[HTML][HTML] Open RAN security: Challenges and opportunities

M Liyanage, A Braeken, S Shahabuddin… - Journal of Network and …, 2023 - Elsevier
Abstract Open RAN (ORAN, O-RAN) represents a novel industry-level standard for RAN
(Radio Access Network), which defines interfaces that support inter-operation between …

An asynchronous federated learning arbitration model for low-rate ddos attack detection

Z Liu, C Guo, D Liu, X Yin - IEEE Access, 2023 - ieeexplore.ieee.org
Low-rate Distributed Denial of Service (LDDoS) attacks have been one of the most notorious
network security threats, which use periodic slight multi-variate time series pulse flows to …

Reinforcement learning meets network intrusion detection: a transferable and adaptable framework for anomaly behavior identification

M He, X Wang, P Wei, L Yang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Anomaly detection plays an essential role in network security and traffic classification. Many
studies have focused on anomaly detection to improve network security, including machine …

Real-time clustering based on deep embeddings for threat detection in 6G networks

E Paolini, L Valcarenghi, L Maggiani, N Andriolli - IEEE Access, 2023 - ieeexplore.ieee.org
Trials and deployments of sixth Generation (6G) wireless networks, delivering extreme
capacity, reliability, and efficiency, are expected as early as 2030. Attempts from both …

MRFM: A timely detection method for DDoS attacks in IoT with multidimensional reconstruction and function map**

L **e, B Yuan, H Yang, Z Hu, L Jiang, L Zhang… - Computer standards & …, 2024 - Elsevier
To address the slow response time of existing detection modules to the Internet of Things
(IoT) Distributed Denial of Service (DDoS) attacks, along with their low feature differentiation …

Empowering 5G SBA security: Time series transformer for HTTP/2 anomaly detection

N Wehbe, HA Alameddine, M Pourzandi, C Assi - Computers & Security, 2025 - Elsevier
Fifth Generation (5G) networks adopt the security-by-design principle to provide highly
secure and robust services. 5G Core (5GC) uses the Hypertext Transfer Protocol version 2 …

Real-time DDoS defense in 5G-enabled IoT: a multidomain collaboration perspective

X Chen, Y Chen, W Feng, L **ao, X Li… - IEEE Internet of …, 2022 - ieeexplore.ieee.org
While 5G networks have accelerated the development of the Internet of Things (IoT), they
have also introduced a large number of vulnerable IoT devices into the network, which …

A novel methodology for anomaly detection in smart home networks via Fractional Stochastic Gradient Descent

A Bajpai, D Chaurasia, N Tiwari - Computers and Electrical Engineering, 2024 - Elsevier
With the rising integration of IoT devices within smart home environments, securing these
interconnected systems against unauthorized access and cyber threats has become …

Spotting anomalies at the edge: Outlier exposure-based cross-silo federated learning for ddos detection

V Pourahmadi, HA Alameddine… - … on Dependable and …, 2022 - ieeexplore.ieee.org
Distributed Denial-of-Service (DDoS) attacks are expected to continue plaguing service
availability in emerging networks which rely on distributed edge clouds to offer critical …

BDDTPA: Blockchain-driven deep traffic pattern analysis for enhanced security in cognitive radio ad-hoc networks

D Dansana, PK Behera, AA Darem, Z Ashraf… - IEEE …, 2023 - ieeexplore.ieee.org
Cognitive Radio Ad-hoc Networks (CRAHNs) combines characteristics of ad-hoc networks
with cognitive radios to facilitate a variety of communication scenarios. However, these …