INTRUSION DETECTION SYSTEM FOR 5G

Authors: Maksim Iavich, Giorgi Iashvili, Avtandil Gagnidze, Shalva Khukhashvili, Sergei Simonovi
Affiliation: Caucasus University, Scientific Cyber Security Association

Category:

Keywords: 5G network, 5G security, cellular networks
ABSTRACT. The telecommunications industry is evolving significantly to implement 5G networks. The new standard must meet the requirements of current and future users. Customers and clients need better quality of service and a high level of security in order for data to be transmitted securely and other internal services to work flawlessly. Consequently, leading mobile operators need to ensure much better customer quality and security, as well as improve the services they offer. The new methodology proposed by 5G requires new approaches to networking, service deployment, and data processing. These approaches are characterized by certain security vulnerabilities that will also be critical for 5G networks. The world's leading researchers working in this field have already publicly stated the current problems of 5G networks. Analysis presented by us reveals the detailed causes of 5G problems, which allows the attacker to install malicious code in the system and successfully carry out the following attacks: MiTM, MNmap and Battery drain. We have developed a new system for detecting attacks based on the latest methods of machine and indepth learning. We propose the integration of IDS into the 5G architecture.

References:

1.The analysis of the difference of 4G and 5G securities; M. Iavich, G. Iashvili, A. Gagnidze, L. Nachkebia, S. Khukhashvili; Scientific and practical cyber security journal, (SPCSJ) 4(3); 2020.
2.Y. Sun, Z. Tian, M. Li, C. Zhu and N. Guizani, "Automated Attack and Defense Framework toward 5G Security," in IEEE Network, vol. 34, no. 5, pp. 247-253, September/October 2020, doi: 10.1109/MNET.011.1900635.
3.Park S., Cho H., Park Y., Choi B., Kim D., Yim K. (2020) Security Problems of 5G Voice Communication. In: You I. (eds) Information Security Applications. WISA 2020. Lecture Notes in Computer Science, vol 12583. Springer, Cham. https://doi.org/10.1007/978-3-030-65299-9_30
4.LIU Jianwei, HAN Yiran, LIU Bin, YU Beiyuan. Research on 5G Network Slicing Security Model[J]. Netinfo Security, 2020, 20(4): 1-11.
5.Ullah I., Mahmoud Q.H. (2020) A Scheme for Generating a Dataset for Anomalous Activity Detection in IoT Networks. In: Goutte C., Zhu X. (eds) Advances in Artificial Intelligence. Canadian AI 2020. Lecture Notes in Computer Science, vol 12109. Springer, Cham. https://doi.org/10.1007/978-3-030-47358-7_52
6.Ullah I., Mahmoud Q.H. (2020) A Scheme for Generating a Dataset for Anomalous Activity Detection in IoT Networks. In: Goutte C., Zhu X. (eds) Advances in Artificial Intelligence. Canadian AI 2020. Lecture Notes in Computer Science, vol 12109. Springer, Cham. https://doi.org/10.1007/978-3-030-47358-7_52
7.Kumar, V., Sinha, D., Das, A.K. et al. An integrated rule based intrusion detection system: analysis on UNSW-NB15 data set and the real time online dataset. Cluster Comput 23, 1397–1418 (2020). https://doi.org/10.1007/s10586-019-03008-x