Please login first
Optimizing the Energy Efficiency in 5G security systems for Intrusion Detection with an emphasis on DDOS assaults
* 1 , 2 , 3 , 1 , 4
1  Universiti Teknologi PETRONAS UTP
2  Universiti Tecknologi PETRONAS
3  Universiti Teknologi PETRONAS, Malaysia
4  UMYU Umaru Musa Yaradua University Katsina
Academic Editor: Alessandro Bruno

Abstract:

In response to the rising demand for new and existing use cases of Energy Efficiency, the telecoms sector is going through a dramatic shift towards 5G technology. High data speeds, extensive coverage provided by dense base station deployment, higher capacity, improved Quality of Service (QoS), and extremely low latency are required for 5G wireless networks. New deployment methods, networking architectures, processing technologies, and storage solutions must be created to satisfy the anticipated service requirements of 5G technologies. These developments further increase the need to secure the security of 5G systems and their functionality as well as Energy Efficiency problems. 5G system security is the target of intense efforts by developers and academics in this industry. Significant security concerns for 5G networks have been identified through extensive research. Attackers can make use of vulnerabilities by introducing malicious code and performing other nefarious deeds to take advantage of the system. On 5G networks, attack techniques as Model node map (MNmap), power depletion assaults and Man-in-the-Middle (MiTM) assaults can be effectively used. However, this study analyses 5G technology's current Energy Efficiency problems. We recommend an unusual Intrusion Detection system (IDS) which makes use of Traffic Volume methods considering this investigation, we propose the enhancing training process by including statistical analysis on Distributed Denial-of-Service (DDoS) threats, which is how prior research recommended using OMNET and NS-3 on IDS for optimization. Additionally, the methodology for incorporating the suggested Intrusion Detection systems within a typical 5G architecture is presented by our research using NETSIM. The paper also offers a planned system's correction method, providing a useful implementation after making analysis.
Keywords—5G, security, Intrusion Detection systems, Energy Efficienc

Keywords: 5G, Intrusion Detection systems, Energy Efficiency, NETSIM, DDoS, QoS.

 
 
Top