Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/468734
Title: Design and real time performance Evaluation of secure methodologies to Detect and mitigate security breaches In 5g networks
Researcher: Nagarathna, R
Guide(s): Mercy shalinie, S
Keywords: Engineering and Technology
Computer Science
Computer Science Information Systems
Software-Defined Network
Internet of Things
Fog computing
University: Anna University
Completed Date: 2021
Abstract: The growth of the network users demands the evolution of next-generation networks, namely, 5G. Though 5G offers a plethora of advantages, the medley of protocols, technologies, vertical use-cases, and architecture opens up security loopholes. Hence, our research work takes up the problem of security in the 5G network. In particular, our work revolves around three technologies of the 5G, namely, Software Defined Network (SDN), Internet of Things (IoT), and Fog computing. One of the prime motives of 5G is to support the latency-critical sectors. Hence, it is imperative to detect and mitigate the attacks with improved accuracy at the earliest possible time. We also address the problem of performing a real-time evaluation of the secure methodologies. newlineOur first attempt is to mitigate the attacks in wireless networks. We propose the Secure Deep Neural (SeDeN) framework and deploy it in decentralized SDN controllers. SeDeN collects the traffic over a dynamic period. The traffic is input to the detection algorithm, which has trained Long Short-Term Memory Recurrent Neural Network (LSTM RNN) Machine Learning (ML) model. The mitigation methodology drops the packets if LSTM RNN detects a security breach in the data plane. We test SeDeN in an emulator. SeDeN shows better attack detection time and a reduction in the packet loss rate. We use a supervised LSTM RNN, which has the issue of getting a large labeled dataset with minimal errors. newlineNext, we propose a LEDEM methodology to detect and mitigate the Distributed Denial of Service (DDoS) attack triggered by pernicious wireless IoT devices that victimizes the IoT server. newline newline
Pagination: xv,191p.
URI: http://hdl.handle.net/10603/468734
Appears in Departments:Faculty of Information and Communication Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File111.71 kBAdobe PDFView/Open
02_prelim pages.pdf6.67 MBAdobe PDFView/Open
03_content.pdf1.26 MBAdobe PDFView/Open
04_abstract.pdf1.2 MBAdobe PDFView/Open
05_chapter 1.pdf2.94 MBAdobe PDFView/Open
06_chapter 2.pdf4.28 MBAdobe PDFView/Open
07_chapter 3.pdf2.49 MBAdobe PDFView/Open
08_chapter 4.pdf8.44 MBAdobe PDFView/Open
09_chapter 5.pdf1.02 MBAdobe PDFView/Open
10_chapter 6.pdf2.3 MBAdobe PDFView/Open
11_annexures.pdf11.59 MBAdobe PDFView/Open
80_recommendation.pdf1.87 MBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: