5G Networks Security: Attack Detection Using the J48 and the Random Forest Tree Classifiers
Average rating
Cast your vote
You can rate an item by clicking the amount of stars they wish to award to this item.
When enough users have cast their vote on this item, the average rating will also be shown.
Star rating
Your vote was cast
Thank you for your feedback
Thank you for your feedback
Keyword
5G networksradios
next generation
millimeter waves
network function virtualization
network slicing
cellular communication networks
Date Published
2020
Metadata
Show full item recordAbstract
5G is the next generation of cellular networks succeeding and improving upon the last generation of 4G Long Term Evolution (LTE) networks. With the introduction of 5G comes significant improvements over the previous generation with the ability to support new and emerging technologies in addition to the growth in the number of devices. The purpose of this report is to give a broad overview of what 5G encompasses including the architecture, underlying technology, advanced features, use cases/applications, and security, and to evaluate the security of this new networks using existing machine learning classification techniques such as The J48 Tree Classifier and the Random Forest tree classifier. The evaluation is based on the UNSW-NB15 dataset that was created at the Cyber Range Lab of the Australian Centre for Cyber Security (ACCS) at the University of New South Wales. Since 5G datasets have yet to have been created, there is no publicly available dataset for the 5G systems. However, While the UNSW-NB15 dataset is built using a standard wireless computer network, we will use it to simulate the device-to-device (D2D) connections that 5G will support. In the case with the UNSW dataset, the J48 tree classifier fits more accurately than the Random Forest classifier. The J48 tree classifier achieved an 86.422% of correctly classified instances. On the other hand, the Random Forest tree classifier achieved 85.8451% of correctly classified instances.Citation
Steele, B., & Kholidy, H. A. (2020). 5G Networks Security: Attack Detection Using the J48 and the Random Forest Tree Classifiers: A Capstone Report. Department of Network and Computer Security, College of Engineering, SUNY Polytechnic Institute.Related items
Showing items related by title, author, creator and subject.
-
The Deep Space Network - A Technology Case Study and What Improvements to the Deep Space Network are Needed to Support Crewed Missions to Mars?Falke, Prasad; Hash, Larry; Advisor; Marsh, John; Reviewer; White, Joshua; Reviewer; Climek, David; Reviewer; Kwiat, Kevin; Reviewer (2017-05-28)The purpose of this thesis research is to find out what experts and interested people think about Deep Space Network (DSN) technology for the crewed Mars mission in the future. The research document also addresses possible limitations which need to be fix before any critical missions. The paper discusses issues such as: data rate, hardware upgrade and new install requirement and a budget required for that, propagation delay, need of dedicated antenna support for the mission and security constraints. The Technology Case Study (TCS) and focused discussion help to know the possible solutions and what everyone things about the DSN technology. The public platforms like Quora, Reddit, StackExchange, and Facebook Mars Society group assisted in gathering technical answers from the experts and individuals interested in this research.
-
Presentation of Self in MySpace.com an Online Social Networking SitePerretta, Heather (2007-05-01)This ethnographic study explores the presentation of self on MySpace.com, an online social networking website. One hundred MySpace.com profile pages were analyzed to discover how users complete and manipulate the MySpace template to create a virtual presentation of self. The one hundred profile pages represented fifty stated female users and fifty stated male users. Each page was archived and coded based on the elements present that were viewable by the public. All users were selected at random using the website search tool and a random number generator. The work of Erving Goffman in his 1959 book, The Presentation of Self in Everyday Life, is the theoretical foundation for the this study. Analysis of the profile pages sampled indicates that most users studied modify the default template and add various elements from textual information to pictures, music, and video clips to the profile pages and create a virtual presentation of self on MySpace.com.
-
Risk Sensitive Optimal Synchronization of Coupled Stochastic Neural Networks with Chaotic PhenomenaLiu, Ziqian (IEEE, 2015-05-26)This paper presents a new theoretical design of how an optimal synchronization is achieved for stochastic coupled neural networks with respect to a risk sensitive optimality criterion. The approach is rigorously developed by using the Hamilton-Jacobi-Bellman equation, Lyapunov technique, and inverse optimality, to obtain a risk sensitive state feedback controller, which guarantees that the chaotic drive network synchronizes with the chaotic response network influenced by uncertain noise signals, with an eye on a given risk sensitivity parameter. Finally, a numerical example is given to demonstrate the effectiveness of the proposed approach.