检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:Ana Hermosilla Jorge Gallego-Madrid Pedro Martinez-Julia Jordi Ortiz Ved P.Kafle Antonio Skarmeta
机构地区:[1]Information and Communications Engineering Department,University of Murcia,Murcia,30100,Spain [2]Research&Development Department,Odin Solutions S.L.,Murcia,30007,Spain [3]Network Architecture Laboratory,Network Research Institute,National Institute of Information and Communications,Tokyo,184-8795,Japan [4]Engineering and Applied Techniques Department,University Center of Defense at the Spanish Air Force Academy,Murcia,30729,Spain
出 处:《Computer Modeling in Engineering & Sciences》2024年第11期1447-1471,共25页工程与科学中的计算机建模(英文)
摘 要:As 5th Generation(5G)and Beyond 5G(B5G)networks become increasingly prevalent,ensuring not only networksecurity but also the security and reliability of the applications,the so-called network applications,becomesof paramount importance.This paper introduces a novel integrated model architecture,combining a networkapplication validation framework with an AI-driven reactive system to enhance security in real-time.The proposedmodel leverages machine learning(ML)and artificial intelligence(AI)to dynamically monitor and respond tosecurity threats,effectively mitigating potential risks before they impact the network infrastructure.This dualapproach not only validates the functionality and performance of network applications before their real deploymentbut also enhances the network’s ability to adapt and respond to threats as they arise.The implementation ofthis model,in the shape of an architecture deployed in two distinct sites,demonstrates its practical viability andeffectiveness.Integrating application validation with proactive threat detection and response,the proposed modeladdresses critical security challenges unique to 5G infrastructures.This paper details the model,architecture’sdesign,implementation,and evaluation of this solution,illustrating its potential to improve network securitymanagement in 5G environments significantly.Our findings highlight the architecture’s capability to ensure boththe operational integrity of network applications and the security of the underlying infrastructure,presenting asignificant advancement in network security.
关 键 词:Network application network function virtualization machine learning SECURITY 5G
分 类 号:TN929.5[电子电信—通信与信息系统] TP181[电子电信—信息与通信工程]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:18.117.114.211