<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Development of the Testbed for Testing Deep Learning Based IDS System for 5G Network</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Roman</forename><surname>Odarchenko</surname></persName>
							<email>odarchenko.r.s@ukr.net</email>
							<affiliation key="aff0">
								<orgName type="institution">National Aviation University</orgName>
								<address>
									<addrLine>Lyubomyra Gusara Ave 1</addrLine>
									<postCode>03058</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff2">
								<orgName type="institution">Bundleslab KFT</orgName>
								<address>
									<addrLine>Vali u, 4. 4. em. 2. ajto</addrLine>
									<postCode>1117</postCode>
									<settlement>Budapest</settlement>
									<country key="HU">Hungary</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Azamat</forename><surname>Imanbayev</surname></persName>
							<email>imanbaevazamat@gmail.com</email>
							<affiliation key="aff1">
								<orgName type="institution">Kazakh National University</orgName>
								<address>
									<addrLine>al-Farabi Street 71</addrLine>
									<postCode>050040</postCode>
									<settlement>Almaty</settlement>
									<country key="KZ">Kazakhstan</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Alla</forename><surname>Pinchuk</surname></persName>
							<email>pinchuk.ad87@gmail.com</email>
							<affiliation key="aff0">
								<orgName type="institution">National Aviation University</orgName>
								<address>
									<addrLine>Lyubomyra Gusara Ave 1</addrLine>
									<postCode>03058</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Development of the Testbed for Testing Deep Learning Based IDS System for 5G Network</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">8504878190642051D6B7DFF6685CE6E2</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-12-29T06:04+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>5G</term>
					<term>6G</term>
					<term>IDS</term>
					<term>Artificial Intelligence</term>
					<term>Deep Learning</term>
					<term>Machine learning</term>
					<term>datasets</term>
					<term>testbed</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>In modern conditions, due to the huge emerging landscape of new cyber threats, global risks and given the most widespread connection of heterogeneous devices to the network via cellular communication networks, the issues of ensuring the necessary level of cybersecurity in these networks are becoming a priority that needs to be addressed as soon as possible. Therefore, in this research, the main attention is paid to the development of IDS for 5G networks based on artificial intelligence. In particular, this work is devoted to the development of the concept of the system, the analysis of existing datasets for its training and the development of the most appropriate test architecture of 5G network or testing the trained AI-based IDS for 5G networks. To build a test network, various options for using open-source solutions were analyzed in detail, among which preference was given to OpenAirInterface. For this architecture, the integration of the developed IDS will be the easiest and most expedient. Also, it will be relatively easy to generate the necessary types of attacks on the network and the corresponding traffic analysis.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>Compared to the present, in 2025, we will be using 13 times more data. It is anticipated that by 2025, there will be 21 billion devices connected to the Internet, in contrast to the current 7 billion <ref type="bibr" target="#b0">[1]</ref>. Many of these new devices will manage and control our homes, urban infrastructure, transportation, and other aspects of our lives. Beyond 2030, wireless applications will necessitate significantly higher data rates (up to 1 Tbps), extremely low end-to-end latency (&lt;1 ms), and exceedingly high end-to-end reliability (99.99999%) <ref type="bibr" target="#b1">[2]</ref>. However, this remarkable digital evolution is only achievable through the advent of the new generation of 5G and 6G mobile networks. Following the introduction of 5G technology, academia and industry have begun exploring the potential of 6th generation (6G) wireless network technology. The progression of mobile network technologies, particularly with the emergence of new 5G services and architectures, presents novel challenges in the realm of security and user privacy protection. The threat landscape is rapidly evolving, and attacks can originate from any point of connection. Smart Cities, which will inevitably be constructed on the foundation of next-generation cellular networks, are particularly vulnerable as they constitute critical infrastructure. Moreover, the aim is to extend the capabilities of mobile communication beyond what previous generations could achieve. Several potential technologies are predicted to underpin 6G networks, including both existing and future technologies such as post-quantum cryptography, artificial intelligence (AI), machine learning (ML), advanced edge computing, molecular communication, THz, visible light communication (VLC), and distributed ledger (DL) technologies like blockchain <ref type="bibr" target="#b2">[3]</ref>. From a security and privacy standpoint, these advancements necessitate a reevaluation of conventional security practices. Authentication, encryption, access control, communications, and malicious activity detection must meet the heightened demands of future networks. Additionally, new approaches to security are required to ensure reliability and privacy. The escalating need for information security in cellular networks, owing to the proliferation and diversification of cyber attacks, serves as a prerequisite for such efforts.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Background analysis</head><p>In recent years, there has been an increasing focus on research regarding testbeds for simulating cyberattacks within the cybersecurity community. Numerous cyber range solutions have been proposed, including NCR [4], DETERLab <ref type="bibr" target="#b3">[5]</ref>, SimSpace <ref type="bibr" target="#b4">[6]</ref>, EDURange <ref type="bibr" target="#b5">[7]</ref>, CYRA <ref type="bibr" target="#b6">[8]</ref>, KYPO <ref type="bibr" target="#b7">[9]</ref>, and CyRIS <ref type="bibr" target="#b8">[10]</ref>. Many of these initiatives have centered around the development and integration of models, tools, and methodologies for defining simulation rules, as well as offering practical guidance for conducting attack simulations <ref type="bibr" target="#b9">[11]</ref>. While early cyber range systems were physical, more recent proposals have shifted towards virtual environments, which reduces costs and enhances flexibility <ref type="bibr" target="#b10">[12]</ref>.</p><p>However, to the best of our knowledge, there have been no studies on cyberspace systems specifically designed for 5G cybersecurity testing. Our objective is to propose a system that provides a fully virtualized 5G network. To overcome the limitations of existing cyberspaces, our research suggests a new testbed capable of simulating a comprehensive 5G network within a virtual environment. This approach allows for simplified configuration without the need for complex hardware components.</p><p>One of the shortcomings of existing cyberspaces is the lack of publicly available datasets and mechanisms for generating high-precision synthetic data. Given that 5G networks face various security challenges and threats, several papers have proposed using ML/DL methods to automatically detect malicious network traffic. However, current proposals require significant improvements in terms of real-time detection and analysis of potential threats <ref type="bibr" target="#b11">[13]</ref>.</p><p>Furthermore, current proposals largely overlook the integration of ML models in a fully automated manner and the verification of their functionality in operational environments <ref type="bibr" target="#b12">[14]</ref>. We propose the use of Intrusion Detection Systems (IDS) for 5G mobile networks, which can monitor traffic in realtime and identify abnormal patterns.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Problem statement</head><p>Currently, commercial 5G networks are being rapidly deployed in many countries worldwide, while research and development efforts for enhancing cellular networks towards 6G are ongoing. In the present landscape, with the emergence of numerous new cyber threats and global risks, coupled with the extensive connectivity of diverse devices through cellular communication networks, ensuring a sufficient level of cybersecurity in these networks has become a crucial and pressing task.</p><p>Hence, the primary objective of this paper is to enhance the security systems of previous generations of cellular networks, their individual components, and the mechanisms for detecting cyber incidents. To accomplish these objectives, the following tasks need to be undertaken:</p><p>− development of the IA-based IDS for 5G concept; − development and deployment of the 5G testbed for testing the IDS; − development of appropriate software and its testing on a real cellular network.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Datasets for traffic analysis</head><p>The greatest challenge lies in obtaining reliable access to attack detection systems. While the necessary data can be acquired through network monitoring, most datasets are not publicly disclosed due to security and privacy concerns. Moreover, gathering information online can be a costly endeavor. As a result, developers seek to manage their networks or systems using the available datasets. Malowidzki et al. <ref type="bibr" target="#b11">[13]</ref> and Haider et al. <ref type="bibr" target="#b13">[15]</ref> highlight the complexity of the issue surrounding the lack of attack analysis datasets and the associated requirements for compilation. Additionally, these datasets are utilized to assess the accuracy of identifying attacks. The quality of the data directly impacts the results generated by the network intrusion detection system. In recent years, the cybersecurity community has made efforts to address this challenge, leading to the publication of several sets of intrusion detection data. This section will explore commonly used datasets for Intrusion Detection Systems (IDS), taking into account the advantages and disadvantages of existing datasets.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.1.">Overview of existing datasets for Traffic Analysis in Mobile Networks</head><p>Common properties serve as evaluation criteria to enable a meaningful comparison of statistics (FAIR Concepts <ref type="bibr" target="#b14">[16]</ref>). This is because each task or scenario is associated with a specific set of data records. For instance, the ISCX dataset <ref type="bibr" target="#b15">[17]</ref> is chosen to emphasize labeling, while the UGR'16 dataset <ref type="bibr" target="#b16">[18]</ref> is selected for its ability to capture long-term effects. Figure <ref type="figure" target="#fig_0">1</ref> illustrates four principles that are closely linked to the aforementioned concept:   Many studies and projects have been carried out during our lifetime. However, there are two main issues with this: duplicate records and obsolete records (i.e. no new attacks are included), which means that each trained model is subject to a partial learning algorithm. Therefore, the algorithm does not detect rare attacks in the record.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.1.2.">NSL-KDD</head><p>To solve the problem with the KDD-Cup'99 dataset, a new dataset was created called NSL-KDD. In fact, it is almost identical to its predecessor, except for a few advantages. Firstly, the issue of duplicate copies of the training dataset is addressed, avoiding biased results. Secondly, there are no duplicate instances in the test data set, which allowed the researchers to make more practical applications without random sampling.</p><p>Since this dataset is formed from the previous dataset, it also has 42 functions about different connections. However, this set is not suitable for the network IDS model because it does not have public data. Number of samples in NSL-KDD can see Fig. <ref type="figure" target="#fig_3">4</ref>.  </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.1.4.">CICIDS2017</head><p>CICIDS2017 is a new data collection developed by the Canadian Institute for Cyber Security. The dataset includes the latest network attacks, but also meets all the criteria for enhanced specific attacks in the ISCX2012 dataset <ref type="bibr" target="#b17">[19]</ref>. Since the launch of CICIDS2017, this database has attracted researchers to analyse and develop new models and algorithms. However, the best detection models need to detect all types of attacks, thus traffic data should be combined throughout the day to create a single data set that uses IDS to produce a typical IDS.</p><p>The data source contains an ML file with 8 CSV files. These files contain information about the types of attacks over a five-day period, including normal traffic. In some files, binary classification is convenient, in others you need to create multi-class definition templates. The files containing the CICIDS-2017 data set are presented in Fig. <ref type="figure" target="#fig_5">6</ref>. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.1.5.">CSE-CIC-IDS2018</head><p>CSE-CIC-IDS2018 is the latest version of the CSE Intrusion Detection dataset, which collected 10 days of network traffic. It has been extended due to the criteria used to create CIC-IDS201.</p><p>It has a similar structure to CICIDS2017 but is built around a large network of simulated users and attacking machines. The main purpose of this dataset is to train and predict models to detect insecure traffic based on anomalies. As with many network attack data sets, the data sets have class imbalances. Data-level algorithms or methods can be used to eliminate this problem. The attack scenarios with percentage distribution are shown in Fig. <ref type="figure" target="#fig_6">7</ref> below. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.2.">Issues with IDS benchmark datasets</head><p>As mentioned earlier, there are a sufficient number of available datasets for training and predicting network intrusion detection systems. However, only a limited number of these datasets contain relevant types of attacks and features that are practical for implementing models. This section discusses the main challenges faced by researchers working on intelligent intrusion detection systems.</p><p>First and foremost, collecting reliable research data is extremely difficult. Technology evolves rapidly, with security threats and new attacks constantly emerging. Consequently, datasets quickly lose their relevance and value within the cybersecurity community. Another challenge is data integrity. Researchers need to incorporate not just CSV files, but also audit logs and raw network data. Audit logs provide valuable information about cyberattacks, while raw data enhances threat detection capabilities.</p><p>The evolving landscape of attacks poses another challenge. As technology advances, hackers adapt their attack methods to current systems and software, leading to the emergence of new and deprecated attack types. This creates a perpetual cycle. To address this, researchers can either employ new datasets or utilize dataset generators that simulate hacker behavior and create appropriate attacks.</p><p>Furthermore, the generated datasets must be as realistic as possible to be applicable in practical network environments. This means including normal traffic from various end-user workstations and servers. Otherwise, the trained model may not be suitable for a specific computer network. Privacy considerations also come into play when working with datasets. While an organization's computer networks are the most trusted sources of data, they are often unwilling to share their audit logs or network logs due to privacy policies. As a result, researchers mostly rely on popular datasets, which are modeled data rather than real network traffic data.</p><p>The need for labeling is crucial in both supervised and unsupervised learning approaches. Labels are essential for calculating the accuracy of the employed algorithms. Experts typically gather secure network activity in cyberspaces before launching attacks on network traffic. They first establish normal traffic patterns and then introduce attacks. Some experts inject attacks into normal traffic, while others manually label the data, which is a more laborious process.</p><p>Additionally, the establishment of dataset criteria plays an important role. Markus Ring <ref type="bibr" target="#b18">[20]</ref> discusses common aspects of dataset descriptions and classifies them into five categories.</p><p>Finally, for a dataset to be valuable, it must gain broad acceptance within the research community. Without this support, the dataset may only be utilized in a limited number of research projects.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">AI-based IDS for 5G concept</head><p>Currently, the implementation of intelligent analytics is essential across various wireless networks, ranging from local networks to remote clouds. Network traffic prediction and estimation are critical for network operations and management, including congestion management, routing, resource allocation, service level agreement management, and other network responsibilities <ref type="bibr" target="#b19">[21]</ref>. Therefore, the utilization of machine learning (ML) and artificial intelligence (AI) will play a significant role. In a hierarchical order, we can consider the following:</p><p>− Artificial intelligence serves as a crucial component in comprehending vast amounts of data. It finds application in various areas, such as data preparation, data retrieval, data flow visualization, geospatial tracking, and real-time tracking. − Machine learning tackles the challenge of dealing with large volumes of data in 5G networks. It utilizes specialized algorithms that enable computers to learn and adapt.</p><p>As the size of data on the network grows due to connected sensors, traditional methods of tracking and identifying patterns become insufficient. Machine learning surpasses conventional data analysis approaches by analyzing data from multiple sources and establishing logical connections among them. Future opportunities for 5G networks encompass reliable analysis, network optimization, and improved efficiency in business solutions. Automation of the anomaly detection (AD) process is another potential benefit, as it can significantly contribute to operational and management systems. Consequently, this reduces the number of false positives and enhances the understanding of the underlying cause of anomalies. Figure <ref type="figure">8</ref> illustrates the automated anomaly analysis process.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Figure 8: Working process for automatic anomaly analysis</head><p>In this regard, it is necessary to develop new models and methods of Internet traffic in 5G networks, which will become the main types of networks connecting existing networks. Since each IoT application is characterized by individual network traffic parameters and the principle of interaction between physical and virtual Internet objects, it is necessary to develop models and methods for the interaction of IoT applications in 5G networks.</p><p>Despite significant progress, the 5G specification provides mobile operators with some guidance on how to ensure that their 5G networks truly support AI/ML. Much remains to be done to further simplify AI/ML-enabled networks and implement the core concepts of AI and ML as underlying network structures, including:</p><p>− Individual system of collecting detailed data;</p><p>− Demonstration of RAN capabilities for optimizing user networks and services; − RAN programming, RAN service architecture supporting AI/ML; − Data transfer and analysis/implementation of AI/ML to enable effective innovation; − Open datasets in wireless networks to accelerate the development of algorithms and new AI applications in wireless networks. As networks evolve beyond 5G, artificial intelligence could become an integral part of the overall blueprint for a holistic approach to managing this complex system.</p><p>The basic concept of using a network access discovery system, developed using ML and DL methods, includes the following three main steps, as shown in Fig. <ref type="figure">9</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Figure 9: NIDS methodology based on machine learning/deep learning</head><p>This figure shows relatively recent work on NIDS using machine and deep learning. After a brief analysis of the works <ref type="bibr" target="#b11">[13,</ref><ref type="bibr" target="#b20">[22]</ref><ref type="bibr" target="#b21">[23]</ref><ref type="bibr" target="#b22">[24]</ref>, it can be seen that in lots of them traditional machine learning algorithms have been used, and deep learning is still in its early stages of development. Although NIDS has been extensively studied, the most significant changes have only occurred in the content of the data set, which contains information about attack patterns.</p><p>Machine learning algorithms such as K-Nearest Neighbor (CNN), Support Vector Machine (SVM), Artificial Neural Network (ANN), K-Means Clustering, Fast Learning Network have already been used by others. For example, in the research paper <ref type="bibr" target="#b23">[25]</ref> presented six different machine learning models (Decision Tree, Random Forest, K Nearest Neighbors, Adaboost, Gradient Boosting, and Linear Discriminant Analysis) using one of the latest datasets, namely CSE-CIC-IDS2018. SMOTE was used by multiplying the data from the minority group to reduce unbalanced factors. Overall, their studies were able to improve the accuracy of the model from 4.01% to 30.59%.</p><p>At the same time, Yao et al. <ref type="bibr" target="#b24">[26]</ref> proposed a multilevel structure of the IDS model called Multilevel Semi-Supervised ML (MSML) which also uses the RF model. The main idea is to redirect to the next model if it is not checked. The experimental results showed the advantage of the model in detecting attacks even on small samples in the dataset.</p><p>The next work is devoted to the ANN-based intrusion detection model. This algorithm is different in that it can perform non-linear simulations using large amounts of data. However, this model has drawbacks: it takes a long time, slows down the learning process, and makes the solution inefficient. To solve this problem, Huang et al. <ref type="bibr" target="#b25">[27]</ref> suggested using the Extreme Learning Machine (ELM) as it has a direct connection to one of the hidden layers which analytically determines the output weights . The author's research became the basis for the work of other researchers such as Li et al. <ref type="bibr" target="#b26">[28]</ref> suggested the idea of using the Fast Learning Network. The problem was that this algorithm was based on a parallel connection of a multi-layer neural network and a single-layer forward neural network.</p><p>Ali and others <ref type="bibr" target="#b27">[29]</ref> continued the Fast Learning Network model idea in the KDD Cup'99 dataset using a particle swarm optimization known as PSO-FLN. After comparing the performance of their model with other optimization algorithms, they concluded that their model was superior, showing an increase in the number of neurons in the hidden layer. Despite good results, this model suffered from low accuracy for lower attack classes. Also, some deep learning models have been built due to their efficiency and autonomy of learning important features of the dataset. A notable example is the research paper by Naseer et al. <ref type="bibr" target="#b28">[30]</ref>, who compared different DL and ML models. As a result, Deep CNN and LSTM outperformed the rest.</p><p>A lot of work has been done with AutoEncoder (AE) in intrusion detection systems. For reference, this is one of the most popular deep learning methods as it matches the best features of the dataset. There are several subtypes of AE such as Stacked, Sparse and Variational AE. Shone et al. <ref type="bibr" target="#b29">[31]</ref> proposed an IDS based on the deep AE method and ML RF. Their work was successful in terms of computation and time, using only the AE coding part to make it work asymmetrically. Experiments were performed on two datasets such as KDD Cup '99 and NSL-KDD. Compared to Alrawashdeh et al. <ref type="bibr" target="#b30">[32]</ref> and their deep trust network models, the author's model was better, although not useful for detecting R2L and U2R attacks. This was due to the selection of a dataset that did not contain such cases.</p><p>Yang et al. proposed using the Stacked Sparse Autoencoder (SSAE) to extract high-level feature representations from intrusive behavioral information <ref type="bibr" target="#b31">[33]</ref>. As a result, they found that high dimensional sparse features are more discriminatory for intrusion behavior than previous methods, and the base classification process is greatly accelerated by using high dimensional sparse features. While this model provides adequate detection rates for U2R and R2L attacks, it is still lower than other dataset classes. The same methodology was followed by the authors of <ref type="bibr" target="#b32">[34]</ref> using AE and SVM. The results show an overall performance improvement over other DL and ML models.</p><p>A review of the literature shows that more work is needed to characterize the features of network attacks. After all, by defining a common pattern, it is possible to provide high accuracy for all attacks in the dataset. Many also use outdated datasets that do not have the new attack spectrum. In addition, research using class imbalance techniques to prevent infrequent attacks on datasets is limited.</p><p>So, it is critical to implement an effective security system to protect the 5G network from these threats. One such security system is the Intrusion Detection System (IDS).</p><p>An IDS is a software or hardware system that monitors network traffic for signs of malicious activity or policy violations. The IDS is designed to detect and alert network administrators to any suspicious behavior that could compromise the integrity, confidentiality, or availability of a network. Identifiers may be implemented in various parts of the network such as user equipment (UE), radio access network (RAN), and core network (CN).</p><p>The implementation of IDS in the 5G network is of paramount importance due to the significant increase in the number of connected devices and the amount of data that is transmitted over the network. With the advent of the Internet of Things (IoT), a huge number of devices with different levels of security are connected to the network, making it vulnerable to attacks. In addition, the 5G network is expected to support critical applications such as autonomous vehicles, remote healthcare, and industrial automation that require a high level of security and reliability.</p><p>IDS can help mitigate the security risks associated with 5G by providing real-time detection and alerting of malicious activity. Identifiers can detect various types of attacks, including distributed denial of service (DDoS), malware, and intrusion attempts. With IDS, network administrators can quickly respond to security incidents and take appropriate action to prevent further damage.</p><p>In conclusion, the implementation of IDS is critical to the security and reliability of the 5G network. As the number of connected devices and the amount of data transferred over the network increases, security risks also increase. An IDS can help detect and mitigate these risks by providing real-time detection and alerting of malicious activity. Therefore, it is important to prioritize the implementation of IDS in the 5G network to ensure the security and reliability of the network.</p><p>Software-defined security can be used to create an intelligent core network intrusion detection system, given that two key components of the 5G network -the RAN and the core network -are fully virtualized and defined by software. This makes it possible to develop an automated security system in which copies of the traffic from the reverse connection and the core network are sent to the SDS for analysis, as described in <ref type="bibr" target="#b33">[35]</ref>. It is important to note that traffic copies do not have any impact on network performance during the analysis phase. However, before determining whether the traffic is anomalous or not, pre-processing is required to ensure that the data is suitable for use with machine learning or deep learning models. Anomalies can then be analyzed using appropriate algorithms and the results stored in the Policy Manager database. These results are then sent to the VNF manager, which updates the IDS module. The time it takes to process the model plays a vital role in the presentation of the end results and determines when the template should be run to keep the module's policies up to date. Using this method, you can automate detection, update the database of attacks, and take the necessary actions to protect your network from intrusions.</p><p>Physically, this concept can be implemented in the form of a Cyber incident response platform for 5G cellular networks, which will receive data on the security status, cyber idents directly from various network nodes (Fig. <ref type="figure" target="#fig_2">3</ref>). IDS presented on Figure <ref type="figure" target="#fig_7">10</ref>, was described in more details in <ref type="bibr" target="#b11">[13]</ref>. It was only trained, but not tested in real environment. That is why it was decided to deploy 5G network testbed for conducting all the necessary tests.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.">5G network testbed development and deployment</head><p>Now let's move on to the development of a test bench for revalidation of the IDS in 5G measure (Fig. <ref type="figure" target="#fig_7">10</ref>).</p><p>Also, some logical blocks can be used for dermal use of them in the same tools, which were examined during the research.</p><p>First of all, the general scheme of the network was development. Thus, the network contains the following components: CORE (network core), RAN (Radio Access Network), MEC (Multi-access Edge Computing), and UE (User Equipment) (Fig. <ref type="figure" target="#fig_8">11</ref>). In the context of open-source, hardware was considered. It was decided to deploy a network core on the virtual machine on the server with Ubuntu OS, 16GB RAM, 512GB ROM, 16 CPU, and Intel Core processor. Because SDR needed a USB connection with RAN, a PC was chosen. It is also on Ubuntu OS and Intel Core processor, but 8GB RAM, 256GB ROM, and 6 CPU. As a transceiver, SDR Ettus USRP B210 was selected. On the Figure <ref type="figure" target="#fig_9">12</ref> showed a scheme that includes hardware and software. The full scheme includes communication between all deployed network components, IP addresses, software and hardware (Fig. <ref type="figure" target="#fig_2">13</ref>).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Figure 13:</head><p>The full deployment scheme Additionally, a monitoring system Grafana was deployed.</p><p>Before using the network for our goals, it was tested with a simulator of UE and gNodeB. For this, the gNBSim <ref type="bibr" target="#b35">[37]</ref> project was chosen. In this case, the network core was tested for serviceability. Results of testing showed on Figure <ref type="figure" target="#fig_11">14</ref>   Thus, for network core uses SD-CORE (EPC), and for RAN uses srsLTE (eNodeB). Regarding hardware, VM for EPC, Raspberry Pi for RAN, were used, and as a transceiver uses LimeSDR.</p><p>The similar deployment scheme that includes communication between all deployed network components, IP addresses, software and hardware on the Figure <ref type="figure" target="#fig_5">16</ref>. After configuration of RAN and EPC, a smartphone was prepared for connection (SIMcard programming and APN configuration). Figure <ref type="figure" target="#fig_14">18</ref> showed a successful UE attaching.  </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="7.">Conclusions</head><p>Currently, commercial 5G networks are being extensively deployed in numerous countries worldwide, while research and development efforts for advancing cellular networks towards 6G are ongoing. In the present era, with the rapid emergence of new cyber threats and global risks, combined with the widespread connection of diverse devices through cellular communication networks, ensuring the requisite level of cybersecurity in these networks has become an urgent priority.</p><p>Therefore, in this and previous studies, significant emphasis has been placed on the development of an Intrusion Detection System (IDS) for 5G networks based on artificial intelligence. This work aims to develop the system concept, analyze existing datasets for training purposes, and devise a suitable test architecture for evaluating the AI-based IDS specifically designed for 5G networks.</p><p>To construct the test network, various options utilizing open-source solutions were meticulously examined, with a preference given to OpenAirInterface. This choice ensures seamless and practical integration of the developed IDS into the architecture. Additionally, generating the required types of attacks on the network and conducting corresponding traffic analysis will be relatively straightforward.</p><p>Future research endeavors will focus on assessing the performance of the developed system within the established testbed infrastructure.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: FAIRGiven this concept, this article describes a collection of attack detection data. For the purpose of this work, several new and popular datasets were selected (see Fig.2).</figDesc><graphic coords="3,84.00,318.83,313.15,194.97" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 2 :</head><label>2</label><figDesc>Figure 2: Network Intrusion Detection System datasets</figDesc><graphic coords="3,85.10,576.60,318.15,169.48" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Figure 3 :</head><label>3</label><figDesc>Figure 3: Number of samples in KDD'99</figDesc><graphic coords="4,84.00,206.83,424.45,96.75" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>Figure 4 :</head><label>4</label><figDesc>Figure 4: Number of samples in NSL-KDD</figDesc><graphic coords="4,84.00,537.89,433.41,99.80" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_4"><head>Figure 5 :</head><label>5</label><figDesc>Figure 5: Types of attacks in UNSW-NB15</figDesc><graphic coords="5,84.00,176.40,447.71,544.60" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_5"><head>Figure 6 :</head><label>6</label><figDesc>Figure 6: CICIDS2017 dataset files It offers different types of attacks based on a 2016 McAfee report and is publicly available. Complete data set format with 2,830,743 instances with 15 class tokens (1 normal and 14 attacks) and 79 features (78 features and 1 for attack type tokens).</figDesc><graphic coords="6,84.00,229.58,436.60,344.39" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_6"><head>Figure 7 :</head><label>7</label><figDesc>Figure 7: CSE-CIC-IDS2018 attack scenarios</figDesc><graphic coords="7,84.00,96.65,435.64,120.50" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_7"><head>Figure 10 :</head><label>10</label><figDesc>Figure 10: Place of IDS in 5G cellular networks</figDesc><graphic coords="11,85.10,236.54,430.47,308.30" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_8"><head>Figure 11 :</head><label>11</label><figDesc>Figure 11: The general scheme for 5G testbed deploying After analyzing different open-source projects [36] for deploying a 5G network, the following software was chosen: − Network core: SD-CORE (ONF) − RAN: openairinterface5G (OAI) − SMO (Service management and orchestration): Aether ROC (ONF) Currently, a possible open-source project for MEC deployment was not considered.In the context of open-source, hardware was considered. It was decided to deploy a network core on the virtual machine on the server with Ubuntu OS, 16GB RAM, 512GB ROM, 16 CPU, and Intel Core processor. Because SDR needed a USB connection with RAN, a PC was chosen. It is also on Ubuntu OS and Intel Core processor, but 8GB RAM, 256GB ROM, and 6 CPU. As a transceiver, SDR Ettus USRP B210 was selected. On the Figure12showed a scheme that includes hardware and software.</figDesc><graphic coords="12,85.10,72.00,429.64,146.80" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_9"><head>Figure 12 :</head><label>12</label><figDesc>Figure 12: Hardware and software scheme</figDesc><graphic coords="12,78.00,423.81,436.47,224.85" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_10"><head></head><label></label><figDesc>. During test, five profiles were tested: − UE registration procedure; − PDU session establishment (Registration + UE initiated PDU Session Establishment + User Data packets); − UE deregistration procedure (Registration + UE initiated PDU Session Establishment + User Data packets + Deregister); − AN release (Registration + UE initiated PDU Session Establishment + User Data packets + AN Release); − UE trigger service request (Registration + UE initiated PDU Session Establishment + User Data packets + AN Release + UE Initiated Service Request).</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_11"><head>Figure 14 :</head><label>14</label><figDesc>Figure 14: Successful 5G network testLTE. As we do not currently have the required SDR, similarly, an LTE network scheme was developed and selected software and hardware (Fig.15).</figDesc><graphic coords="13,85.10,490.07,429.30,200.23" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_12"><head>Figure 15 :</head><label>15</label><figDesc>Figure 15: LTE deployment scheme</figDesc><graphic coords="14,85.10,72.00,378.00,181.50" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_13"><head>Figure 16 :Figure 17 :</head><label>1617</label><figDesc>Figure 16: The full deployment scheme</figDesc><graphic coords="14,84.00,566.90,396.80,186.74" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_14"><head>Figure 18 :</head><label>18</label><figDesc>Figure 18: UE attach On the monitoring we can see the following information about UE: IMSI, active time, throughput by uplink and downlink.</figDesc><graphic coords="15,85.10,109.30,432.90,172.49" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_15"><head>Figure 19 :</head><label>19</label><figDesc>Figure 19: UE attach</figDesc><graphic coords="15,85.10,336.42,432.76,193.35" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0"><head></head><label></label><figDesc></figDesc><graphic coords="8,85.10,313.26,430.47,287.95" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0"><head></head><label></label><figDesc></figDesc><graphic coords="9,87.75,201.03,427.65,218.23" type="bitmap" /></figure>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="8.">Acknowledgements</head><p>This work was supported in part by the European Commission under the 5GASP: 5G Application &amp; Services experimentation and certification Platform (H2020 -ICT-2020, grant agreement ID: 101016448). The views expressed in this contribution are those of the author and do not necessarily represent the project.</p></div>
			</div>

			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<monogr>
		<ptr target="https://securecommunications.airbus.com/en/meet-the-experts/the-importance-of-5g-technology" />
		<title level="m">The importance of 5G technology</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">A Vision of 6G Wireless Systems: Applications, Trends, Technologies, and Open Research Problems</title>
		<author>
			<persName><forename type="first">W</forename><surname>Saad</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Bennis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Chen</surname></persName>
		</author>
		<idno type="DOI">10.1109/mnet.001.1900287</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Netw</title>
		<imprint>
			<biblScope unit="volume">34</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="134" to="142" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Security Requirements and Challenges of 6G Technologies and Applications</title>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">A</forename><surname>Abdel Hakeem</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">H</forename><surname>Hussein</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Kim</surname></persName>
		</author>
		<idno type="DOI">10.3390/s22051969</idno>
	</analytic>
	<monogr>
		<title level="j">Sensors</title>
		<imprint>
			<biblScope unit="volume">22</biblScope>
			<biblScope unit="issue">5</biblScope>
			<date type="published" when="1969">2022. 1969</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Observations, Evaluations, and Recommendations for DETERLab from an Educational Perspective</title>
		<author>
			<persName><forename type="first">A</forename><surname>Ibrahim</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Ford</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">J. Cybersecur. Educ. Res. Pract. №</title>
		<imprint>
			<biblScope unit="volume">1</biblScope>
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<monogr>
		<title level="m" type="main">SimSpace: A Tool to Interpret Route Instructions with Qualitative Spatial Knowledge, у: Benchmarking of Qualitative Spatial and Temporal Reasoning Systems</title>
		<author>
			<persName><forename type="first">C</forename><surname>Jian</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Shi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Krieg-Brückner</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2009">2009</date>
			<biblScope unit="page" from="47" to="48" />
			<pubPlace>Stanford</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Cybersecurity Education and Assessment in EDURange</title>
		<author>
			<persName><forename type="first">R</forename><surname>Weiss</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Turbak</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Mache</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">E</forename><surname>Locasto</surname></persName>
		</author>
		<idno type="DOI">10.1109/msp.2017.54</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Secur. &amp; Priv</title>
		<imprint>
			<biblScope unit="volume">15</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="90" to="95" />
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">CYRA: A Model-Driven CYber Range Assurance Platform</title>
		<author>
			<persName><forename type="first">M</forename><surname>Smyrlis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Somarakis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Spanoudakis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Hatzivasilis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Ioannidis</surname></persName>
		</author>
		<idno type="DOI">10.3390/app11115165</idno>
	</analytic>
	<monogr>
		<title level="j">Appl. Sci</title>
		<imprint>
			<biblScope unit="volume">11</biblScope>
			<biblScope unit="issue">11</biblScope>
			<biblScope unit="page">5165</biblScope>
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">KYPO Cyber Range: Design and Use Cases</title>
		<author>
			<persName><forename type="first">J</forename><surname>Vykopal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Oslejsek</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Celeda</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Vizvary</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Tovarnak</surname></persName>
		</author>
		<idno type="DOI">10.5220/0006428203100321</idno>
	</analytic>
	<monogr>
		<title level="m">12th International Conference on Software Technologies</title>
				<imprint>
			<publisher>SCITEPRESS -Science and Technology Publications</publisher>
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<monogr>
		<author>
			<persName><forename type="first">C</forename><surname>Pham</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Tang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>-I. Chinen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Beuran</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Cyris</forename></persName>
		</author>
		<idno type="DOI">10.1145/3011077.3011087</idno>
		<title level="m">SoICT &apos;16: Seventh International Symposium on Information and Communication Technology</title>
				<meeting><address><addrLine>New York, NY, USA</addrLine></address></meeting>
		<imprint>
			<publisher>ACM</publisher>
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Cyber ranges and security testbeds: Scenarios, functions, tools and architecture</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">M</forename><surname>Yamin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Katt</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Gkioulos</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.cose.2019.101636</idno>
	</analytic>
	<monogr>
		<title level="j">Comput. &amp; Secur</title>
		<imprint>
			<biblScope unit="volume">88</biblScope>
			<biblScope unit="page">101636</biblScope>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Cyber Ranges and TestBeds for Education</title>
		<author>
			<persName><forename type="first">N</forename><surname>Chouliaras</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Kittes</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Kantzavelou</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Maglaras</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Pantziou</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">A</forename><surname>Ferrag</surname></persName>
		</author>
		<idno type="DOI">10.3390/app11041809</idno>
	</analytic>
	<monogr>
		<title level="j">Training, and Research</title>
		<imprint>
			<biblScope unit="volume">11</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page">1809</biblScope>
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
	<note>Appl. Sci.</note>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Research of Machine Learning Algorithms for the Development of Intrusion Detection Systems in 5G Mobile Networks and Beyond</title>
		<author>
			<persName><forename type="first">A</forename><surname>Imanbayev</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Tynymbayev</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Odarchenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Gnatyuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Berdibayev</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Baikenov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Kaniyeva</surname></persName>
		</author>
		<idno type="DOI">10.3390/s22249957</idno>
	</analytic>
	<monogr>
		<title level="j">Sensors</title>
		<imprint>
			<biblScope unit="volume">22</biblScope>
			<biblScope unit="issue">24</biblScope>
			<date type="published" when="2022">2022. 9957</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Intrusion detection systems using classical machine learning techniques vs integrated unsupervised feature learning and deep neural network</title>
		<author>
			<persName><forename type="first">S</forename><surname>Rawat</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Srinivasan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Ravi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">U</forename><surname>Ghosh</surname></persName>
		</author>
		<idno type="DOI">10.1002/itl2.232</idno>
	</analytic>
	<monogr>
		<title level="j">Internet Technol. Lett</title>
		<imprint>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Generating realistic intrusion detection system dataset based on fuzzy qualitative modeling</title>
		<author>
			<persName><forename type="first">W</forename><surname>Haider</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Hu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Slay</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">P</forename><surname>Turnbull</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Xie</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.jnca.2017.03.018</idno>
	</analytic>
	<monogr>
		<title level="j">J. Netw. Comput. Appl</title>
		<imprint>
			<biblScope unit="volume">87</biblScope>
			<biblScope unit="page" from="185" to="192" />
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">The FAIR Guiding Principles for scientific data management and stewardship</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">D</forename><surname>Wilkinson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Dumontier</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><forename type="middle">J</forename><surname>Aalbersberg</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Appleton</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Axton</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Baak</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Blomberg</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J.-W</forename><surname>Boiten</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">B</forename><surname>Da Silva Santos</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">E</forename><surname>Bourne</surname></persName>
		</author>
		<idno type="DOI">10.1038/sdata.2016.18</idno>
	</analytic>
	<monogr>
		<title level="j">Sci. Data</title>
		<imprint>
			<biblScope unit="volume">3</biblScope>
			<biblScope unit="issue">1</biblScope>
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Toward developing a systematic approach to generate benchmark datasets for intrusion detection</title>
		<author>
			<persName><forename type="first">A</forename><surname>Shiravi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Shiravi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Tavallaee</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">A</forename><surname>Ghorbani</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.cose.2011.12.012</idno>
	</analytic>
	<monogr>
		<title level="j">Comput. &amp; Secur</title>
		<imprint>
			<biblScope unit="volume">31</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="357" to="374" />
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">UGR&apos;16: A new dataset for the evaluation of cyclostationarity-based network IDSs</title>
		<author>
			<persName><forename type="first">G</forename><surname>Maciá-Fernández</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Camacho</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Magán-Carrión</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>García-Teodoro</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Therón</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.cose.2017.11.004</idno>
	</analytic>
	<monogr>
		<title level="j">Comput. &amp; Secur</title>
		<imprint>
			<biblScope unit="volume">73</biblScope>
			<biblScope unit="page" from="411" to="424" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<monogr>
		<ptr target="https://www.unb.ca/cic/datasets/index.html" />
		<title level="m">Datasets</title>
				<imprint/>
		<respStmt>
			<orgName>Research ; Canadian Institute for Cybersecurity | UNB</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">A survey of network-based intrusion detection data sets</title>
		<author>
			<persName><forename type="first">M</forename><surname>Ring</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Wunderlich</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Scheuring</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Landes</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Hotho</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.cose.2019.06.005</idno>
	</analytic>
	<monogr>
		<title level="j">Comput. &amp; Secur</title>
		<imprint>
			<biblScope unit="volume">86</biblScope>
			<biblScope unit="page" from="147" to="167" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">IoT traffic prediction using multi-step ahead prediction with neural network</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">R</forename><surname>Abdellah</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><forename type="middle">A K</forename><surname>Mahmood</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Paramonov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Koucheryavy</surname></persName>
		</author>
		<idno type="DOI">10.1109/icumt48472.2019.8970675</idno>
	</analytic>
	<monogr>
		<title level="m">11th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)</title>
				<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2019">2019. 2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">Defending network intrusion detection systems against adversarial evasion attacks</title>
		<author>
			<persName><forename type="first">M</forename><surname>Pawlicki</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Choraś</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Kozik</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.future.2020.04.013</idno>
	</analytic>
	<monogr>
		<title level="j">Future Gener. Comput. Syst</title>
		<imprint>
			<biblScope unit="volume">110</biblScope>
			<biblScope unit="page" from="148" to="154" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<analytic>
		<title level="a" type="main">Deep Learning in Mobile and Wireless Networking: A Survey</title>
		<author>
			<persName><forename type="first">C</forename><surname>Zhang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Patras</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Haddadi</surname></persName>
		</author>
		<idno type="DOI">10.1109/comst.2019.2904897</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Commun. Surv. &amp; Tutor</title>
		<imprint>
			<biblScope unit="volume">21</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="2224" to="2287" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<analytic>
		<title level="a" type="main">Artificial Intelligence Defined 5G Radio Access Networks</title>
		<author>
			<persName><forename type="first">M</forename><surname>Yao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Sohul</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Marojevic</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">H</forename><surname>Reed</surname></persName>
		</author>
		<idno type="DOI">10.1109/mcom.2019.1800629</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Commun. Mag</title>
		<imprint>
			<biblScope unit="volume">57</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="14" to="20" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<analytic>
		<title level="a" type="main">Increasing the Performance of Machine Learning-Based IDSs on an Imbalanced and Up-to-Date Dataset</title>
		<author>
			<persName><forename type="first">G</forename><surname>Karatas</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Demir</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><forename type="middle">K</forename><surname>Sahingoz</surname></persName>
		</author>
		<idno type="DOI">10.1109/access.2020.2973219</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Access</title>
		<imprint>
			<biblScope unit="volume">8</biblScope>
			<biblScope unit="page" from="32150" to="32162" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b24">
	<analytic>
		<title level="a" type="main">MSML: A Novel Multilevel Semi-Supervised Machine Learning Framework for Intrusion Detection System</title>
		<author>
			<persName><forename type="first">H</forename><surname>Yao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Fu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Zhang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Liu</surname></persName>
		</author>
		<idno type="DOI">10.1109/jiot.2018.2873125</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Internet Things J</title>
		<imprint>
			<biblScope unit="volume">6</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="1949" to="1959" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b25">
	<analytic>
		<title level="a" type="main">Extreme learning machine: Theory and applications</title>
		<author>
			<persName><forename type="first">G.-B</forename><surname>Huang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Q.-Y</forename><surname>Zhu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C.-K</forename><surname>Siew</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.neucom.2005.12.126</idno>
	</analytic>
	<monogr>
		<title level="j">Neurocomputing</title>
		<imprint>
			<biblScope unit="volume">70</biblScope>
			<biblScope unit="issue">1-3</biblScope>
			<biblScope unit="page" from="489" to="501" />
			<date type="published" when="2006">2006</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b26">
	<analytic>
		<title level="a" type="main">Fast learning network: a novel artificial neural network with a fast learning speed</title>
		<author>
			<persName><forename type="first">G</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Niu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Duan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Zhang</surname></persName>
		</author>
		<idno type="DOI">10.1007/s00521-013-1398-7</idno>
	</analytic>
	<monogr>
		<title level="j">Neural Comput. Appl</title>
		<imprint>
			<biblScope unit="volume">24</biblScope>
			<biblScope unit="page" from="1683" to="1695" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b27">
	<analytic>
		<title level="a" type="main">A New Intrusion Detection System Based on Fast Learning Network and Particle Swarm Optimization</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">H</forename><surname>Ali</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">A D</forename><surname>Al Mohammed</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Ismail</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">F</forename><surname>Zolkipli</surname></persName>
		</author>
		<idno type="DOI">10.1109/access.2018.2820092</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Access</title>
		<imprint>
			<biblScope unit="volume">6</biblScope>
			<biblScope unit="page" from="20255" to="20261" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b28">
	<analytic>
		<title level="a" type="main">Enhanced Network Anomaly Detection Based on Deep Neural Networks</title>
		<author>
			<persName><forename type="first">S</forename><surname>Naseer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Saleem</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Khalid</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">K</forename><surname>Bashir</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Han</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">M</forename><surname>Iqbal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Han</surname></persName>
		</author>
		<idno type="DOI">10.1109/access.2018.2863036</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Access</title>
		<imprint>
			<biblScope unit="volume">6</biblScope>
			<biblScope unit="page" from="48231" to="48246" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b29">
	<analytic>
		<title level="a" type="main">A Deep Learning Approach to Network Intrusion Detection</title>
		<author>
			<persName><forename type="first">N</forename><surname>Shone</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">N</forename><surname>Ngoc</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">D</forename><surname>Phai</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Q</forename><surname>Shi</surname></persName>
		</author>
		<idno type="DOI">10.1109/tetci.2017.2772792</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Trans. Emerg. Top. Comput. Intell</title>
		<imprint>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="41" to="50" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b30">
	<analytic>
		<title level="a" type="main">Toward an Online Anomaly Intrusion Detection System Based on Deep Learning</title>
		<author>
			<persName><forename type="first">K</forename><surname>Alrawashdeh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Purdy</surname></persName>
		</author>
		<idno type="DOI">10.1109/icmla.2016.0040</idno>
	</analytic>
	<monogr>
		<title level="m">15th IEEE International Conference on Machine Learning and Applications (ICMLA)</title>
				<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2016">2016. 2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b31">
	<analytic>
		<title level="a" type="main">Effective Feature Extraction via Stacked Sparse Autoencoder to Improve Intrusion Detection System</title>
		<author>
			<persName><forename type="first">B</forename><surname>Yan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Han</surname></persName>
		</author>
		<idno type="DOI">10.1109/access.2018.2858277</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Access</title>
		<imprint>
			<biblScope unit="volume">6</biblScope>
			<biblScope unit="page" from="41238" to="41248" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b32">
	<analytic>
		<title level="a" type="main">Deep Learning Approach Combining Sparse Autoencoder With SVM for Network Intrusion Detection</title>
		<author>
			<persName><forename type="first">M</forename><surname>Al-Qatf</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Lasheng</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Al-Habib</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Al-Sabahi</surname></persName>
		</author>
		<idno type="DOI">10.1109/access.2018.2869577</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Access</title>
		<imprint>
			<biblScope unit="volume">6</biblScope>
			<biblScope unit="page" from="52843" to="52856" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b33">
	<monogr>
		<title level="m" type="main">Machine learning based anomaly detection for 5g networks</title>
		<author>
			<persName><forename type="first">Jordan</forename><surname>Lam</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Abbas</forename><surname>Robert</surname></persName>
		</author>
		<idno type="arXiv">arXiv:2003.03474</idno>
		<imprint>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
	<note type="report_type">arXiv preprint</note>
</biblStruct>

<biblStruct xml:id="b34">
	<monogr>
		<idno>GitHub -calee0219</idno>
		<ptr target="https://github.com/calee0219/awesome-5g" />
		<title level="m">/awesome-5g: Awesome lists about 5G projects</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b35">
	<monogr>
		<ptr target="https://github.com/omec-project/gnbsim" />
		<title level="m">GitHub -omec-project/gnbsim: gNB simulator</title>
				<imprint/>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
