Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/468734
Title: | Design and real time performance Evaluation of secure methodologies to Detect and mitigate security breaches In 5g networks |
Researcher: | Nagarathna, R |
Guide(s): | Mercy shalinie, S |
Keywords: | Engineering and Technology Computer Science Computer Science Information Systems Software-Defined Network Internet of Things Fog computing |
University: | Anna University |
Completed Date: | 2021 |
Abstract: | The growth of the network users demands the evolution of next-generation networks, namely, 5G. Though 5G offers a plethora of advantages, the medley of protocols, technologies, vertical use-cases, and architecture opens up security loopholes. Hence, our research work takes up the problem of security in the 5G network. In particular, our work revolves around three technologies of the 5G, namely, Software Defined Network (SDN), Internet of Things (IoT), and Fog computing. One of the prime motives of 5G is to support the latency-critical sectors. Hence, it is imperative to detect and mitigate the attacks with improved accuracy at the earliest possible time. We also address the problem of performing a real-time evaluation of the secure methodologies. newlineOur first attempt is to mitigate the attacks in wireless networks. We propose the Secure Deep Neural (SeDeN) framework and deploy it in decentralized SDN controllers. SeDeN collects the traffic over a dynamic period. The traffic is input to the detection algorithm, which has trained Long Short-Term Memory Recurrent Neural Network (LSTM RNN) Machine Learning (ML) model. The mitigation methodology drops the packets if LSTM RNN detects a security breach in the data plane. We test SeDeN in an emulator. SeDeN shows better attack detection time and a reduction in the packet loss rate. We use a supervised LSTM RNN, which has the issue of getting a large labeled dataset with minimal errors. newlineNext, we propose a LEDEM methodology to detect and mitigate the Distributed Denial of Service (DDoS) attack triggered by pernicious wireless IoT devices that victimizes the IoT server. newline newline |
Pagination: | xv,191p. |
URI: | http://hdl.handle.net/10603/468734 |
Appears in Departments: | Faculty of Information and Communication Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 111.71 kB | Adobe PDF | View/Open |
02_prelim pages.pdf | 6.67 MB | Adobe PDF | View/Open | |
03_content.pdf | 1.26 MB | Adobe PDF | View/Open | |
04_abstract.pdf | 1.2 MB | Adobe PDF | View/Open | |
05_chapter 1.pdf | 2.94 MB | Adobe PDF | View/Open | |
06_chapter 2.pdf | 4.28 MB | Adobe PDF | View/Open | |
07_chapter 3.pdf | 2.49 MB | Adobe PDF | View/Open | |
08_chapter 4.pdf | 8.44 MB | Adobe PDF | View/Open | |
09_chapter 5.pdf | 1.02 MB | Adobe PDF | View/Open | |
10_chapter 6.pdf | 2.3 MB | Adobe PDF | View/Open | |
11_annexures.pdf | 11.59 MB | Adobe PDF | View/Open | |
80_recommendation.pdf | 1.87 MB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: