20Machine%20Learning%20Methods&rft.jtitle=Electronics%20(Basel)&rft.au=Saeed,%20Mamoon%20M.&rft.date=2023-08-01&rft.volume=12&rft.issue=15&rft.spage=3300&rft.pages=3300-&rft.issn=2079-9292&rft.eissn=2079-9292&rft_id=info:doi/10.3390/electronics12153300&rft_dat=%3Cgale_proqu%3EA760514759%3C/gale_proqu%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2849020894&rft_id=info:pmid/&rft_galeid=A760514759&rfr_iscdi=true