Visible to the public Multi-stage Jamming Attacks Detection using Deep Learning Combined with Kernelized Support Vector Machine in 5G Cloud Radio Access Networks

TitleMulti-stage Jamming Attacks Detection using Deep Learning Combined with Kernelized Support Vector Machine in 5G Cloud Radio Access Networks
Publication TypeConference Paper
Year of Publication2020
AuthorsHachimi, Marouane, Kaddoum, Georges, Gagnon, Ghyslain, Illy, Poulmanogo
Conference Name2020 International Symposium on Networks, Computers and Communications (ISNCC)
Date PublishedOct. 2020
PublisherIEEE
ISBN Number978-1-7281-5628-6
Keywordsattack vectors, Cloud Radio Access Network, cloud radio access networks, Communication system security, Human Behavior, Intrusion detection, jamming, jamming attacks, Machine Learning-based Intrusion Detection System, Multilayer Perceptron, pubcrawl, resilience, Resiliency, Scalability, security, support vector machine, Support vector machines, Wireless sensor networks, Wireless Sensor Networks DataSet
Abstract

In 5G networks, the Cloud Radio Access Network (C-RAN) is considered a promising future architecture in terms of minimizing energy consumption and allocating resources efficiently by providing real-time cloud infrastructures, cooperative radio, and centralized data processing. Recently, given their vulnerability to malicious attacks, the security of C-RAN networks has attracted significant attention. Among various anomaly-based intrusion detection techniques, the most promising one is the machine learning-based intrusion detection as it learns without human assistance and adjusts actions accordingly. In this direction, many solutions have been proposed, but they show either low accuracy in terms of attack classification or they offer just a single layer of attack detection. This research focuses on deploying a multi-stage machine learning-based intrusion detection (ML-IDS) in 5G C-RAN that can detect and classify four types of jamming attacks: constant jamming, random jamming, deceptive jamming, and reactive jamming. This deployment enhances security by minimizing the false negatives in C-RAN architectures. The experimental evaluation of the proposed solution is carried out using WSN-DS (Wireless Sensor Networks DataSet), which is a dedicated wireless dataset for intrusion detection. The final classification accuracy of attacks is 94.51% with a 7.84% false negative rate.

URLhttps://ieeexplore.ieee.org/document/9297290
DOI10.1109/ISNCC49221.2020.9297290
Citation Keyhachimi_multi-stage_2020