Anomaly Detection in 6G Networks Using Machine Learning Methods
While the cloudification of networks with a micro-services-oriented design is a well-known feature of 5G, the 6G era of networks is closely related to intelligent network orchestration and management. Consequently, artificial intelligence (AI), machine learning (ML), and deep learning (DL) have a bi...
Gespeichert in:
Veröffentlicht in: | Electronics (Basel) 2023-08, Vol.12 (15), p.3300 |
---|---|
Hauptverfasser: | , , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | 15 |
container_start_page | 3300 |
container_title | Electronics (Basel) |
container_volume | 12 |
creator | Saeed, Mamoon M. Saeed, Rashid A. Abdelhaq, Maha Alsaqour, Raed Hasan, Mohammad Kamrul Mokhtar, Rania A. |
description | While the cloudification of networks with a micro-services-oriented design is a well-known feature of 5G, the 6G era of networks is closely related to intelligent network orchestration and management. Consequently, artificial intelligence (AI), machine learning (ML), and deep learning (DL) have a big part to play in the 6G paradigm that is being imagined. Future end-to-end automation of networks requires proactive threat detection, the use of clever mitigation strategies, and confirmation that 6G networks will be self-sustaining. To strengthen and consolidate the role of AI in safeguarding 6G networks, this article explores how AI may be employed in 6G security. In order to achieve this, a novel anomaly detection system for 6G networks (AD6GNs) based on ensemble learning (EL) for communication networks was redeveloped in this study. The first stage in the EL-ADCN process is pre-processing. The second stage is the feature selection approach. It applies the reimplemented hybrid approach using a comparison of the ensemble learning and feature selection random forest algorithms (CFS-RF). NB2015, CIC_IDS2017, NSL KDD, and CICDDOS2019 are the three datasets, each given a reduced dimensionality, and the top subset characteristic for each is determined separately. Hybrid EL techniques are used in the third step to find intrusions. The average voting methodology is employed as an aggregation method, and two classifiers—support vector machines (SVM) and random forests (RF)—are modified to be used as EL algorithms for bagging and adaboosting, respectively. Testing the concept of the last step involves employing classification forms that are binary and multi-class. The best experimental results were obtained by applying 30, 35, 40, and 40 features of the reimplemented system to the three datasets: NSL_KDD, UNSW_NB2015, CIC_IDS2017, and CICDDOS2019. For the NSL_KDD dataset, the accuracy was 99.5% with a false alarm rate of 0.0038; the accuracy was 99.9% for the UNSW_NB2015 dataset with a false alarm rate of 0.0076; and the accuracy was 99.8% for the CIC_IDS2017 dataset with a false alarm rate of 0.0009. However, the accuracy was 99.95426% for the CICDDOS2019 dataset, with a false alarm rate of 0.00113. |
doi_str_mv | 10.3390/electronics12153300 |
format | Article |
fullrecord | <record><control><sourceid>gale_proqu</sourceid><recordid>TN_cdi_proquest_journals_2849020894</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><galeid>A760514759</galeid><sourcerecordid>A760514759</sourcerecordid><originalsourceid>FETCH-LOGICAL-c361t-c00db4783cef06a490495b840ff8c5e213e731a20471706fe27061c2ff9549973</originalsourceid><addsrcrecordid>eNptUE1LAzEQDaJg0f4CLwuet04-drM5SalahaoXe17SdNKmbpOabJH-e6P14MEZmBke772BR8gVhRHnCm6wQ9PH4J1JlNGKc4ATMmAgVamYYqd_7nMyTGkDuRTlDYcBuR37sNXdobjDPtu44Avni3pavGD_GeJ7KubJ-VXxrM3aeSxmqKP_AbBfh2W6JGdWdwmHv_uCzB_u3yaP5ex1-jQZz0rDa9qXBmC5ELLhBi3UWigQqlo0AqxtTIWMcpScagZCUgm1RZYnNcxaVQmlJL8g10ffXQwfe0x9uwn76PPLljXZjkGjRGaNjqyV7rB13oY-apN7iVtngkfrMj6WNVRUyEplAT8KTAwpRbTtLrqtjoeWQvudbvtPuvwLB6Ftsg</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2849020894</pqid></control><display><type>article</type><title>Anomaly Detection in 6G Networks Using Machine Learning Methods</title><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><source>MDPI - Multidisciplinary Digital Publishing Institute</source><creator>Saeed, Mamoon M. ; Saeed, Rashid A. ; Abdelhaq, Maha ; Alsaqour, Raed ; Hasan, Mohammad Kamrul ; Mokhtar, Rania A.</creator><creatorcontrib>Saeed, Mamoon M. ; Saeed, Rashid A. ; Abdelhaq, Maha ; Alsaqour, Raed ; Hasan, Mohammad Kamrul ; Mokhtar, Rania A.</creatorcontrib><description>While the cloudification of networks with a micro-services-oriented design is a well-known feature of 5G, the 6G era of networks is closely related to intelligent network orchestration and management. Consequently, artificial intelligence (AI), machine learning (ML), and deep learning (DL) have a big part to play in the 6G paradigm that is being imagined. Future end-to-end automation of networks requires proactive threat detection, the use of clever mitigation strategies, and confirmation that 6G networks will be self-sustaining. To strengthen and consolidate the role of AI in safeguarding 6G networks, this article explores how AI may be employed in 6G security. In order to achieve this, a novel anomaly detection system for 6G networks (AD6GNs) based on ensemble learning (EL) for communication networks was redeveloped in this study. The first stage in the EL-ADCN process is pre-processing. The second stage is the feature selection approach. It applies the reimplemented hybrid approach using a comparison of the ensemble learning and feature selection random forest algorithms (CFS-RF). NB2015, CIC_IDS2017, NSL KDD, and CICDDOS2019 are the three datasets, each given a reduced dimensionality, and the top subset characteristic for each is determined separately. Hybrid EL techniques are used in the third step to find intrusions. The average voting methodology is employed as an aggregation method, and two classifiers—support vector machines (SVM) and random forests (RF)—are modified to be used as EL algorithms for bagging and adaboosting, respectively. Testing the concept of the last step involves employing classification forms that are binary and multi-class. The best experimental results were obtained by applying 30, 35, 40, and 40 features of the reimplemented system to the three datasets: NSL_KDD, UNSW_NB2015, CIC_IDS2017, and CICDDOS2019. For the NSL_KDD dataset, the accuracy was 99.5% with a false alarm rate of 0.0038; the accuracy was 99.9% for the UNSW_NB2015 dataset with a false alarm rate of 0.0076; and the accuracy was 99.8% for the CIC_IDS2017 dataset with a false alarm rate of 0.0009. However, the accuracy was 99.95426% for the CICDDOS2019 dataset, with a false alarm rate of 0.00113.</description><identifier>ISSN: 2079-9292</identifier><identifier>EISSN: 2079-9292</identifier><identifier>DOI: 10.3390/electronics12153300</identifier><language>eng</language><publisher>Basel: MDPI AG</publisher><subject>6G mobile communication ; Accuracy ; Algorithms ; Anomalies ; Artificial intelligence ; Classification ; Communication networks ; Data security ; Datasets ; Deep learning ; Discriminant analysis ; False alarms ; Intelligent networks ; Intrusion detection systems ; Machine learning ; Methods ; Mobile communication systems ; Optimization ; Safety and security measures ; Support vector machines ; Wireless communication systems ; Wireless communications</subject><ispartof>Electronics (Basel), 2023-08, Vol.12 (15), p.3300</ispartof><rights>COPYRIGHT 2023 MDPI AG</rights><rights>2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c361t-c00db4783cef06a490495b840ff8c5e213e731a20471706fe27061c2ff9549973</citedby><cites>FETCH-LOGICAL-c361t-c00db4783cef06a490495b840ff8c5e213e731a20471706fe27061c2ff9549973</cites><orcidid>0000-0002-9872-081X ; 0000-0001-5511-0205 ; 0000-0003-2350-5661</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27924,27925</link.rule.ids></links><search><creatorcontrib>Saeed, Mamoon M.</creatorcontrib><creatorcontrib>Saeed, Rashid A.</creatorcontrib><creatorcontrib>Abdelhaq, Maha</creatorcontrib><creatorcontrib>Alsaqour, Raed</creatorcontrib><creatorcontrib>Hasan, Mohammad Kamrul</creatorcontrib><creatorcontrib>Mokhtar, Rania A.</creatorcontrib><title>Anomaly Detection in 6G Networks Using Machine Learning Methods</title><title>Electronics (Basel)</title><description>While the cloudification of networks with a micro-services-oriented design is a well-known feature of 5G, the 6G era of networks is closely related to intelligent network orchestration and management. Consequently, artificial intelligence (AI), machine learning (ML), and deep learning (DL) have a big part to play in the 6G paradigm that is being imagined. Future end-to-end automation of networks requires proactive threat detection, the use of clever mitigation strategies, and confirmation that 6G networks will be self-sustaining. To strengthen and consolidate the role of AI in safeguarding 6G networks, this article explores how AI may be employed in 6G security. In order to achieve this, a novel anomaly detection system for 6G networks (AD6GNs) based on ensemble learning (EL) for communication networks was redeveloped in this study. The first stage in the EL-ADCN process is pre-processing. The second stage is the feature selection approach. It applies the reimplemented hybrid approach using a comparison of the ensemble learning and feature selection random forest algorithms (CFS-RF). NB2015, CIC_IDS2017, NSL KDD, and CICDDOS2019 are the three datasets, each given a reduced dimensionality, and the top subset characteristic for each is determined separately. Hybrid EL techniques are used in the third step to find intrusions. The average voting methodology is employed as an aggregation method, and two classifiers—support vector machines (SVM) and random forests (RF)—are modified to be used as EL algorithms for bagging and adaboosting, respectively. Testing the concept of the last step involves employing classification forms that are binary and multi-class. The best experimental results were obtained by applying 30, 35, 40, and 40 features of the reimplemented system to the three datasets: NSL_KDD, UNSW_NB2015, CIC_IDS2017, and CICDDOS2019. For the NSL_KDD dataset, the accuracy was 99.5% with a false alarm rate of 0.0038; the accuracy was 99.9% for the UNSW_NB2015 dataset with a false alarm rate of 0.0076; and the accuracy was 99.8% for the CIC_IDS2017 dataset with a false alarm rate of 0.0009. However, the accuracy was 99.95426% for the CICDDOS2019 dataset, with a false alarm rate of 0.00113.</description><subject>6G mobile communication</subject><subject>Accuracy</subject><subject>Algorithms</subject><subject>Anomalies</subject><subject>Artificial intelligence</subject><subject>Classification</subject><subject>Communication networks</subject><subject>Data security</subject><subject>Datasets</subject><subject>Deep learning</subject><subject>Discriminant analysis</subject><subject>False alarms</subject><subject>Intelligent networks</subject><subject>Intrusion detection systems</subject><subject>Machine learning</subject><subject>Methods</subject><subject>Mobile communication systems</subject><subject>Optimization</subject><subject>Safety and security measures</subject><subject>Support vector machines</subject><subject>Wireless communication systems</subject><subject>Wireless communications</subject><issn>2079-9292</issn><issn>2079-9292</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><recordid>eNptUE1LAzEQDaJg0f4CLwuet04-drM5SalahaoXe17SdNKmbpOabJH-e6P14MEZmBke772BR8gVhRHnCm6wQ9PH4J1JlNGKc4ATMmAgVamYYqd_7nMyTGkDuRTlDYcBuR37sNXdobjDPtu44Avni3pavGD_GeJ7KubJ-VXxrM3aeSxmqKP_AbBfh2W6JGdWdwmHv_uCzB_u3yaP5ex1-jQZz0rDa9qXBmC5ELLhBi3UWigQqlo0AqxtTIWMcpScagZCUgm1RZYnNcxaVQmlJL8g10ffXQwfe0x9uwn76PPLljXZjkGjRGaNjqyV7rB13oY-apN7iVtngkfrMj6WNVRUyEplAT8KTAwpRbTtLrqtjoeWQvudbvtPuvwLB6Ftsg</recordid><startdate>20230801</startdate><enddate>20230801</enddate><creator>Saeed, Mamoon M.</creator><creator>Saeed, Rashid A.</creator><creator>Abdelhaq, Maha</creator><creator>Alsaqour, Raed</creator><creator>Hasan, Mohammad Kamrul</creator><creator>Mokhtar, Rania A.</creator><general>MDPI AG</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SP</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>HCIFZ</scope><scope>L7M</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><orcidid>https://orcid.org/0000-0002-9872-081X</orcidid><orcidid>https://orcid.org/0000-0001-5511-0205</orcidid><orcidid>https://orcid.org/0000-0003-2350-5661</orcidid></search><sort><creationdate>20230801</creationdate><title>Anomaly Detection in 6G Networks Using Machine Learning Methods</title><author>Saeed, Mamoon M. ; Saeed, Rashid A. ; Abdelhaq, Maha ; Alsaqour, Raed ; Hasan, Mohammad Kamrul ; Mokhtar, Rania A.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c361t-c00db4783cef06a490495b840ff8c5e213e731a20471706fe27061c2ff9549973</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>6G mobile communication</topic><topic>Accuracy</topic><topic>Algorithms</topic><topic>Anomalies</topic><topic>Artificial intelligence</topic><topic>Classification</topic><topic>Communication networks</topic><topic>Data security</topic><topic>Datasets</topic><topic>Deep learning</topic><topic>Discriminant analysis</topic><topic>False alarms</topic><topic>Intelligent networks</topic><topic>Intrusion detection systems</topic><topic>Machine learning</topic><topic>Methods</topic><topic>Mobile communication systems</topic><topic>Optimization</topic><topic>Safety and security measures</topic><topic>Support vector machines</topic><topic>Wireless communication systems</topic><topic>Wireless communications</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Saeed, Mamoon M.</creatorcontrib><creatorcontrib>Saeed, Rashid A.</creatorcontrib><creatorcontrib>Abdelhaq, Maha</creatorcontrib><creatorcontrib>Alsaqour, Raed</creatorcontrib><creatorcontrib>Hasan, Mohammad Kamrul</creatorcontrib><creatorcontrib>Mokhtar, Rania A.</creatorcontrib><collection>CrossRef</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>SciTech Premium Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><jtitle>Electronics (Basel)</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Saeed, Mamoon M.</au><au>Saeed, Rashid A.</au><au>Abdelhaq, Maha</au><au>Alsaqour, Raed</au><au>Hasan, Mohammad Kamrul</au><au>Mokhtar, Rania A.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Anomaly Detection in 6G Networks Using Machine Learning Methods</atitle><jtitle>Electronics (Basel)</jtitle><date>2023-08-01</date><risdate>2023</risdate><volume>12</volume><issue>15</issue><spage>3300</spage><pages>3300-</pages><issn>2079-9292</issn><eissn>2079-9292</eissn><abstract>While the cloudification of networks with a micro-services-oriented design is a well-known feature of 5G, the 6G era of networks is closely related to intelligent network orchestration and management. Consequently, artificial intelligence (AI), machine learning (ML), and deep learning (DL) have a big part to play in the 6G paradigm that is being imagined. Future end-to-end automation of networks requires proactive threat detection, the use of clever mitigation strategies, and confirmation that 6G networks will be self-sustaining. To strengthen and consolidate the role of AI in safeguarding 6G networks, this article explores how AI may be employed in 6G security. In order to achieve this, a novel anomaly detection system for 6G networks (AD6GNs) based on ensemble learning (EL) for communication networks was redeveloped in this study. The first stage in the EL-ADCN process is pre-processing. The second stage is the feature selection approach. It applies the reimplemented hybrid approach using a comparison of the ensemble learning and feature selection random forest algorithms (CFS-RF). NB2015, CIC_IDS2017, NSL KDD, and CICDDOS2019 are the three datasets, each given a reduced dimensionality, and the top subset characteristic for each is determined separately. Hybrid EL techniques are used in the third step to find intrusions. The average voting methodology is employed as an aggregation method, and two classifiers—support vector machines (SVM) and random forests (RF)—are modified to be used as EL algorithms for bagging and adaboosting, respectively. Testing the concept of the last step involves employing classification forms that are binary and multi-class. The best experimental results were obtained by applying 30, 35, 40, and 40 features of the reimplemented system to the three datasets: NSL_KDD, UNSW_NB2015, CIC_IDS2017, and CICDDOS2019. For the NSL_KDD dataset, the accuracy was 99.5% with a false alarm rate of 0.0038; the accuracy was 99.9% for the UNSW_NB2015 dataset with a false alarm rate of 0.0076; and the accuracy was 99.8% for the CIC_IDS2017 dataset with a false alarm rate of 0.0009. However, the accuracy was 99.95426% for the CICDDOS2019 dataset, with a false alarm rate of 0.00113.</abstract><cop>Basel</cop><pub>MDPI AG</pub><doi>10.3390/electronics12153300</doi><orcidid>https://orcid.org/0000-0002-9872-081X</orcidid><orcidid>https://orcid.org/0000-0001-5511-0205</orcidid><orcidid>https://orcid.org/0000-0003-2350-5661</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2079-9292 |
ispartof | Electronics (Basel), 2023-08, Vol.12 (15), p.3300 |
issn | 2079-9292 2079-9292 |
language | eng |
recordid | cdi_proquest_journals_2849020894 |
source | Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals; MDPI - Multidisciplinary Digital Publishing Institute |
subjects | 6G mobile communication Accuracy Algorithms Anomalies Artificial intelligence Classification Communication networks Data security Datasets Deep learning Discriminant analysis False alarms Intelligent networks Intrusion detection systems Machine learning Methods Mobile communication systems Optimization Safety and security measures Support vector machines Wireless communication systems Wireless communications |
title | Anomaly Detection in 6G Networks Using Machine Learning Methods |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-19T19%3A49%3A00IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-gale_proqu&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Anomaly%20Detection%20in%206G%20Networks%20Using%20Machine%20Learning%20Methods&rft.jtitle=Electronics%20(Basel)&rft.au=Saeed,%20Mamoon%20M.&rft.date=2023-08-01&rft.volume=12&rft.issue=15&rft.spage=3300&rft.pages=3300-&rft.issn=2079-9292&rft.eissn=2079-9292&rft_id=info:doi/10.3390/electronics12153300&rft_dat=%3Cgale_proqu%3EA760514759%3C/gale_proqu%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2849020894&rft_id=info:pmid/&rft_galeid=A760514759&rfr_iscdi=true |