Next Article in Journal
LACTNet: A Lightweight Real-Time Semantic Segmentation Network Based on an Aggregated Convolutional Neural Network and Transformer
Previous Article in Journal
Enhancing Multi-Class Attack Detection in Graph Neural Network through Feature Rearrangement
Previous Article in Special Issue
Automated Network Incident Identification through Genetic Algorithm-Driven Feature Selection
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
This is an early access version, the complete PDF, HTML, and XML versions will be available soon.
Article

Mitigation of Adversarial Attacks in 5G Networks with a Robust Intrusion Detection System Based on Extremely Randomized Trees and Infinite Feature Selection

by
Gianmarco Baldini
Joint Research Centre, European Commission, 21027 Ispra, Italy
Submission received: 15 May 2024 / Revised: 12 June 2024 / Accepted: 16 June 2024 / Published: 19 June 2024
(This article belongs to the Special Issue Machine Learning and Cybersecurity—Trends and Future Challenges)

Abstract

IDS are an important tool to mitigate cybersecurity threats in the ICT infrastructures. Preferable properties of the IDSs are the optimization of the attack detection accuracy and the minimization of the computing resources and time. A signification portion of IDSs presented in the research literature is based on ML and Deep Learning (DL) elements, but they may be prone to adversarial attacks, which may undermine the overall performance of the IDS algorithm. This paper proposes a novel IDS focused on the detection of cybersecurity attacks in 5G networks, which addresses in a simple but effective way two specific adversarial attacks: (1) tampering of the labeled set used to train the ML algorithm, (2) modification of the features in the training data set. The approach is based on the combination of two algorithms, which have been introduced recently in the research literature. The first algorithm is the ERT algorithm, which enhances the capability of DT and Random Forest (RF) algorithms to perform classification in data sets, which are unbalanced and of large size as IDS data sets usually are (legitimate traffic messages are more numerous than attack related messages). The second algorithm is the recently introduced Infinite Feature Selection algorithm, which is used to optimize the choice of the hyper-parameter defined in the approach and improve the overall computing efficiency. The result of the application of the proposed approach on a recently published 5G IDS data set proves its robustness against adversarial attacks with different degrees of severity calculated as the percentage of the tampered data set samples.
Keywords: machine learning; 5G; intrusion detection system; cybersecurity machine learning; 5G; intrusion detection system; cybersecurity

Share and Cite

MDPI and ACS Style

Baldini, G. Mitigation of Adversarial Attacks in 5G Networks with a Robust Intrusion Detection System Based on Extremely Randomized Trees and Infinite Feature Selection. Electronics 2024, 13, 2405. https://0-doi-org.brum.beds.ac.uk/10.3390/electronics13122405

AMA Style

Baldini G. Mitigation of Adversarial Attacks in 5G Networks with a Robust Intrusion Detection System Based on Extremely Randomized Trees and Infinite Feature Selection. Electronics. 2024; 13(12):2405. https://0-doi-org.brum.beds.ac.uk/10.3390/electronics13122405

Chicago/Turabian Style

Baldini, Gianmarco. 2024. "Mitigation of Adversarial Attacks in 5G Networks with a Robust Intrusion Detection System Based on Extremely Randomized Trees and Infinite Feature Selection" Electronics 13, no. 12: 2405. https://0-doi-org.brum.beds.ac.uk/10.3390/electronics13122405

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop