Deep transfer learning-based DDoS attack detection in 5G and beyond networks

dc.contributor.advisorShahriar, Nashid
dc.contributor.authorFarzaneh, Behnam
dc.contributor.committeememberLouafi, Habib
dc.contributor.committeememberYao, Yiyu
dc.date.accessioned2024-11-15T17:38:05Z
dc.date.available2024-11-15T17:38:05Z
dc.date.issued2024-09
dc.descriptionA Thesis Submitted to the Faculty of Graduate Studies and Research In Partial Fulfillment of the Requirements for the Degree of Master of Science in Computer Science, University of Regina. xvi, 74 p.
dc.description.abstractNetwork slicing is a crucial technology for enabling 5G and beyond mobile networks which support a wide range of new services such as Enhanced Mobile Broadband (eMBB), Ultra-Reliable and Low Latency Communications (URLLC), and Massive Machine-Type Communications (mMTC) on the same physical infrastructure. However, this technology also makes networks more vulnerable to cyber threats, especially Distributed Denial-of-Service (DDoS) attacks. These kinds of attacks can degrade service quality by overwhelming essential network functions necessary for the seamless operation of network slices. To address this issue, an Intrusion Detection System (IDS) is needed to protect against various DDoS attacks. A promising solution is the use of Deep Learning (DL) models to detect potential DDoS attacks, a method already proving effective in the field. However, DL models require large amounts of labeled data for effective training, which are often scarce in operational networks. To address this, Transfer Learning (TL) techniques can be used by transferring knowledge from previously trained models to a target domain with limited labeled data. In this thesis, Bidirectional Long Short-Term Memory (BiLSTM), Convolutional Neural Network (CNN), Residual Network (ResNet), and Inception are used as base models for Deep Transfer Learning (DTL) methods that look into how they can improve DDoS attack detection in 5G networks. A comprehensive dataset generated in our 5G network slicing testbed, which contains both benign and various DDoS attack traffic, serves as the source dataset for DTL. After learning features, patterns, and representations from the source dataset, the base models are fine-tuned using different TL processes on a target DDoS attack dataset. The 5G-NIDD (5G Network Intrusion Detection Dataset), which has limited annotated traffic from several DDoS attacks generated in a real 5G network, is chosen as the target dataset. The results indicate that the proposed DTL models improve the detection of various DDoS attacks in the 5G-NIDD dataset compared to models without TL. Specifically, the BiLSTM and Inception models are identified as the top performers. BiLSTM shows an improvement of 13.90%, 21.48%, and 12.22% in terms of accuracy, recall, and F1-score, respectively, while Inception demonstrates a 10.09% increase in precision compared to models not using TL.
dc.description.authorstatusStudenten
dc.description.peerreviewyesen
dc.identifier.urihttps://hdl.handle.net/10294/16533
dc.language.isoenen
dc.publisherFaculty of Graduate Studies and Research, University of Reginaen
dc.titleDeep transfer learning-based DDoS attack detection in 5G and beyond networks
dc.typeThesisen
thesis.degree.departmentDepartment of Computer Science
thesis.degree.disciplineComputer Science
thesis.degree.grantorUniversity of Reginaen
thesis.degree.levelMaster'sen
thesis.degree.nameMaster of Science (MSc)

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Farzaneh,Behnam_MSc_ComputerScience_Thesis_2024Fall.pdf
Size:
2.65 MB
Format:
Adobe Portable Document Format

License bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
2.22 KB
Format:
Item-specific license agreed upon to submission
Description:

Collections