Attacks detection in 6G wireless networks using machine learning

Unlike the fifth generation (5G), which is well recognized for network cloudification with micro-service-oriented design, the sixth generation (6G) of networks is directly tied to intelligent network orchestration and management. The Attacks Detection in 6G (AD6Gs) wireless networks created by this...

Full description

Saved in:
Bibliographic Details
Main Authors: Saeed, Mamoon M., Saeed, Rashid A., Gaid, Abdulguddoos S. A., Mokhtar, Rania A., Khalifa, Othman Omran, Ahmed, Zeinab E.
Format: Proceeding Paper
Language:English
English
Published: IEEE 2023
Subjects:
Online Access:http://irep.iium.edu.my/107252/1/107252_Attacks%20detection%20in%206G.pdf
http://irep.iium.edu.my/107252/7/107252_%20Attacks%20Detection%20in%206G%20Wireless%20Networks%20using%20Machine%20Learning_SCOPUS.pdf
http://irep.iium.edu.my/107252/
https://ieeexplore.ieee.org/abstract/document/10246078
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.iium.irep.107252
record_format dspace
spelling my.iium.irep.1072522024-02-02T08:21:20Z http://irep.iium.edu.my/107252/ Attacks detection in 6G wireless networks using machine learning Saeed, Mamoon M. Saeed, Rashid A. Gaid, Abdulguddoos S. A. Mokhtar, Rania A. Khalifa, Othman Omran Ahmed, Zeinab E. T Technology (General) T10.5 Communication of technical information Unlike the fifth generation (5G), which is well recognized for network cloudification with micro-service-oriented design, the sixth generation (6G) of networks is directly tied to intelligent network orchestration and management. The Attacks Detection in 6G (AD6Gs) wireless networks created by this research uses a Machine Learning (ML) algorithm. The pre-processing stage of the ML-AD6Gs process is the initial step. The second stage involves the feature selection approach. Correlation Feature Selection algorithm (CFS) is used to implement the suggested hybrid strategy. It selects the best subset feature and reduces dimensionality for each independent analyses of the dataset CICDDOS2019. The voting average method is used as an aggregation step, and two classifiers—Random Forest (RF) and Support Vector Machine (SVM)—are modified to be used as ML Algorithms. The proposed method shown an outperformed the existing classification method. The accuracy was 99.9%% for CICDDOS2019 dataset with a false alarm rate of 0.00102 IEEE 2023-09-15 Proceeding Paper PeerReviewed application/pdf en http://irep.iium.edu.my/107252/1/107252_Attacks%20detection%20in%206G.pdf application/pdf en http://irep.iium.edu.my/107252/7/107252_%20Attacks%20Detection%20in%206G%20Wireless%20Networks%20using%20Machine%20Learning_SCOPUS.pdf Saeed, Mamoon M. and Saeed, Rashid A. and Gaid, Abdulguddoos S. A. and Mokhtar, Rania A. and Khalifa, Othman Omran and Ahmed, Zeinab E. (2023) Attacks detection in 6G wireless networks using machine learning. In: 2023 9th International Conference on Computer and Communication Engineering (ICCCE), Kuala Lumpur, Malaysia. https://ieeexplore.ieee.org/abstract/document/10246078 10.1109/ICCCE58854.2023.10246078
institution Universiti Islam Antarabangsa Malaysia
building IIUM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider International Islamic University Malaysia
content_source IIUM Repository (IREP)
url_provider http://irep.iium.edu.my/
language English
English
topic T Technology (General)
T10.5 Communication of technical information
spellingShingle T Technology (General)
T10.5 Communication of technical information
Saeed, Mamoon M.
Saeed, Rashid A.
Gaid, Abdulguddoos S. A.
Mokhtar, Rania A.
Khalifa, Othman Omran
Ahmed, Zeinab E.
Attacks detection in 6G wireless networks using machine learning
description Unlike the fifth generation (5G), which is well recognized for network cloudification with micro-service-oriented design, the sixth generation (6G) of networks is directly tied to intelligent network orchestration and management. The Attacks Detection in 6G (AD6Gs) wireless networks created by this research uses a Machine Learning (ML) algorithm. The pre-processing stage of the ML-AD6Gs process is the initial step. The second stage involves the feature selection approach. Correlation Feature Selection algorithm (CFS) is used to implement the suggested hybrid strategy. It selects the best subset feature and reduces dimensionality for each independent analyses of the dataset CICDDOS2019. The voting average method is used as an aggregation step, and two classifiers—Random Forest (RF) and Support Vector Machine (SVM)—are modified to be used as ML Algorithms. The proposed method shown an outperformed the existing classification method. The accuracy was 99.9%% for CICDDOS2019 dataset with a false alarm rate of 0.00102
format Proceeding Paper
author Saeed, Mamoon M.
Saeed, Rashid A.
Gaid, Abdulguddoos S. A.
Mokhtar, Rania A.
Khalifa, Othman Omran
Ahmed, Zeinab E.
author_facet Saeed, Mamoon M.
Saeed, Rashid A.
Gaid, Abdulguddoos S. A.
Mokhtar, Rania A.
Khalifa, Othman Omran
Ahmed, Zeinab E.
author_sort Saeed, Mamoon M.
title Attacks detection in 6G wireless networks using machine learning
title_short Attacks detection in 6G wireless networks using machine learning
title_full Attacks detection in 6G wireless networks using machine learning
title_fullStr Attacks detection in 6G wireless networks using machine learning
title_full_unstemmed Attacks detection in 6G wireless networks using machine learning
title_sort attacks detection in 6g wireless networks using machine learning
publisher IEEE
publishDate 2023
url http://irep.iium.edu.my/107252/1/107252_Attacks%20detection%20in%206G.pdf
http://irep.iium.edu.my/107252/7/107252_%20Attacks%20Detection%20in%206G%20Wireless%20Networks%20using%20Machine%20Learning_SCOPUS.pdf
http://irep.iium.edu.my/107252/
https://ieeexplore.ieee.org/abstract/document/10246078
_version_ 1789940148613414912
score 13.211869