• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

基于集成粒子群优化器的门控循环单元驱动生成对抗网络的5G 软件定义网络中的高速威胁检测

High-speed threat detection in 5G SDN with particle swarm optimizer integrated GRU-driven generative adversarial network.

作者信息

Shameli R, Rajkumar Sujatha

机构信息

School of Electronics Engineering, Vellore Institute of Technology, Vellore, India.

出版信息

Sci Rep. 2025 Mar 23;15(1):10025. doi: 10.1038/s41598-025-95011-z.

DOI:10.1038/s41598-025-95011-z
PMID:40122918
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC11930995/
Abstract

Detecting attacks in 5G software-defined network (SDN) environments requires a comprehensive approach that leverages traditional security measures, such as firewalls, intrusion prevention systems, and specialized techniques personalized to the unique characteristics of a 5G network. The attack detection in 5G SDN involves Machine learning (ML) and Deep learning (DL) algorithms to analyze large volumes of network data and identify patterns indicative of attacks. The study's main objective is to develop an efficient DL model to improve the detection performance and respond to security breaches effectively in a 5G SDN environment. The DL model integrates the Particle Swarm Optimizer-Gated Recurrent Unit Layer-Generative Adversarial Network-Intrusion Detection System classifier (PSO-GRUGAN-IDS). The PSO optimizes the network weight of the GAN model to improve the backpropagation while generating the synthetic data (attack data) in the generator model using GRU. The discriminator model uses the PSO-optimized generator model to produce synthetic and real attack data to forecast the attack. Finally, a deep classification (IDS) model is trained using a GRU network with a GAN model-produced attack data and real data to classify whether the SDN traffic is malicious or normal. Moreover, the performance of this model is evaluated using the InSDN dataset and compared with existing DL model-based intrusion detection approaches and the results demonstrate a significantly higher accuracy rate of 98.4%, precision rate of 98%, recall rate of 98.5%, less detection time of 2.464 s, lesser Log loss rate of 1.0 and more metrics instilling confidence in the effectiveness of the proposed method.

摘要

在5G软件定义网络(SDN)环境中检测攻击需要一种综合方法,该方法利用传统安全措施,如防火墙、入侵防御系统,以及针对5G网络独特特性定制的专门技术。5G SDN中的攻击检测涉及机器学习(ML)和深度学习(DL)算法,以分析大量网络数据并识别表明攻击的模式。该研究的主要目标是开发一种高效的DL模型,以提高检测性能并在5G SDN环境中有效应对安全漏洞。该DL模型集成了粒子群优化器-门控循环单元层-生成对抗网络-入侵检测系统分类器(PSO-GRUGAN-IDS)。PSO优化GAN模型的网络权重,以在使用GRU在生成器模型中生成合成数据(攻击数据)时改进反向传播。判别器模型使用PSO优化的生成器模型来生成合成和真实攻击数据以预测攻击。最后,使用带有GAN模型生成的攻击数据和真实数据的GRU网络训练深度分类(IDS)模型,以对SDN流量是恶意还是正常进行分类。此外,使用InSDN数据集评估该模型的性能,并与现有的基于DL模型的入侵检测方法进行比较,结果表明其准确率显著更高,为98.4%,精确率为98%,召回率为98.5%,检测时间更短,为2.464秒,对数损失率更低,为 1.0,更多指标让人对所提方法的有效性充满信心。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/510b/11930995/a9629e1811b5/41598_2025_95011_Fig12_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/510b/11930995/af09e1f2bd9a/41598_2025_95011_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/510b/11930995/de7def87b774/41598_2025_95011_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/510b/11930995/988e85083cf8/41598_2025_95011_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/510b/11930995/965deea6f666/41598_2025_95011_Figa_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/510b/11930995/4c62be9f4826/41598_2025_95011_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/510b/11930995/ce67cbfd441b/41598_2025_95011_Figb_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/510b/11930995/7433d0a0fc97/41598_2025_95011_Figc_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/510b/11930995/acb79b100b9a/41598_2025_95011_Figd_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/510b/11930995/f326adf735d7/41598_2025_95011_Fige_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/510b/11930995/96acedfd9a26/41598_2025_95011_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/510b/11930995/194d6ebfaaf4/41598_2025_95011_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/510b/11930995/4b520beddb12/41598_2025_95011_Fig7_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/510b/11930995/4c4a3939bacd/41598_2025_95011_Fig8_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/510b/11930995/17370dc1d67e/41598_2025_95011_Fig9_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/510b/11930995/98880558d6fc/41598_2025_95011_Fig10_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/510b/11930995/1fd1970c4af2/41598_2025_95011_Fig11_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/510b/11930995/a9629e1811b5/41598_2025_95011_Fig12_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/510b/11930995/af09e1f2bd9a/41598_2025_95011_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/510b/11930995/de7def87b774/41598_2025_95011_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/510b/11930995/988e85083cf8/41598_2025_95011_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/510b/11930995/965deea6f666/41598_2025_95011_Figa_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/510b/11930995/4c62be9f4826/41598_2025_95011_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/510b/11930995/ce67cbfd441b/41598_2025_95011_Figb_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/510b/11930995/7433d0a0fc97/41598_2025_95011_Figc_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/510b/11930995/acb79b100b9a/41598_2025_95011_Figd_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/510b/11930995/f326adf735d7/41598_2025_95011_Fige_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/510b/11930995/96acedfd9a26/41598_2025_95011_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/510b/11930995/194d6ebfaaf4/41598_2025_95011_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/510b/11930995/4b520beddb12/41598_2025_95011_Fig7_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/510b/11930995/4c4a3939bacd/41598_2025_95011_Fig8_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/510b/11930995/17370dc1d67e/41598_2025_95011_Fig9_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/510b/11930995/98880558d6fc/41598_2025_95011_Fig10_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/510b/11930995/1fd1970c4af2/41598_2025_95011_Fig11_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/510b/11930995/a9629e1811b5/41598_2025_95011_Fig12_HTML.jpg

相似文献

1
High-speed threat detection in 5G SDN with particle swarm optimizer integrated GRU-driven generative adversarial network.基于集成粒子群优化器的门控循环单元驱动生成对抗网络的5G 软件定义网络中的高速威胁检测
Sci Rep. 2025 Mar 23;15(1):10025. doi: 10.1038/s41598-025-95011-z.
2
Enhancing Security in 5G Edge Networks: Predicting Real-Time Zero Trust Attacks Using Machine Learning in SDN Environments.增强5G边缘网络的安全性:在软件定义网络(SDN)环境中使用机器学习预测实时零信任攻击
Sensors (Basel). 2025 Mar 19;25(6):1905. doi: 10.3390/s25061905.
3
Development of a Machine-Learning Intrusion Detection System and Testing of Its Performance Using a Generative Adversarial Network.开发机器学习入侵检测系统并使用生成对抗网络测试其性能。
Sensors (Basel). 2023 Jan 24;23(3):1315. doi: 10.3390/s23031315.
4
Traffic Feature Selection and Distributed Denial of Service Attack Detection in Software-Defined Networks Based on Machine Learning.基于机器学习的软件定义网络中的流量特征选择与分布式拒绝服务攻击检测
Sensors (Basel). 2024 Jul 4;24(13):4344. doi: 10.3390/s24134344.
5
SGAN-IDS: Self-Attention-Based Generative Adversarial Network against Intrusion Detection Systems.SGAN-IDS:基于自注意力机制的对抗入侵检测系统的生成对抗网络。
Sensors (Basel). 2023 Sep 11;23(18):7796. doi: 10.3390/s23187796.
6
DRL-GAN: A Hybrid Approach for Binary and Multiclass Network Intrusion Detection.深度强化学习生成对抗网络(DRL-GAN):一种用于二进制和多类网络入侵检测的混合方法。
Sensors (Basel). 2024 Apr 25;24(9):2746. doi: 10.3390/s24092746.
7
Intrusion detection in software defined network using deep learning approaches.使用深度学习方法的软件定义网络中的入侵检测
Sci Rep. 2024 Nov 25;14(1):29159. doi: 10.1038/s41598-024-79001-1.
8
Explainable Security in SDN-Based IoT Networks.基于 SDN 的物联网网络中的可解释安全。
Sensors (Basel). 2020 Dec 20;20(24):7326. doi: 10.3390/s20247326.
9
Metaparameter optimized hybrid deep learning model for next generation cybersecurity in software defined networking environment.用于软件定义网络环境中下一代网络安全的元参数优化混合深度学习模型
Sci Rep. 2025 Apr 23;15(1):14166. doi: 10.1038/s41598-025-96153-w.
10
Adversarial attacks against supervised machine learning based network intrusion detection systems.对抗攻击对基于监督机器学习的网络入侵检测系统的影响。
PLoS One. 2022 Oct 14;17(10):e0275971. doi: 10.1371/journal.pone.0275971. eCollection 2022.

本文引用的文献

1
Reflective Distributed Denial of Service Detection: A Novel Model Utilizing Binary Particle Swarm Optimization-Simulated Annealing for Feature Selection and Gray Wolf Optimization-Optimized LightGBM Algorithm.反射式分布式拒绝服务检测:一种利用二进制粒子群优化-模拟退火进行特征选择以及灰狼优化-优化的LightGBM算法的新型模型
Sensors (Basel). 2024 Sep 24;24(19):6179. doi: 10.3390/s24196179.