Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/468734
Full metadata record
DC FieldValueLanguage
dc.coverage.spatialDesign and real time performance Evaluation of secure methodologies to Detect and mitigate security breaches In 5g networks
dc.date.accessioned2023-03-14T08:21:10Z-
dc.date.available2023-03-14T08:21:10Z-
dc.identifier.urihttp://hdl.handle.net/10603/468734-
dc.description.abstractThe growth of the network users demands the evolution of next-generation networks, namely, 5G. Though 5G offers a plethora of advantages, the medley of protocols, technologies, vertical use-cases, and architecture opens up security loopholes. Hence, our research work takes up the problem of security in the 5G network. In particular, our work revolves around three technologies of the 5G, namely, Software Defined Network (SDN), Internet of Things (IoT), and Fog computing. One of the prime motives of 5G is to support the latency-critical sectors. Hence, it is imperative to detect and mitigate the attacks with improved accuracy at the earliest possible time. We also address the problem of performing a real-time evaluation of the secure methodologies. newlineOur first attempt is to mitigate the attacks in wireless networks. We propose the Secure Deep Neural (SeDeN) framework and deploy it in decentralized SDN controllers. SeDeN collects the traffic over a dynamic period. The traffic is input to the detection algorithm, which has trained Long Short-Term Memory Recurrent Neural Network (LSTM RNN) Machine Learning (ML) model. The mitigation methodology drops the packets if LSTM RNN detects a security breach in the data plane. We test SeDeN in an emulator. SeDeN shows better attack detection time and a reduction in the packet loss rate. We use a supervised LSTM RNN, which has the issue of getting a large labeled dataset with minimal errors. newlineNext, we propose a LEDEM methodology to detect and mitigate the Distributed Denial of Service (DDoS) attack triggered by pernicious wireless IoT devices that victimizes the IoT server. newline newline
dc.format.extentxv,191p.
dc.languageEnglish
dc.relationp.181-190
dc.rightsuniversity
dc.titleDesign and real time performance Evaluation of secure methodologies to Detect and mitigate security breaches In 5g networks
dc.title.alternative
dc.creator.researcherNagarathna, R
dc.subject.keywordEngineering and Technology
dc.subject.keywordComputer Science
dc.subject.keywordComputer Science Information Systems
dc.subject.keywordSoftware-Defined Network
dc.subject.keywordInternet of Things
dc.subject.keywordFog computing
dc.description.note
dc.contributor.guideMercy shalinie, S
dc.publisher.placeChennai
dc.publisher.universityAnna University
dc.publisher.institutionFaculty of Information and Communication Engineering
dc.date.registered
dc.date.completed2021
dc.date.awarded2021
dc.format.dimensions21cm
dc.format.accompanyingmaterialNone
dc.source.universityUniversity
dc.type.degreePh.D.
Appears in Departments:Faculty of Information and Communication Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File111.71 kBAdobe PDFView/Open
02_prelim pages.pdf6.67 MBAdobe PDFView/Open
03_content.pdf1.26 MBAdobe PDFView/Open
04_abstract.pdf1.2 MBAdobe PDFView/Open
05_chapter 1.pdf2.94 MBAdobe PDFView/Open
06_chapter 2.pdf4.28 MBAdobe PDFView/Open
07_chapter 3.pdf2.49 MBAdobe PDFView/Open
08_chapter 4.pdf8.44 MBAdobe PDFView/Open
09_chapter 5.pdf1.02 MBAdobe PDFView/Open
10_chapter 6.pdf2.3 MBAdobe PDFView/Open
11_annexures.pdf11.59 MBAdobe PDFView/Open
80_recommendation.pdf1.87 MBAdobe PDFView/Open


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: