INTRUSION DETECTION SYSTEM FOR 5G

Автор: Maksim Iavich, Giorgi Iashvili, Avtandil Gagnidze, Shalva Khukhashvili, Sergei Simonovi
Организация: Caucasus University, Scientific Cyber Security Association

Категория:

Ключевые слова: 5G network, 5G security, cellular networks
Аннотация. The telecommunications industry is evolving significantly to implement 5G networks. The new standard must meet the requirements of current and future users. Customers and clients need better quality of service and a high level of security in order for data to be transmitted securely and other

Библиография:

1.The analysis of the difference of 4G and 5G securities; M. Iavich, G. Iashvili, A. Gagnidze, L. Nachkebia, S. Khukhashvili; Scientific and practical cyber security journal, (SPCSJ) 4(3); 2020.
2.Y. Sun, Z. Tian, M. Li, C. Zhu and N. Guizani, "Automated Attack and Defense Framework toward 5G Security," in IEEE Network, vol. 34, no. 5, pp. 247-253, September/October 2020, doi: 10.1109/MNET.011.1900635.
3.Park S., Cho H., Park Y., Choi B., Kim D., Yim K. (2020) Security Problems of 5G Voice Communication. In: You I. (eds) Information Security Applications. WISA 2020. Lecture Notes in Computer Science, vol 12583. Springer, Cham. https://doi.org/10.1007/978-3-030-65299-9_30
4.LIU Jianwei, HAN Yiran, LIU Bin, YU Beiyuan. Research on 5G Network Slicing Security Model[J]. Netinfo Security, 2020, 20(4): 1-11.
5.Ullah I., Mahmoud Q.H. (2020) A Scheme for Generating a Dataset for Anomalous Activity Detection in IoT Networks. In: Goutte C., Zhu X. (eds) Advances in Artificial Intelligence. Canadian AI 2020. Lecture Notes in Computer Science, vol 12109. Springer, Cham. https://doi.org/10.1007/978-3-030-47358-7_52
6.Ullah I., Mahmoud Q.H. (2020) A Scheme for Generating a Dataset for Anomalous Activity Detection in IoT Networks. In: Goutte C., Zhu X. (eds) Advances in Artificial Intelligence. Canadian AI 2020. Lecture Notes in Computer Science, vol 12109. Springer, Cham. https://doi.org/10.1007/978-3-030-47358-7_52
7.Kumar, V., Sinha, D., Das, A.K. et al. An integrated rule based intrusion detection system: analysis on UNSW-NB15 data set and the real time online dataset. Cluster Comput 23, 1397–1418 (2020). https://doi.org/10.1007/s10586-019-03008-x