Abstract

The rapid increase in the adoption of 5G networks has revolutionized communication technologies, enabling high-speed data transmission and connectivity across various domains. However, the advent of 5G technology comes with an increased risk of cyber-attacks and security breaches, necessitating the development of robust defence mechanisms to safeguard network infrastructure and mitigate potential threats. The work presents a novel approach for modelling a cyber-attack response system tailored specifically for 5G networks, leveraging machine learning techniques to enhance threat detection and response capabilities. The study introduced innovative methodologies, including the integration of standard backpropagation and dropout regularization technique. Furthermore, an intelligent cyber threat classification model that proactively detects and mitigates malware threats in 5G networks was developed. Additionally, a comprehensive cyber-attack response model designed to isolate threats from the network infrastructure and mitigate potential security risks was formulated. The result of testing the response algorithm with simulation, and considering quality of service such as throughput, latency and packet loss, showed 80.05%, 24.9ms and 4.09% respectively. During system integration of the model on 5G network with stimulated malware, the throughput reported 71.81%. Also, packet loss reported loss rate of 23.18%, while latency reported 178.98ms. Our findings contribute to the advancement of cybersecurity in 5G environments and lay the foundation for the development of robust cyber defence systems to safeguard critical network infrastructure against emerging threats.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.