Visible to the public Intrusion Detection System for 5G with a Focus on DOS/DDOS Attacks

TitleIntrusion Detection System for 5G with a Focus on DOS/DDOS Attacks
Publication TypeConference Paper
Year of Publication2021
AuthorsIashvili, Giorgi, Iavich, Maksim, Bocu, Razvan, Odarchenko, Roman, Gnatyuk, Sergiy
Conference Name2021 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)
Keywords5G, 5G mobile communication, composability, IDS, Industries, Intrusion detection, Intrusion Detection Systems, machine learning algorithms, pubcrawl, quality of service, Resiliency, security, Training, wireless networks
AbstractThe industry of telecommunications is being transformed towards 5G technology, because it has to deal with the emerging and existing use cases. Because, 5G wireless networks need rather large data rates and much higher coverage of the dense base station deployment with the bigger capacity, much better Quality of Service - QoS, and the need very low latency [1-3]. The provision of the needed services which are envisioned by 5G technologies need the new service models of deployment, networking architectures, processing technologies and storage to be defined. These technologies will cause the new problems for the cybersecurity of 5G systems and the security of their functionality. The developers and researchers working in this field make their best to secure 5G systems. The researchers showed that 5G systems have the security challenges. The researchers found the vulnerabilities in 5G systems which allow attackers to integrate malicious code into the system and make the different types of the illegitimate actions. MNmap, Battery drain attacks and MiTM can be successfully implemented on 5G. The paper makes the analysis of the existing cyber security problems in 5G technology. Based on the analysis, we suggest the novel Intrusion Detection System - IDS by means of the machine-learning algorithms. In the related papers the scientists offer to use NSL-KDD in order to train IDS. In our paper we offer to train IDS using the big datasets of DOS/DDOS attacks, besides of training using NSL-KDD. The research also offers the methodology of integration of the offered intrusion detection systems into an standard architecture of 5G. The paper also offers the pseudo code of the designed system.
DOI10.1109/IDAACS53288.2021.9661021
Citation Keyiashvili_intrusion_2021