检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:Ishtiaque Mahmood Tahir Alyas Sagheer Abbas Tariq Shahzad Qaiser Abbas Khmaies Ouahada
机构地区:[1]Knowledge Unit of Systems and Technology,UMT Sialkot Campus,Sialkot,51040,Pakistan [2]Department of Computer Science,Lahore Garrison University,Lahore,54000,Pakistan [3]Faculty of Computer Science,National College of Business Administration and Economics,Lahore,54660,Pakistan [4]Department of Electrical and Computer Engineering,COMSATS University Islamabad,Sahiwal Campus,Sahiwal,57000,Pakistan [5]Faculty of Computer and Information Systems Islamic University of Madinah,Madinah,42351,Saudi Arabia [6]Department of Computer Science&IT,University of Sargodha,Sargodha,40100,Pakistan [7]Department of Electrical and Electronic Engineering Science,University of Johannesburg,P.O Box 524,Auckland Park,Johannesburg,2006,South Africa
出 处:《Computer Systems Science & Engineering》2023年第11期2439-2453,共15页计算机系统科学与工程(英文)
摘 要:Attacks on fully integrated servers,apps,and communication networks via the Internet of Things(IoT)are growing exponentially.Sensitive devices’effectiveness harms end users,increases cyber threats and identity theft,raises costs,and negatively impacts income as problems brought on by the Internet of Things network go unnoticed for extended periods.Attacks on Internet of Things interfaces must be closely monitored in real time for effective safety and security.Following the 1,2,3,and 4G cellular networks,the 5th generation wireless 5G network is indeed the great invasion of mankind and is known as the global advancement of cellular networks.Even to this day,experts are working on the evolution’s sixth generation(6G).It offers amazing capabilities for connecting everything,including gadgets and machines,with wavelengths ranging from 1 to 10 mm and frequencies ranging from 300 MHz to 3 GHz.It gives you the most recent information.Many countries have already established this technology within their border.Security is the most crucial aspect of using a 5G network.Because of the absence of study and network deployment,new technology first introduces new gaps for attackers and hackers.Internet Protocol(IP)attacks and intrusion will become more prevalent in this system.An efficient approach to detect intrusion in the 5G network using a Machine Learning algorithm will be provided in this research.This research will highlight the high accuracy rate by validating it for unidentified and suspicious circumstances in the 5G network,such as intruder hackers/attackers.After applying different machine learning algorithms,obtained the best result on Linear Regression Algorithm’s implementation on the dataset results in 92.12%on test data and 92.13%on train data with 92%precision.
关 键 词:Intrusion detection system machine learning CONFIDENTIALITY INTEGRITY AVAILABILITY
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.222