An implementation of an artifact for security in 5G networks using deep learning methods
DOI:
https://doi.org/10.21533/pen.v9.i3.874Abstract
The Fifth-Generation networks are vital in telecommunications, which reaches a substantial increase in transmission speed. However, due to this dynamism, cyber attackers try to take advantage of certain configuration flaws. Under this problem, this study aims to design and implement an artifact capable of protecting and improving security in this cellular network type. The artifact uses a neural network structure based on Depp Learning, Gödel's theorem, Dijkstra's graph theory, a sigmoid function for faster activation in the designed neural network, and a mathematical model able to perform a recursive and logical process for the analysis of attacks. Considering the Gödel method, this artifact can evade Worms, Ransomware, Phishing, Doxing attacks and can be used in the OPC, Profibus, EtherCat, Profinet DNP3, and Modbus protocols. Its implementation allows us to create evasive actions in case of an attack and improve the configuring flaws in the security protocols, changing its parameters and making it secure. We developed the artifact through Extreme Programing with the combination of Python and Matlab. The results prove the functionality of the algorithms and demonstrate the success in evading an attack or making the best decision to protect the 5G network.
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.




