Open Access
ARTICLE
Advancing 5G Network Applications Lifecycle Security: An ML-Driven Approach
1 Information and Communications Engineering Department, University of Murcia, Murcia, 30100, Spain
2 Research & Development Department, Odin Solutions S.L., Murcia, 30007, Spain
3 Network Architecture Laboratory, Network Research Institute, National Institute of Information and Communications, Tokyo, 184-8795, Japan
4 Engineering and Applied Techniques Department, University Center of Defense at the Spanish Air Force Academy, Murcia, 30729, Spain
* Corresponding Author: Ana Hermosilla. Email:
(This article belongs to the Special Issue: Advanced Security for Future Mobile Internet: A Key Challenge for the Digital Transformation)
Computer Modeling in Engineering & Sciences 2024, 141(2), 1447-1471. https://doi.org/10.32604/cmes.2024.053379
Received 30 April 2024; Accepted 18 July 2024; Issue published 27 September 2024
Abstract
As 5th Generation (5G) and Beyond 5G (B5G) networks become increasingly prevalent, ensuring not only network security but also the security and reliability of the applications, the so-called network applications, becomes of paramount importance. This paper introduces a novel integrated model architecture, combining a network application validation framework with an AI-driven reactive system to enhance security in real-time. The proposed model leverages machine learning (ML) and artificial intelligence (AI) to dynamically monitor and respond to security threats, effectively mitigating potential risks before they impact the network infrastructure. This dual approach not only validates the functionality and performance of network applications before their real deployment but also enhances the network’s ability to adapt and respond to threats as they arise. The implementation of this model, in the shape of an architecture deployed in two distinct sites, demonstrates its practical viability and effectiveness. Integrating application validation with proactive threat detection and response, the proposed model addresses critical security challenges unique to 5G infrastructures. This paper details the model, architecture’s design, implementation, and evaluation of this solution, illustrating its potential to improve network security management in 5G environments significantly. Our findings highlight the architecture’s capability to ensure both the operational integrity of network applications and the security of the underlying infrastructure, presenting a significant advancement in network security.Keywords
Cite This Article
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.