A Meta-Model to Predict and Detect Malicious Activities in 6G-Structured Wireless Communication Networks

The rapid leap in wireless communication systems incorporated a plethora of new features and challenges that accompany the era of 6G and beyond being investigated and developed. Recently, machine learning techniques were widely deployed in many fields, especially wireless communications. It was used...

Full description

Bibliographic Details
Main Authors: Haider W. Oleiwi, Doaa N. Mhawi, Hamed Al-Raweshidy
Format: Article
Language:English
Published: MDPI AG 2023-01-01
Series:Electronics
Subjects:
Online Access:https://www.mdpi.com/2079-9292/12/3/643
_version_ 1797624822654566400
author Haider W. Oleiwi
Doaa N. Mhawi
Hamed Al-Raweshidy
author_facet Haider W. Oleiwi
Doaa N. Mhawi
Hamed Al-Raweshidy
author_sort Haider W. Oleiwi
collection DOAJ
description The rapid leap in wireless communication systems incorporated a plethora of new features and challenges that accompany the era of 6G and beyond being investigated and developed. Recently, machine learning techniques were widely deployed in many fields, especially wireless communications. It was used to improve network traffic performance regarding resource management, frequency spectrum optimization, latency, and security. The studies of modern wireless communications and anticipated features of ultra-densified ubiquitous wireless networks exposed a risky vulnerability and showed a necessity for developing a trustworthy intrusion detection system (IDS) with certain efficiency/standards that have not yet been achieved by current systems. IDSs lack acceptable immunity against repetitive, updatable, and intelligent attacks on wireless communication networks, significantly concerning the modern infrastructure of 6G communications, resulting in low accuracies/detection rates and high false-alarm/false-negative rates. For this objective principle, IDS system complexity was reduced by applying a unique meta-machine learning model for anomaly detection networks was developed in this paper. The five main stages of the proposed meta-model are as follows: the accumulated datasets (NSL KDD, UNSW NB15, CIC IDS17, and SCE CIC IDS18) comprise the initial stage. The second stage is preprocessing and feature selection, where preprocessing involves replacing missing values and eliminating duplicate values, leading to dimensionality minimization. The best-affected subset feature from datasets is selected using feature selection (i.e., Chi-Square). The third step is represented by the meta-model. In the training dataset, many classifiers are utilized (i.e., random forest, AdaBoosting, GradientBoost, XGBoost, CATBoost, and LightGBM). All the classifiers undergo the meta-model classifier (i.e., decision tree as the voting technique classifier) to select the best-predicted result. Finally, the classification and evaluation stage involves the experimental results of testing the meta-model on different datasets using binary-class and multi-class forms for classification. The results proved the proposed work’s high efficiency and outperformance compared to existing IDSs.
first_indexed 2024-03-11T09:48:07Z
format Article
id doaj.art-66d4fd33f3bb4362946ae181745bb978
institution Directory Open Access Journal
issn 2079-9292
language English
last_indexed 2024-03-11T09:48:07Z
publishDate 2023-01-01
publisher MDPI AG
record_format Article
series Electronics
spelling doaj.art-66d4fd33f3bb4362946ae181745bb9782023-11-16T16:29:24ZengMDPI AGElectronics2079-92922023-01-0112364310.3390/electronics12030643A Meta-Model to Predict and Detect Malicious Activities in 6G-Structured Wireless Communication NetworksHaider W. Oleiwi0Doaa N. Mhawi1Hamed Al-Raweshidy2Department of Electronic and Electrical Engineering, Brunel University London, London UB8 3PH, UKTechnical Institute for Administration, Middle Technical University, Baghdad 10010, IraqDepartment of Electronic and Electrical Engineering, Brunel University London, London UB8 3PH, UKThe rapid leap in wireless communication systems incorporated a plethora of new features and challenges that accompany the era of 6G and beyond being investigated and developed. Recently, machine learning techniques were widely deployed in many fields, especially wireless communications. It was used to improve network traffic performance regarding resource management, frequency spectrum optimization, latency, and security. The studies of modern wireless communications and anticipated features of ultra-densified ubiquitous wireless networks exposed a risky vulnerability and showed a necessity for developing a trustworthy intrusion detection system (IDS) with certain efficiency/standards that have not yet been achieved by current systems. IDSs lack acceptable immunity against repetitive, updatable, and intelligent attacks on wireless communication networks, significantly concerning the modern infrastructure of 6G communications, resulting in low accuracies/detection rates and high false-alarm/false-negative rates. For this objective principle, IDS system complexity was reduced by applying a unique meta-machine learning model for anomaly detection networks was developed in this paper. The five main stages of the proposed meta-model are as follows: the accumulated datasets (NSL KDD, UNSW NB15, CIC IDS17, and SCE CIC IDS18) comprise the initial stage. The second stage is preprocessing and feature selection, where preprocessing involves replacing missing values and eliminating duplicate values, leading to dimensionality minimization. The best-affected subset feature from datasets is selected using feature selection (i.e., Chi-Square). The third step is represented by the meta-model. In the training dataset, many classifiers are utilized (i.e., random forest, AdaBoosting, GradientBoost, XGBoost, CATBoost, and LightGBM). All the classifiers undergo the meta-model classifier (i.e., decision tree as the voting technique classifier) to select the best-predicted result. Finally, the classification and evaluation stage involves the experimental results of testing the meta-model on different datasets using binary-class and multi-class forms for classification. The results proved the proposed work’s high efficiency and outperformance compared to existing IDSs.https://www.mdpi.com/2079-9292/12/3/6436G wireless communicationschi-squarecybersecurityintrusion detection systemmachine learning techniquesmeta-model
spellingShingle Haider W. Oleiwi
Doaa N. Mhawi
Hamed Al-Raweshidy
A Meta-Model to Predict and Detect Malicious Activities in 6G-Structured Wireless Communication Networks
Electronics
6G wireless communications
chi-square
cybersecurity
intrusion detection system
machine learning techniques
meta-model
title A Meta-Model to Predict and Detect Malicious Activities in 6G-Structured Wireless Communication Networks
title_full A Meta-Model to Predict and Detect Malicious Activities in 6G-Structured Wireless Communication Networks
title_fullStr A Meta-Model to Predict and Detect Malicious Activities in 6G-Structured Wireless Communication Networks
title_full_unstemmed A Meta-Model to Predict and Detect Malicious Activities in 6G-Structured Wireless Communication Networks
title_short A Meta-Model to Predict and Detect Malicious Activities in 6G-Structured Wireless Communication Networks
title_sort meta model to predict and detect malicious activities in 6g structured wireless communication networks
topic 6G wireless communications
chi-square
cybersecurity
intrusion detection system
machine learning techniques
meta-model
url https://www.mdpi.com/2079-9292/12/3/643
work_keys_str_mv AT haiderwoleiwi ametamodeltopredictanddetectmaliciousactivitiesin6gstructuredwirelesscommunicationnetworks
AT doaanmhawi ametamodeltopredictanddetectmaliciousactivitiesin6gstructuredwirelesscommunicationnetworks
AT hamedalraweshidy ametamodeltopredictanddetectmaliciousactivitiesin6gstructuredwirelesscommunicationnetworks
AT haiderwoleiwi metamodeltopredictanddetectmaliciousactivitiesin6gstructuredwirelesscommunicationnetworks
AT doaanmhawi metamodeltopredictanddetectmaliciousactivitiesin6gstructuredwirelesscommunicationnetworks
AT hamedalraweshidy metamodeltopredictanddetectmaliciousactivitiesin6gstructuredwirelesscommunicationnetworks