6G下一代网络中恶意流量检测的建模

H. Ghorbani, M. Mohammadzadeh, M. Ahmadzadegan
{"title":"6G下一代网络中恶意流量检测的建模","authors":"H. Ghorbani, M. Mohammadzadeh, M. Ahmadzadegan","doi":"10.1109/ICTE-V50708.2020.9113777","DOIUrl":null,"url":null,"abstract":"Based on the digitalization of the world and the increasing use of data, we can say that the next ten years will see a huge leap in the use of data in virtualization, automation, health and more. One of the infrastructures to reach the digitalization goals of the world is new communication networks with more capabilities, including high speed, low latency, more coverage and more. 5G networks and later 6G can provide us with this infrastructure. According to 6G (KPIS) targeting, IoT equipment, and distributed systems, data volumes are beyond the tolerance of cyber systems for data analysis. On the other hand, as technology evolves, its abuse will increase, and attacks on data exploitation will become more and more diverse. The main weaknesses of distributed and IoT systems, which are their computing power and power, will remain the same, and hackers will make the most of these weaknesses and will use new methods and ways to anonymize their activities. So there is a need for a system to identify and counter potential abuses of capabilities and data volume in next generation networks, especially 5G and 6G, more than ever. In this paper, we present a theory for work and activity on the creation of malicious traffic identification modeling in 5G and 6G networks. And finally we can come up with a solution to create more security in the future.","PeriodicalId":348195,"journal":{"name":"2020 International Conference on Technology and Entrepreneurship - Virtual (ICTE-V)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":"{\"title\":\"Modeling for Malicious Traffic Detection in 6G Next Generation Networks\",\"authors\":\"H. Ghorbani, M. Mohammadzadeh, M. Ahmadzadegan\",\"doi\":\"10.1109/ICTE-V50708.2020.9113777\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Based on the digitalization of the world and the increasing use of data, we can say that the next ten years will see a huge leap in the use of data in virtualization, automation, health and more. One of the infrastructures to reach the digitalization goals of the world is new communication networks with more capabilities, including high speed, low latency, more coverage and more. 5G networks and later 6G can provide us with this infrastructure. According to 6G (KPIS) targeting, IoT equipment, and distributed systems, data volumes are beyond the tolerance of cyber systems for data analysis. On the other hand, as technology evolves, its abuse will increase, and attacks on data exploitation will become more and more diverse. The main weaknesses of distributed and IoT systems, which are their computing power and power, will remain the same, and hackers will make the most of these weaknesses and will use new methods and ways to anonymize their activities. So there is a need for a system to identify and counter potential abuses of capabilities and data volume in next generation networks, especially 5G and 6G, more than ever. In this paper, we present a theory for work and activity on the creation of malicious traffic identification modeling in 5G and 6G networks. And finally we can come up with a solution to create more security in the future.\",\"PeriodicalId\":348195,\"journal\":{\"name\":\"2020 International Conference on Technology and Entrepreneurship - Virtual (ICTE-V)\",\"volume\":\"38 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-04-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"10\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 International Conference on Technology and Entrepreneurship - Virtual (ICTE-V)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICTE-V50708.2020.9113777\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 International Conference on Technology and Entrepreneurship - Virtual (ICTE-V)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICTE-V50708.2020.9113777","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 10

摘要

基于世界的数字化和越来越多的数据使用,我们可以说,未来十年将在虚拟化、自动化、健康等领域看到数据使用的巨大飞跃。实现世界数字化目标的基础设施之一是具有更多功能的新型通信网络,包括高速、低延迟、更广的覆盖范围等等。5G网络和后来的6G网络可以为我们提供这种基础设施。根据6G (KPIS)目标、物联网设备和分布式系统,数据量超出了网络系统对数据分析的承受能力。另一方面,随着技术的发展,其滥用将会增加,对数据利用的攻击将变得越来越多样化。分布式和物联网系统的主要弱点,即它们的计算能力和能力,将保持不变,黑客将充分利用这些弱点,并将使用新的方法和方式来匿名化他们的活动。因此,比以往任何时候都更需要一个系统来识别和应对下一代网络,特别是5G和6G中潜在的功能和数据量滥用。在本文中,我们提出了在5G和6G网络中创建恶意流量识别建模的工作和活动理论。最后,我们可以想出一个解决方案,在未来创造更多的安全。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Modeling for Malicious Traffic Detection in 6G Next Generation Networks
Based on the digitalization of the world and the increasing use of data, we can say that the next ten years will see a huge leap in the use of data in virtualization, automation, health and more. One of the infrastructures to reach the digitalization goals of the world is new communication networks with more capabilities, including high speed, low latency, more coverage and more. 5G networks and later 6G can provide us with this infrastructure. According to 6G (KPIS) targeting, IoT equipment, and distributed systems, data volumes are beyond the tolerance of cyber systems for data analysis. On the other hand, as technology evolves, its abuse will increase, and attacks on data exploitation will become more and more diverse. The main weaknesses of distributed and IoT systems, which are their computing power and power, will remain the same, and hackers will make the most of these weaknesses and will use new methods and ways to anonymize their activities. So there is a need for a system to identify and counter potential abuses of capabilities and data volume in next generation networks, especially 5G and 6G, more than ever. In this paper, we present a theory for work and activity on the creation of malicious traffic identification modeling in 5G and 6G networks. And finally we can come up with a solution to create more security in the future.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Maturity-based design of corporate culture in the context of Industrie 4.0 DDoS Attacks on the IoT network with the Emergence of 5G The Convergence of Technology Entrepreneurship and Social Entrepreneurship; A Case of Formulation of the Civic Tech Community in Japan Experiment Oriented Closed-loop Speed Control Design for Induction Motor Based Industrial Blower Firms’ ICT and Innovation in Jakarta Metropolitan Area
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1