1. Optimizing the Energy Efficiency in 5G Security Systems for Intrusion Detection with an Emphasis on DDOS Assaults
- Author
-
Umar Danjuma Maiwada, Kamaluddeen Usman Danyaro, Aliza Bt Sarlan, Aminu Aminu Muazu, and Abubakar Rufai Garba
- Subjects
5G ,security ,intrusion detection systems ,energy efficiency ,NETSIM ,DDoS ,Engineering machinery, tools, and implements ,TA213-215 - Abstract
In response to the rising demand for new and existing use cases of energy efficiency, the telecoms sector is going through a dramatic shift toward 5G technology. High data speeds, extensive coverage provided by dense base station deployment, higher capacity, improved Quality of Service (QoS), and extremely low latency are required for 5G wireless networks. New deployment methods, networking architectures, processing technologies, and storage solutions must be created to satisfy the anticipated service requirements of 5G technologies. These developments further increase the need to secure the security of 5G systems and their functionality as well as energy efficiency problems. Indeed, 5G system security is the target of intense efforts by developers and academics in this industry. Significant security concerns for 5G networks have been identified with extensive research. Attackers can make use of vulnerabilities like traffic and the flow base by introducing malicious code and performing other nefarious deeds to take advantage of the system. On 5G networks, attack techniques such as model node map (MNmap), power depletion assaults, and Man-in-the-Middle (MiTM) assaults can be effectively used. However, this study analyses 5G technology’s current energy efficiency problems. We recommend an unusual intrusion detection system (IDS) that makes use of Traffic Volume methods. Considering this investigation, we propose an enhancing training process by including statistical analysis on Distributed Denial-of-Service (DDoS) threats, which is how prior research recommended using OMNET and NS-3 on IDS for optimization. Additionally, the methodology for incorporating the suggested intrusion detection systems within a typical 5G architecture is presented by our research using NETSIM. The paper also offers a planned system’s correction method, providing a useful implementation after completing analysis.
- Published
- 2023
- Full Text
- View/download PDF