Enviar búsqueda
Cargar
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
•
0 recomendaciones
•
4 vistas
IRJET Journal
Seguir
https://www.irjet.net/archives/V10/i3/IRJET-V10I3187.pdf
Leer menos
Leer más
Ingeniería
Denunciar
Compartir
Denunciar
Compartir
1 de 6
Descargar ahora
Descargar para leer sin conexión
Recomendados
5G_Upload.docx
5G_Upload.docx
Sun Technologies
Performance Analysis of Resource Allocation in 5G & Beyond 5G using AI
Performance Analysis of Resource Allocation in 5G & Beyond 5G using AI
IRJET Journal
5 g as a service (5gaas)
5 g as a service (5gaas)
Luke Wang
The Abstracted Network for Industrial Internet
The Abstracted Network for Industrial Internet
MeshDynamics
Security course: exclusive 5G SA pitfalls and new changes to legislation
Security course: exclusive 5G SA pitfalls and new changes to legislation
PositiveTechnologies
A Review: Evolution of 5G, Security and Multiple Access schemes in Mobile Com...
A Review: Evolution of 5G, Security and Multiple Access schemes in Mobile Com...
IRJET Journal
Navigating the Unseen Risks: Exploring 5G Vulnerabilities
Navigating the Unseen Risks: Exploring 5G Vulnerabilities
SecurityGen1
Unveiling SecurityGen's Advanced 5G Security Services
Unveiling SecurityGen's Advanced 5G Security Services
SecurityGen1
Recomendados
5G_Upload.docx
5G_Upload.docx
Sun Technologies
Performance Analysis of Resource Allocation in 5G & Beyond 5G using AI
Performance Analysis of Resource Allocation in 5G & Beyond 5G using AI
IRJET Journal
5 g as a service (5gaas)
5 g as a service (5gaas)
Luke Wang
The Abstracted Network for Industrial Internet
The Abstracted Network for Industrial Internet
MeshDynamics
Security course: exclusive 5G SA pitfalls and new changes to legislation
Security course: exclusive 5G SA pitfalls and new changes to legislation
PositiveTechnologies
A Review: Evolution of 5G, Security and Multiple Access schemes in Mobile Com...
A Review: Evolution of 5G, Security and Multiple Access schemes in Mobile Com...
IRJET Journal
Navigating the Unseen Risks: Exploring 5G Vulnerabilities
Navigating the Unseen Risks: Exploring 5G Vulnerabilities
SecurityGen1
Unveiling SecurityGen's Advanced 5G Security Services
Unveiling SecurityGen's Advanced 5G Security Services
SecurityGen1
Big Data and Next Generation Network Challenges - Phdassistance
Big Data and Next Generation Network Challenges - Phdassistance
PhD Assistance
5G report 2
5G report 2
IGDTUW
SECURING FUTURE CONNECTIVITY: An Extensive Analysis on 5G Network Security
SECURING FUTURE CONNECTIVITY: An Extensive Analysis on 5G Network Security
IRJET Journal
5G Technology
5G Technology
RutujaShitole3
Review on a new generation wireless mobile network
Review on a new generation wireless mobile network
eSAT Publishing House
Performance Evaluation of VEnodeb Using Virtualized Radio Resource Management
Performance Evaluation of VEnodeb Using Virtualized Radio Resource Management
JIEMS Akkalkuwa
An extensive review: Internet of things is speeding up the necessity for 5G
An extensive review: Internet of things is speeding up the necessity for 5G
IJERA Editor
Scaling Mobile Network Security for LTE: A Multi-Layer Approach
Scaling Mobile Network Security for LTE: A Multi-Layer Approach
F5 Networks
Correlation between Terms of 5G Networks, IoT and D2D Communication
Correlation between Terms of 5G Networks, IoT and D2D Communication
ijtsrd
A study-and-analysis-of-access-to-high-speed-connection-in-wireless-technology
A study-and-analysis-of-access-to-high-speed-connection-in-wireless-technology
aravindhawan
IRJET- Cost Effective Scheme for Delay Tolerant Data Transmission
IRJET- Cost Effective Scheme for Delay Tolerant Data Transmission
IRJET Journal
20210805 以5 g與邊緣運算技術佈署物聯網
20210805 以5 g與邊緣運算技術佈署物聯網
Dr. Chang Jung Lee
List Other Types Of Attacks
List Other Types Of Attacks
Kimberly Brooks
A new algorithm to enhance security against cyber threats for internet of thi...
A new algorithm to enhance security against cyber threats for internet of thi...
IJECEIAES
The Network Impact of 802.11ac White Paper
The Network Impact of 802.11ac White Paper
Aerohive Networks
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
IJTRET-International Journal of Trendy Research in Engineering and Technology
Cor review2018-a
Cor review2018-a
Nexus Publishing
Quick Quote App Portfolio
Quick Quote App Portfolio
Nexus Publishing
What Is 5G Technology.pdf
What Is 5G Technology.pdf
Hussain110464
Whitepaper: Mobile Networks in a smart digital future - deploying a platform ...
Whitepaper: Mobile Networks in a smart digital future - deploying a platform ...
Petr Nemec
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
Más contenido relacionado
Similar a SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
Big Data and Next Generation Network Challenges - Phdassistance
Big Data and Next Generation Network Challenges - Phdassistance
PhD Assistance
5G report 2
5G report 2
IGDTUW
SECURING FUTURE CONNECTIVITY: An Extensive Analysis on 5G Network Security
SECURING FUTURE CONNECTIVITY: An Extensive Analysis on 5G Network Security
IRJET Journal
5G Technology
5G Technology
RutujaShitole3
Review on a new generation wireless mobile network
Review on a new generation wireless mobile network
eSAT Publishing House
Performance Evaluation of VEnodeb Using Virtualized Radio Resource Management
Performance Evaluation of VEnodeb Using Virtualized Radio Resource Management
JIEMS Akkalkuwa
An extensive review: Internet of things is speeding up the necessity for 5G
An extensive review: Internet of things is speeding up the necessity for 5G
IJERA Editor
Scaling Mobile Network Security for LTE: A Multi-Layer Approach
Scaling Mobile Network Security for LTE: A Multi-Layer Approach
F5 Networks
Correlation between Terms of 5G Networks, IoT and D2D Communication
Correlation between Terms of 5G Networks, IoT and D2D Communication
ijtsrd
A study-and-analysis-of-access-to-high-speed-connection-in-wireless-technology
A study-and-analysis-of-access-to-high-speed-connection-in-wireless-technology
aravindhawan
IRJET- Cost Effective Scheme for Delay Tolerant Data Transmission
IRJET- Cost Effective Scheme for Delay Tolerant Data Transmission
IRJET Journal
20210805 以5 g與邊緣運算技術佈署物聯網
20210805 以5 g與邊緣運算技術佈署物聯網
Dr. Chang Jung Lee
List Other Types Of Attacks
List Other Types Of Attacks
Kimberly Brooks
A new algorithm to enhance security against cyber threats for internet of thi...
A new algorithm to enhance security against cyber threats for internet of thi...
IJECEIAES
The Network Impact of 802.11ac White Paper
The Network Impact of 802.11ac White Paper
Aerohive Networks
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
IJTRET-International Journal of Trendy Research in Engineering and Technology
Cor review2018-a
Cor review2018-a
Nexus Publishing
Quick Quote App Portfolio
Quick Quote App Portfolio
Nexus Publishing
What Is 5G Technology.pdf
What Is 5G Technology.pdf
Hussain110464
Whitepaper: Mobile Networks in a smart digital future - deploying a platform ...
Whitepaper: Mobile Networks in a smart digital future - deploying a platform ...
Petr Nemec
Similar a SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
(20)
Big Data and Next Generation Network Challenges - Phdassistance
Big Data and Next Generation Network Challenges - Phdassistance
5G report 2
5G report 2
SECURING FUTURE CONNECTIVITY: An Extensive Analysis on 5G Network Security
SECURING FUTURE CONNECTIVITY: An Extensive Analysis on 5G Network Security
5G Technology
5G Technology
Review on a new generation wireless mobile network
Review on a new generation wireless mobile network
Performance Evaluation of VEnodeb Using Virtualized Radio Resource Management
Performance Evaluation of VEnodeb Using Virtualized Radio Resource Management
An extensive review: Internet of things is speeding up the necessity for 5G
An extensive review: Internet of things is speeding up the necessity for 5G
Scaling Mobile Network Security for LTE: A Multi-Layer Approach
Scaling Mobile Network Security for LTE: A Multi-Layer Approach
Correlation between Terms of 5G Networks, IoT and D2D Communication
Correlation between Terms of 5G Networks, IoT and D2D Communication
A study-and-analysis-of-access-to-high-speed-connection-in-wireless-technology
A study-and-analysis-of-access-to-high-speed-connection-in-wireless-technology
IRJET- Cost Effective Scheme for Delay Tolerant Data Transmission
IRJET- Cost Effective Scheme for Delay Tolerant Data Transmission
20210805 以5 g與邊緣運算技術佈署物聯網
20210805 以5 g與邊緣運算技術佈署物聯網
List Other Types Of Attacks
List Other Types Of Attacks
A new algorithm to enhance security against cyber threats for internet of thi...
A new algorithm to enhance security against cyber threats for internet of thi...
The Network Impact of 802.11ac White Paper
The Network Impact of 802.11ac White Paper
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
Cor review2018-a
Cor review2018-a
Quick Quote App Portfolio
Quick Quote App Portfolio
What Is 5G Technology.pdf
What Is 5G Technology.pdf
Whitepaper: Mobile Networks in a smart digital future - deploying a platform ...
Whitepaper: Mobile Networks in a smart digital future - deploying a platform ...
Más de IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
Más de IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Último
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
humanexperienceaaa
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
ranjana rawat
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Christo Ananth
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
ranjana rawat
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
RajaP95
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
ssuser5c9d4b1
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
M Maged Hegazy, LLM, MBA, CCP, P3O
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
ranjana rawat
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Dr.Costas Sachpazis
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
RajaP95
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
SIVASHANKAR N
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
ranjana rawat
Extrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
120cr0395
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Dr.Costas Sachpazis
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
RajkumarAkumalla
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
Suhani Kapoor
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
KurinjimalarL3
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Call Girls in Nagpur High Profile
Último
(20)
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
Extrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
1.
© 2023, IRJET
| Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 1183 SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML 1,2,3Students of B.Tech in Electronics & Communication Engineering, Vellore Institute of Technology, Vellore, India, 4Student of M.Tech in Software Engineering, Vellore Institute of Technology, Amaravathi, India, ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - A disconnected system currently poses a significant problem for IoT technologies. The potential of 5G to send data faster and allow more links can address the current difficulty while also simplifying connected device control. 5G, on the other hand, will be able to process data swiftly using 4G/LTE networks, which has been a barrier for IoT solutions. As a result, there have been substantial delays between sending data and receiving it. By utilizing the 5G network, more users would be able to send more data without the risk of overcrowding the network, which has previously resulted in delays. Everyone would be able to see the benefits of IoT technology thanks to 5G connectivity. The IoT's potential is enormous right now, but 5G technology will bring it to full. The fifth-generation (5G) networks are being developed and prepared for deployment by the mobile industry. The rise of IoT and other intelligent automation applications is being significantly fueled by the burgeoning 5G networks, which are becoming more widely accessible. All rely on 5G's super- fast connectivity and low latency, including the Internet of Things (IoT), artificial intelligence (AI), driverless cars, virtual reality (VR), blockchain, and future innovations we haven't even thought of yet. The introduction of 5G represents more than just a generational change for the IT sector as a whole. Key Words: Artificial Intelligence, 5th Generation, Blockchain, Latency, IOT 1. INTRODUCTION The Internet of Things, or IoT, is becoming more well- known. The number of connected devices will have increased from 700 million to 3.2 billion by the year 2023. The upcoming launch of 5G, or the fifth generation of cellular mobile communications, is fantastic news for the Internet of Things industry. While there are several factors behind this increase, the development of 5G networks will be one of the most important. This is because 5G networks will greatly boost the functionality and dependability of these connected gadgets. The anticipated successor to the 4G networks that link the majority of current mobile phones is 5G, or fifth generation, which cellular phone carriers started constructing internationally in 2019. The performance of any IoT, which is ultimately defined by how quickly it can communicate with other IoT devices, smartphones and tablets, software in the form of an app or a website, and other elements, is what determines if it will be profitable. Data transfer speeds will considerably rise with 5G. Compared to existing LTE networks, 5G is expected to be ten times quicker.Because of this increase in speed, IoT devices will be able to communicate and exchange data more swiftly than previously. After all of this, we have a general concept of how 5G may be used for IoT connection. However, we shouldn't get too excited too soon because adopting 5G in IOT has some significant disadvantages as well. This component is the primary emphasis of the project. appreciating what 5G can accomplish in terms of potential Identifying the problems in 5G IoT The 5G IOT is not without flaws. Here are a few of the issues we discovered during our investigation. There are difficulties like security, bandwidth, and latency. RESOURCE MANAGEMENT In contrast to 4G LTE, which operates on currently in use frequency bands below 6GHz, 5G requires frequencies between 300GHz and 600GHz. Some go by the name mmWave more frequently. They can create ultra-fast speeds that are 20 times faster than the theoretical maximum throughput of LTE and can transport a lot more data. SECURITY This challenge would apply to any data-driven technology, but the 5G deployment would be targeted by both simple and complex cybersecurity threats. Although the Authentication and Key Agreement (AKA), a method for building trust across networks, covers 5G, it is now feasible to track individuals using their phones. They might even listen in on actual phone calls. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 03 | Mar 2023 www.irjet.net p-ISSN: 2395-0072 Gali Jeevan Sai1 ,V Siddharth Dhara2, JayaKrishna Reddy Puttur3, Dharani Gali4
2.
© 2023, IRJET
| Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 1184 REGULATIONS AND STANDARDS Given the increased infrastructure required to spread the network out, government agencies will be involved in the installation of 5G. There will be a need for new antennas, base stations, and repeaters from service providers. In addition, 5G services across several vertical industries will be introduced to authorities in waves. Examples include spectrum availability, EMF radiation restrictions, infrastructure sharing, and cybersecurity. The many elements and challenges of getting there are explored in research from Research and Markets. Because the third issue is up to lawmakers, we'll just talk about the first two issues here. Although many academics are working on these, there may be drawbacks to using 5G for IoT. RESOURCE MANAGEMENT As previously said, there is a great deal of traffic on the network as a result of the rise in devices. As a result, an efficient resource management system is critical. The primary goal of the IoT device network is to generate data that is then translated into meaningful information through the data analysis process, as well as to give relevant resources to end users. The management of IoT resources is a major difficulty in ensuring the quality of the end-user experience is employed in the creation of IoT networks. INTUITION The capacity to create virtual networks is one of 5G's finest features. Subnets with various traffic priorities will subsequently be formed. In a hospital, for instance, the network may be configured to give priority to a connection between a surgeon and a robot rather than, say, patient contacts. Even if the network is at capacity, emergency broadcasts can continue. 1.1 Existing Method SDN is becoming more and more popular among engineers due to its disruptive nature when compared to the conventional network. SDN is a networking strategy that allows for programming-based network node management as opposed to more conventional system administration techniques. Software-defined networking technology is a method of network administration that makes it more similar to cloud computing than traditional network management by enabling dynamic, programmatically effective network setup to increase network performance and monitoring. Fig 1 : SDN Architecture 1.1 PROPOSED METHOD Using a very effective anomaly detection in Machine learning powered by autoencoder, we can detect hackers or irregularities. The system we create also keeps track of the hackers, preventing them from moving forward. The network error is measured against the systems in this project. Any mechanism that creates unfavorable results is classified as an anomaly. 1. Tracking every IP address in the network's consumption and distributing network resources based on the intensity of usage. 2. Creating a parameter to determine the greatest intensity, which is given priority when the network is congested. 3. Creating virtual subnets and ensuring that the ones with higher priorities are distributed across multiple subnets to avoid congestion in a single subnet. 4. After completing the above steps, we utilize a recurrent neural network to anticipate network utilization for specific usage and, as a result, allocate resources based on this information. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 03 | Mar 2023 www.irjet.net p-ISSN: 2395-0072
3.
© 2023, IRJET
| Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 1185 Raw Data: Each row consists of four columns: ● date: yyyy-mm-dd (from 2006-07-01 through 2006-09-30). ● l_ipn: local IP (coded as an integer from 0-9). ● r_asn: remote ASN (an integer that identifies the remote ISP). ● f: flows (count of connections for that day). Reports of "odd" activity or suspicions Date : IP 08-24 : 1 09-04 : 5 09-18 : 4 09-26 : 3 6 Real network traffic data The data set has ~21K rows and comprises 10 local workstation Internet Protocol (IPs) over a period of three months. Table -1: ML methods to encounter various DDoS attacks in 5G DDoS attacks in a 5G network built on SDN ML methods SDN based traffic affected by DDoS attackers. To detect DDoS attacks Neural network model, SOM Collected flow inputs at the SDN controllers at predetermined times Periodic flow-based detection Switch memory uses a bloom filter to control DDoS traffic. Load balancing, Bloom filter Reduce the workload on the data and control planes. Interface mitigation. Semi-supervised to detect anomalies in SDN SVM anomaly detection 2. IMPROVING THE SOLUTION USING DEEP LEARNING ● We use various algorithms of machine learning and improve the software-defined network and thus bettering its performance. ● ML for network management: use various deep learning techniques for classifying the traffic into normal or malicious classes. ● ML for threat detection: We observe the anomalies present in the network using machine learning algorithms. Fig 2 : Flow Diagram 3. METHODOLOGY We consider the data of New York city and predict the amount of usage by an individual. We apply machine learning algorithms and then allot the bandwidth according to the predicted output. Here is the data set we have used: Table -2: Data set S No. Data I_ipn r_asn f 1 2006-07-01 0 701 1 2 2006-07-01 0 714 1 3 2006-07-01 0 1239 1 4 2006-07-01 0 1680 1 5 2006-07-01 0 2514 1 6 2006-07-01 0 3320 1 7 2006-07-01 0 3561 13 8 2006-07-01 0 4132 3 9 2006-07-01 0 5617 2 10 2006-07-01 0 6478 2 11 2006-07-01 0 6713 1 12 2006-07-01 0 7132 1 International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 03 | Mar 2023 www.irjet.net p-ISSN: 2395-0072
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 03 | Mar 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 1186 Fig 3 : Graphical representation of Local IP Flow Fig 4 : Graphical representation of Local IP Flow Fig 5 : Graphical representation of Local IP Flow Fig 6 : Graphical representation of Local IP Flow 4. RESULTS Security Provision For 5G IOT: There are many different types of assaults that can exploit cyber security flaws. Some of the known cyber threats include Botnet attacks that control a network of connected devices to puppeteer a massive cyber- attack. Distributed denial-of-service (DDoS) overloads a network or website to take it offline.The DDoS assaults place a lot of demand on the target resources, making it difficult to balance protection method performance and resource usage. As a result, it's crucial to make sure the defensive mechanism uses as little of the targeted system resources as feasible while preventing DDoS assaults. We have found an efficient solution for the detection of abnormalities in the network. This is done using Machine learning. Fig 7 : Anomaly Detection
5.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 03 | Mar 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 1187 5. CONCLUSIONS Our model is built in a way to find out any sort of abnormalities by the user based on the number of requests on a particular day. We trained our model using the RNN model unlike the CNN model, As it has internal memory associated with it. So we trained our ML model to remember the past information of the user. This helps us to block the intruder in the future. We analyzed our data set and performed mathematical operations on the past 3 months of the data set, and we set a threshold value such that if the user crosses the threshold value, our model considers the intruder as a hacker and it will block the intruder connection. Future Scope This model efficiently solves the two major problems in 5GIOT. Here are some ways to expand the scope of the idea : 1) Deploy the model in the local college server like University servers. 2) This can be directly embedded in software- defined networks. 3) This can be used for identifying security threats in areas of greater concern. REFERENCES [1] Adou, Yves. “ML-Based 5G Network SlicingSecurity: A Comprehensive Survey.” IDEAS/RePEc, https://ideas.repec.org/a/gam/jftint/v14y2022i4p11 6-d789792.html. [2] Rajalakshmi, P., et al. “Performance Analysis of CSMA/CA and PCA for Time Critical ...” ScienceGate, https://www.sciencegate.app/document/10.1109/tii. 2018.2802497. [3] Thayanathan, Vijay, et al. “Machine Learning for Securing SDN based 5G Network.” ResearchGate, https://www.researchgate.net/publication/3485352 26_Machine_Learning_for_Securing_SDN_based_5G_Ne twork. [4] Sharma, Parjanay, et al. “Role of machine learning and deep learning in securing 5G-driven industrial IoT applications.” ScienceDirect, https://www.sciencedirect.com/science/article/abs/ pii/S1570870521001906. [5] Rahman, Ashikur, et al. ``Feasibility and Challenges of 5G Network Deployment in Least Developed Countries.” Scientific Research, https://www.scirp.org/journal/paperabs.aspx?paperi d=106943. [6] Mateus Cruz, Samuel Mafra, et al. “Smart Strawberry Farming Using Edge Computing and IoT.” NCBI, 5 August 2022, https://www.ncbi.nlm.nih.gov/pmc/articles/PMC937 1401/. [7] Nicolas-Alin Stoian, “(2020) Machine Learning for anomaly detection in IoT networks : Malware analysis on the IoT-23 data set.” University of Twente Student Theses, https://essay.utwente.nl/81979/. [8] S. Arumuga Devi, “5G wireless network technology: The evolution of 5G and technological developments towards the successor of 5G | International journal of health sciences.” ScienceScholar, https://sciencescholar.us/journal/index.php/ijhs/art icle/view/13465. [9] Afaq, Amir, et al. “Machine learning for 5G security: Architecture, recent advances, and challenges.” ScienceDirect, https://www.sciencedirect.com/science/article/abs/ pii/S1570870521001785. [10] Alsharif, Mohammad H., and Peerapong Uthansakul. “A Novel Method for Improved Network Traffic Prediction Using Enhanced Deep Reinforcement Learning Algorithm.” National Library of Medicine, https://www.ncbi.nlm.nih.gov/pmc/articles/PMC926 9698/. BIOGRAPHIES Gali Jeevan Sai, Currently Studying at VIT University, Vellore, School of Electronics and Communication Engineering (SENSE). Venkata Siddharth Dhara, Currently Studying at VIT University, Vellore, School of Electronics and Communication Engineering (SENSE).
6.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 03 | Mar 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 1188 Jayakrishna Reddy Puttur, Currently Studying at VIT University, Vellore, School of Electronics and Communication Engineering (SENSE). Gali Dharani, Currently Studying at VIT University, AP , School of Computer Science Engineering (SCOPE).
Descargar ahora