Attacks detection in 6G wireless networks using machine learning
Unlike the fifth generation (5G), which is well recognized for network cloudification with micro-service-oriented design, the sixth generation (6G) of networks is directly tied to intelligent network orchestration and management. The Attacks Detection in 6G (AD6Gs) wireless networks created by this...
Saved in:
Main Authors: | , , , , , |
---|---|
Format: | Proceeding Paper |
Language: | English English |
Published: |
IEEE
2023
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/107252/1/107252_Attacks%20detection%20in%206G.pdf http://irep.iium.edu.my/107252/7/107252_%20Attacks%20Detection%20in%206G%20Wireless%20Networks%20using%20Machine%20Learning_SCOPUS.pdf http://irep.iium.edu.my/107252/ https://ieeexplore.ieee.org/abstract/document/10246078 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.iium.irep.107252 |
---|---|
record_format |
dspace |
spelling |
my.iium.irep.1072522024-02-02T08:21:20Z http://irep.iium.edu.my/107252/ Attacks detection in 6G wireless networks using machine learning Saeed, Mamoon M. Saeed, Rashid A. Gaid, Abdulguddoos S. A. Mokhtar, Rania A. Khalifa, Othman Omran Ahmed, Zeinab E. T Technology (General) T10.5 Communication of technical information Unlike the fifth generation (5G), which is well recognized for network cloudification with micro-service-oriented design, the sixth generation (6G) of networks is directly tied to intelligent network orchestration and management. The Attacks Detection in 6G (AD6Gs) wireless networks created by this research uses a Machine Learning (ML) algorithm. The pre-processing stage of the ML-AD6Gs process is the initial step. The second stage involves the feature selection approach. Correlation Feature Selection algorithm (CFS) is used to implement the suggested hybrid strategy. It selects the best subset feature and reduces dimensionality for each independent analyses of the dataset CICDDOS2019. The voting average method is used as an aggregation step, and two classifiers—Random Forest (RF) and Support Vector Machine (SVM)—are modified to be used as ML Algorithms. The proposed method shown an outperformed the existing classification method. The accuracy was 99.9%% for CICDDOS2019 dataset with a false alarm rate of 0.00102 IEEE 2023-09-15 Proceeding Paper PeerReviewed application/pdf en http://irep.iium.edu.my/107252/1/107252_Attacks%20detection%20in%206G.pdf application/pdf en http://irep.iium.edu.my/107252/7/107252_%20Attacks%20Detection%20in%206G%20Wireless%20Networks%20using%20Machine%20Learning_SCOPUS.pdf Saeed, Mamoon M. and Saeed, Rashid A. and Gaid, Abdulguddoos S. A. and Mokhtar, Rania A. and Khalifa, Othman Omran and Ahmed, Zeinab E. (2023) Attacks detection in 6G wireless networks using machine learning. In: 2023 9th International Conference on Computer and Communication Engineering (ICCCE), Kuala Lumpur, Malaysia. https://ieeexplore.ieee.org/abstract/document/10246078 10.1109/ICCCE58854.2023.10246078 |
institution |
Universiti Islam Antarabangsa Malaysia |
building |
IIUM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
International Islamic University Malaysia |
content_source |
IIUM Repository (IREP) |
url_provider |
http://irep.iium.edu.my/ |
language |
English English |
topic |
T Technology (General) T10.5 Communication of technical information |
spellingShingle |
T Technology (General) T10.5 Communication of technical information Saeed, Mamoon M. Saeed, Rashid A. Gaid, Abdulguddoos S. A. Mokhtar, Rania A. Khalifa, Othman Omran Ahmed, Zeinab E. Attacks detection in 6G wireless networks using machine learning |
description |
Unlike the fifth generation (5G), which is well recognized for network cloudification with micro-service-oriented design, the sixth generation (6G) of networks is directly tied to intelligent network orchestration and management. The Attacks Detection in 6G (AD6Gs) wireless networks created by this research uses a Machine Learning (ML) algorithm. The pre-processing stage of the ML-AD6Gs process is the initial step. The second stage involves the feature selection approach. Correlation Feature Selection algorithm (CFS) is used to implement the suggested hybrid strategy. It selects the best subset feature and reduces dimensionality for each independent analyses of the dataset CICDDOS2019. The voting average method is used as an aggregation step, and two classifiers—Random Forest (RF) and Support Vector Machine (SVM)—are modified to be used as ML Algorithms. The proposed method shown an outperformed the existing classification method. The accuracy was 99.9%% for CICDDOS2019 dataset with a false alarm rate of 0.00102 |
format |
Proceeding Paper |
author |
Saeed, Mamoon M. Saeed, Rashid A. Gaid, Abdulguddoos S. A. Mokhtar, Rania A. Khalifa, Othman Omran Ahmed, Zeinab E. |
author_facet |
Saeed, Mamoon M. Saeed, Rashid A. Gaid, Abdulguddoos S. A. Mokhtar, Rania A. Khalifa, Othman Omran Ahmed, Zeinab E. |
author_sort |
Saeed, Mamoon M. |
title |
Attacks detection in 6G wireless networks using machine learning |
title_short |
Attacks detection in 6G wireless networks using machine learning |
title_full |
Attacks detection in 6G wireless networks using machine learning |
title_fullStr |
Attacks detection in 6G wireless networks using machine learning |
title_full_unstemmed |
Attacks detection in 6G wireless networks using machine learning |
title_sort |
attacks detection in 6g wireless networks using machine learning |
publisher |
IEEE |
publishDate |
2023 |
url |
http://irep.iium.edu.my/107252/1/107252_Attacks%20detection%20in%206G.pdf http://irep.iium.edu.my/107252/7/107252_%20Attacks%20Detection%20in%206G%20Wireless%20Networks%20using%20Machine%20Learning_SCOPUS.pdf http://irep.iium.edu.my/107252/ https://ieeexplore.ieee.org/abstract/document/10246078 |
_version_ |
1789940148613414912 |
score |
13.211869 |