University of Oulu

Continual federated learning for network anomaly detection in 5G Open-RAN

Saved in:
Author: Muhtasim Hossain, Fahim1
Organizations: 1University of Oulu, Faculty of Information Technology and Electrical Engineering, Communications Engineering
Format: ebook
Version: published version
Access: open
Online Access: PDF Full Text (PDF, 5.1 MB)
Pages: 58
Persistent link: http://urn.fi/URN:NBN:fi:oulu-202307042837
Language: English
Published: Oulu : F. Muhtasim Hossain, 2023
Publish Date: 2023-07-05
Thesis type: Master's thesis (tech)
Tutor: Taleb, Tarik
Benzaid, Chafika
Reviewer: Taleb, Tarik
Benzaid, Chafika
Description:

Abstract

This dissertation offers a unique federated continual learning setup for anomaly detection in the fast growing 5G Open Radio Access Network (O-RAN) environment. Conventional AI techniques frequently fall short of meeting the security automation needs of 5G networks, owing to their outstanding latency, dependability, and bandwidth demands. As a result, the thesis provides an anomaly detection system that does not only use federated learning (FL) to solve inherent privacy problems and resource constraints but also incorporates replay buffer concept in the training phase of the model to eradicate catastrophic forgetting. To allow the intended federated learning architecture, anomaly detectors are incorporated into the Near-real time RIC, while aggregation servers are installed within the Non-real time RIC. The configuration was carefully tested using the 5G NIDD Dataset, revealing a considerable boost in detection accuracy by reaching close to 99% for almost all datasets after including the continual learning process. The thesis also investigates the notion of transfer learning, in which pre-trained local models are evaluated against a hybrid Application layer DDoS dataset that includes benign samples from the CICIDS 2017 dataset and attack flows generated in proprietary SDN environment. The captured results show almost over 99% of accuracy, confirming the suggested system’s efficacy and flexibility. The study represents a significant step forward in the development of a more secure, efficient, and privacy-protecting 5G network architecture.

see all

Subjects:
Copyright information: © Fahim Muhtasim Hossain, 2023. This publication is copyrighted. You may download, display and print it for your own personal use. Commercial use is prohibited.