SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML

Page 1

SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML

1,2,3Students of B.Tech in Electronics & Communication Engineering, Vellore Institute of Technology, Vellore, India, 4Student of M.Tech in Software Engineering, Vellore Institute of Technology, Amaravathi, India, ***

Abstract - A disconnected system currently poses a significant problem for IoT technologies. The potential of 5G to send data faster and allow more links can address the current difficulty while also simplifying connected device control. 5G, on the other hand, will be able to process data swiftly using 4G/LTE networks, which has been a barrier for IoT solutions. As a result, there have been substantial delays between sending data and receiving it. By utilizing the 5G network, more users would be able to send more data without the risk of overcrowding the network, which has previously resulted in delays. Everyone would be able to see the benefits of IoT technology thanks to 5G connectivity. The IoT's potential is enormous right now, but 5G technology will bring it to full.

The fifth-generation (5G) networks are being developed and prepared for deployment by the mobile industry. The rise of IoT and other intelligent automation applications is being significantly fueled by the burgeoning 5G networks, which are becoming more widely accessible. All rely on 5G's superfast connectivity and low latency, including the Internet of Things (IoT), artificial intelligence (AI), driverless cars, virtual reality (VR), blockchain, and future innovations we haven't even thought of yet. The introduction of 5G represents more than just a generational change for the IT sector as a whole.

Key Words: Artificial Intelligence, 5th Generation, Blockchain, Latency, IOT

1. INTRODUCTION

The Internet of Things, or IoT, is becoming more wellknown. The number of connected devices will have increasedfrom700millionto3.2billionbytheyear2023. The upcoming launch of 5G, or the fifth generation of cellular mobile communications, is fantastic news for the Internet of Things industry. While there are several factors behind this increase, the development of 5G networks will be one of the most important. This is because 5G networks will greatly boost the functionality and dependability of these connected gadgets. The anticipated successor to the 4G networks that link the majority of current mobile phones is 5G, or fifth generation, which cellular phone carriers started constructinginternationallyin2019.

TheperformanceofanyIoT,whichisultimatelydefinedby how quickly it can communicate with other IoT devices, smartphones and tablets, software in the form of an app or a website, and other elements, is what determines if it will be profitable. Data transfer speeds will considerably rise with 5G. Compared to existing LTE networks, 5G is expected to be ten times quicker.Because of this increase in speed, IoT devices will be able to communicate and exchange data more swiftly than previously. After all of this,wehaveageneralconceptofhow5Gmaybeusedfor IoTconnection.However,weshouldn'tgettooexcitedtoo soon because adopting 5G in IOT has some significant disadvantages as well. This component is the primary emphasis of the project. appreciating what 5G can accomplishintermsofpotential

Identifying the problems in 5G IoT

The 5G IOT is not without flaws. Here are a few of the issues we discovered during our investigation. There are difficultieslikesecurity,bandwidth,andlatency.

RESOURCE MANAGEMENT

Incontrastto 4GLTE, whichoperates oncurrentlyinuse frequency bands below 6GHz, 5G requires frequencies between 300GHz and 600GHz. Some go by the name mmWave more frequently. They can create ultra-fast speeds that are 20 times faster than the theoretical maximumthroughputofLTEandcantransportalotmore data.

SECURITY

Thischallengewouldapplytoanydata-driventechnology, but the 5G deployment would be targeted by both simple and complex cybersecurity threats. Although the Authentication and Key Agreement (AKA), a method for building trust across networks, covers 5G, it is now feasible to track individuals using their phones. They mightevenlisteninonactualphonecalls.

© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page1183
Journal of Engineering and Technology (IRJET) e-ISSN:2395-0056
10 Issue: 03 | Mar 2023 www.irjet.net p-ISSN:2395-0072
International Research
Volume:
Gali Jeevan Sai1 ,V Siddharth Dhara2, JayaKrishna Reddy Puttur3 , Dharani Gali4

Volume: 10 Issue: 03 | Mar 2023 www.irjet.net

REGULATIONS AND STANDARDS

Given the increased infrastructure required to spread the network out,governmentagencieswill be involvedinthe installation of 5G. There will be a need for new antennas, basestations,andrepeatersfromserviceproviders.

In addition, 5G services across several vertical industries will be introduced to authorities in waves. Examples include spectrum availability, EMF radiation restrictions, infrastructure sharing, and cybersecurity. The many elements and challenges of getting there are explored in researchfromResearchandMarkets.

Because the third issue is up to lawmakers, we'll just talk aboutthefirsttwoissueshere.Although manyacademics areworkingonthese,theremaybedrawbackstousing5G forIoT.

RESOURCE MANAGEMENT

As previously said, there is a great deal of traffic on the network as a result of the rise in devices. As a result, an efficientresourcemanagementsystemiscritical.

TheprimarygoaloftheIoTdevicenetworkistogenerate data that is then translated into meaningful information through the data analysis process, as well as to give relevantresourcestoendusers.

The management of IoT resources is a major difficulty in ensuring the quality of the end-user experience is employedinthecreationofIoTnetworks.

INTUITION

The capacity to create virtual networks is one of 5G's finest features. Subnets with various traffic priorities will subsequentlybeformed.

In a hospital, for instance, the network may be configured to give priority to a connection between a surgeon and a robot rather than, say, patient contacts. Even if the network is at capacity, emergency broadcasts can continue.

1.1 Existing Method

SDN is becoming more and more popular among engineers due to its disruptive nature when compared to the conventional network. SDN is a networking strategy that allows for programming-based network node management as opposed to more conventional system administrationtechniques.

Software-defined networking technology is a method of network administration that makes it more similar to cloudcomputingthantraditionalnetworkmanagementby enabling dynamic, programmatically effective network setuptoincreasenetworkperformanceandmonitoring.

1.1 PROPOSED METHOD

Using a very effective anomaly detection in Machine learning powered by autoencoder, we can detect hackers orirregularities.Thesystemwecreatealsokeepstrackof the hackers, preventing them from moving forward. The network error is measured against the systems in this project.

Any mechanism that creates unfavorable results is classifiedasananomaly.

1. Tracking every IP address in the network's consumption and distributing network resources basedontheintensityofusage.

2. Creating a parameter to determine the greatest intensity, which is given priority when the networkiscongested.

3. Creating virtual subnets and ensuring that the ones with higher priorities aredistributedacross multiple subnets to avoid congestion in a single subnet.

4. After completing the above steps, we utilize a recurrent neural network to anticipate network utilization for specific usage and, as a result, allocateresourcesbasedonthisinformation.

© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page1184
Fig 1 : SDNArchitecture
International Research Journal of Engineering and Technology (IRJET) e-ISSN:2395-0056
p-ISSN:2395-0072

International Research Journal of Engineering and Technology (IRJET) e-ISSN:2395-0056

Volume: 10 Issue: 03 | Mar 2023 www.irjet.net

Raw Data:

Eachrowconsistsoffourcolumns:

● date:yyyy-mm-dd(from2006-07-01through 2006-09-30).

● l_ipn:localIP(codedasanintegerfrom0-9).

● r_asn: remote ASN (an integer that identifies the remoteISP).

● f:flows(countofconnectionsforthatday).

Reportsof"odd"activityorsuspicions

Date:IP

:1

Real network traffic data

The data set has ~21K rows and comprises 10 local workstationInternetProtocol(IPs)overaperiodofthree months.

DDoS attacks in a 5G network built on SDN

SDNbasedtrafficaffectedby DDoSattackers.Todetect DDoS attacks

Collectedflowinputsatthe SDNcontrollersat predeterminedtimes

Switchmemoryusesabloom filtertocontrolDDoStraffic.

Reducetheworkloadonthe dataandcontrolplanes.

Semi-supervised to detect anomaliesinSDN

ML methods

Neuralnetworkmodel,SOM

2395-0072

● ML for network management: use various deep learning techniques for classifying the traffic into normalormaliciousclasses.

● ML for threat detection: We observe the anomalies present in the network using machine learningalgorithms.

Periodicflow-baseddetection

3. METHODOLOGY

We consider the data of New York city and predict the amount of usage by an individual. We apply machine learning algorithms and then allot the bandwidth accordingtothepredictedoutput.

Hereisthedatasetwehaveused:

Table

set

Loadbalancing,Bloomfilter

Interfacemitigation.

SVManomalydetection

2. IMPROVING THE SOLUTION USING DEEP LEARNING

● We use various algorithms of machine learning and improve the software-defined network and thusbetteringitsperformance.

© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page1185
08-24
09-04
09-18
09-26
:5
:4
:36
in5G
Table -1: MLmethodstoencountervariousDDoSattacks Fig 2 : FlowDiagram
S No. Data I_ipn r_asn f 1 2006-07-01 0 701 1 2 2006-07-01 0 714 1 3 2006-07-01 0 1239 1 4 2006-07-01 0 1680 1 5 2006-07-01 0 2514 1 6 2006-07-01 0 3320 1 7 2006-07-01 0 3561 13 8 2006-07-01 0 4132 3 9 2006-07-01 0 5617 2 10 2006-07-01 0 6478 2 11 2006-07-01 0 6713 1 12 2006-07-01 0 7132 1
-2: Data
p-ISSN:

4. RESULTS

Security Provision For 5G IOT:

Therearemanydifferenttypesofassaultsthatcanexploit cyber security flaws. Some of the known cyber threats includeBotnetattacksthatcontrolanetworkofconnected devices to puppeteer a massive cyber- attack. Distributed denial-of-service (DDoS) overloads a network or website to take it offline.The DDoS assaults place a lot of demand on the target resources, making it difficult to balance protectionmethodperformanceandresourceusage.

As a result, it's crucial to make sure the defensive mechanismusesaslittleofthetargetedsystemresources asfeasiblewhilepreventingDDoSassaults.Wehavefound an efficient solution for the detection of abnormalities in thenetwork.ThisisdoneusingMachinelearning.

International Research Journal of Engineering and Technology (IRJET) e-ISSN:2395-0056 Volume: 10 Issue: 03 | Mar 2023 www.irjet.net p-ISSN:2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page1186
Fig 3 : GraphicalrepresentationofLocalIPFlow Fig 4 : GraphicalrepresentationofLocalIPFlow Fig 5 : GraphicalrepresentationofLocalIPFlow Fig 6 : GraphicalrepresentationofLocalIPFlow Fig 7 : AnomalyDetection

5. CONCLUSIONS

Our model is built in a way to find out any sort of abnormalities by the user based on the number of requests on a particular day. We trained our model using the RNN model unlike the CNN model, As it has internal memoryassociatedwithit.SowetrainedourMLmodelto remember the past information of the user. This helps us toblocktheintruderinthefuture.

We analyzed our data set and performed mathematical operations on the past 3 months of the data set, and we set a threshold value such that if the user crosses the threshold value, our model considers the intruder as a hackeranditwillblocktheintruderconnection.

Future Scope

This model efficiently solves the two major problems in 5GIOT. Here are some ways to expand the scope of the idea:

1) Deploy the model in the local college server like Universityservers.

2) This can be directly embedded in softwaredefinednetworks.

3) Thiscanbeusedforidentifyingsecuritythreatsin areasofgreaterconcern.

REFERENCES

[1] Adou,Yves.“ML-Based5G Network SlicingSecurity:A Comprehensive Survey.” IDEAS/RePEc, https://ideas.repec.org/a/gam/jftint/v14y2022i4p11 6-d789792.html.

[2] Rajalakshmi, P., et al. “Performance Analysis of CSMA/CA and PCA for Time Critical ...” ScienceGate, https://www.sciencegate.app/document/10.1109/tii. 2018.2802497.

[3] Thayanathan, Vijay, et al. “Machine Learning for Securing SDN based 5G Network.” ResearchGate, https://www.researchgate.net/publication/3485352 26_Machine_Learning_for_Securing_SDN_based_5G_Ne twork.

[4] Sharma,Parjanay,etal.“Roleofmachinelearningand deep learning in securing 5G-driven industrial IoT applications.” ScienceDirect, https://www.sciencedirect.com/science/article/abs/ pii/S1570870521001906

[5] Rahman,Ashikur,etal.``FeasibilityandChallengesof 5G Network Deployment in Least Developed

Countries.” Scientific Research, https://www.scirp.org/journal/paperabs.aspx?paperi d=106943.

[6] Mateus Cruz, Samuel Mafra, et al. “SmartStrawberry Farming Using Edge Computing and IoT.” NCBI, 5 August 2022, https://www.ncbi.nlm.nih.gov/pmc/articles/PMC937 1401/.

[7] Nicolas-Alin Stoian, “(2020) Machine Learning for anomalydetectioninIoTnetworks:Malwareanalysis on the IoT-23 data set.” University of Twente Student Theses,https://essay.utwente.nl/81979/.

[8] S. Arumuga Devi, “5G wireless network technology: The evolution of 5G and technological developments towardsthesuccessorof5G|Internationaljournalof health sciences.” ScienceScholar, https://sciencescholar.us/journal/index.php/ijhs/art icle/view/13465.

[9] Afaq, Amir, et al. “Machine learning for 5G security: Architecture, recent advances, and challenges.” ScienceDirect, https://www.sciencedirect.com/science/article/abs/ pii/S1570870521001785.

[10] Alsharif, Mohammad H., and Peerapong Uthansakul. “A Novel Method for Improved Network Traffic Prediction Using Enhanced Deep Reinforcement Learning Algorithm.” National Library of Medicine, https://www.ncbi.nlm.nih.gov/pmc/articles/PMC926 9698/.

BIOGRAPHIES

GaliJeevanSai, Currently Studying at VIT University, Vellore, School of Electronics and Communication Engineering(SENSE).

Venkata Siddharth Dhara, Currently Studying at VIT University, Vellore, School of Electronics and Communication Engineering(SENSE).

International Research Journal of Engineering and Technology (IRJET) e-ISSN:2395-0056 Volume: 10 Issue: 03 | Mar 2023 www.irjet.net p-ISSN:2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page1187

Jayakrishna Reddy Puttur, Currently Studying at VIT University, Vellore, School of Electronics and Communication Engineering(SENSE).

GaliDharani, Currently Studying at VIT University, AP , School of Computer Science Engineering(SCOPE).

International Research Journal of Engineering and Technology (IRJET) e-ISSN:2395-0056 Volume: 10 Issue: 03 | Mar 2023 www.irjet.net p-ISSN:2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page1188

Turn static files into dynamic content formats.

Create a flipbook