Open Access iconOpen Access

ARTICLE

Advancing 5G Network Applications Lifecycle Security: An ML-Driven Approach

by Ana Hermosilla1,2,*, Jorge Gallego-Madrid1, Pedro Martinez-Julia3, Jordi Ortiz4, Ved P. Kafle3, Antonio Skarmeta1,2

1 Information and Communications Engineering Department, University of Murcia, Murcia, 30100, Spain
2 Research & Development Department, Odin Solutions S.L., Murcia, 30007, Spain
3 Network Architecture Laboratory, Network Research Institute, National Institute of Information and Communications, Tokyo, 184-8795, Japan
4 Engineering and Applied Techniques Department, University Center of Defense at the Spanish Air Force Academy, Murcia, 30729, Spain

* Corresponding Author: Ana Hermosilla. Email: email

(This article belongs to the Special Issue: Advanced Security for Future Mobile Internet: A Key Challenge for the Digital Transformation)

Computer Modeling in Engineering & Sciences 2024, 141(2), 1447-1471. https://doi.org/10.32604/cmes.2024.053379

Abstract

As 5th Generation (5G) and Beyond 5G (B5G) networks become increasingly prevalent, ensuring not only network security but also the security and reliability of the applications, the so-called network applications, becomes of paramount importance. This paper introduces a novel integrated model architecture, combining a network application validation framework with an AI-driven reactive system to enhance security in real-time. The proposed model leverages machine learning (ML) and artificial intelligence (AI) to dynamically monitor and respond to security threats, effectively mitigating potential risks before they impact the network infrastructure. This dual approach not only validates the functionality and performance of network applications before their real deployment but also enhances the network’s ability to adapt and respond to threats as they arise. The implementation of this model, in the shape of an architecture deployed in two distinct sites, demonstrates its practical viability and effectiveness. Integrating application validation with proactive threat detection and response, the proposed model addresses critical security challenges unique to 5G infrastructures. This paper details the model, architecture’s design, implementation, and evaluation of this solution, illustrating its potential to improve network security management in 5G environments significantly. Our findings highlight the architecture’s capability to ensure both the operational integrity of network applications and the security of the underlying infrastructure, presenting a significant advancement in network security.

Keywords


Cite This Article

APA Style
Hermosilla, A., Gallego-Madrid, J., Martinez-Julia, P., Ortiz, J., Kafle, V.P. et al. (2024). Advancing 5G network applications lifecycle security: an ml-driven approach. Computer Modeling in Engineering & Sciences, 141(2), 1447-1471. https://doi.org/10.32604/cmes.2024.053379
Vancouver Style
Hermosilla A, Gallego-Madrid J, Martinez-Julia P, Ortiz J, Kafle VP, Skarmeta A. Advancing 5G network applications lifecycle security: an ml-driven approach. Comput Model Eng Sci. 2024;141(2):1447-1471 https://doi.org/10.32604/cmes.2024.053379
IEEE Style
A. Hermosilla, J. Gallego-Madrid, P. Martinez-Julia, J. Ortiz, V. P. Kafle, and A. Skarmeta, “Advancing 5G Network Applications Lifecycle Security: An ML-Driven Approach,” Comput. Model. Eng. Sci., vol. 141, no. 2, pp. 1447-1471, 2024. https://doi.org/10.32604/cmes.2024.053379



cc Copyright © 2024 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 690

    View

  • 228

    Download

  • 0

    Like

Share Link