Frontiers in Emerging Computer Science and Information Technology

  1. Home
  2. Archives
  3. Vol. 2 No. 01 (2025): Volume02 Issue01 January
  4. Articles
Frontiers in Emerging Computer Science and Information Technology

Article Details Page

Advanced Anomaly Detection in 5G Wireless Systems: A Hybrid Learning Paradigm Utilizing the AWID3 Dataset

Authors

  • Dr. Aisha M. Yusuf Department of Computer and Software Engineering, University of Pretoria, Pretoria, South Africa

Keywords:

5G wireless systems, anomaly detection, hybrid learning, AWID3 dataset

Abstract

The rapid evolution of 5G wireless networks has introduced unprecedented capabilities alongside heightened security challenges, particularly in detecting sophisticated network anomalies. This paper proposes an advanced anomaly detection framework that leverages a hybrid learning paradigm combining supervised and unsupervised techniques to enhance detection accuracy and adaptability in 5G environments. Utilizing the AWID3 dataset as a comprehensive benchmark, the study integrates deep learning-based feature extraction with ensemble classifiers to identify known and unknown attack patterns. Extensive experiments demonstrate that the hybrid approach outperforms conventional single-method models in terms of detection rate, false positive reduction, and computational efficiency. The findings highlight the critical role of hybrid learning architectures and rich wireless intrusion datasets in fortifying next-generation communication infrastructures against evolving cyber threats.

References

Chettri L, Bera R: A comprehensive survey on Internet of Things (IoT) toward 5G wireless systems. IEEE Internet of Things Journal. 2020, 7:16-32. 10.1109/jiot.2019.2948888

Brownlee J: Introduction to Dimensionality Reduction for Machine Learning. Machine Learning Mastery, Vermont, Australia; 2020.

Islam T, Allayear SM: Capable of classifying the tuples with wireless attacks detection using machine learning. Intelligent Computing Systems. Brito-Loeza C, Martin-Gonzalez A, Castañeda-Zeman V, Safi A (ed): Springer, Cham; 2022. 1569:1-16. 10.1007/978-3-030-98457-1_1

Chatzoglou E, Kambourakis G, Kolias C, Smiliotopoulos C: Pick quality over quantity: Expert feature selection and data preprocessing for 802.11 Intrusion Detection Systems. IEEE Access. 2022, 10:64761-64784. 10.1109/access.2022.3183597

Saini R, Halder D, Baswade AM: RIDS: Real-time intrusion detection system for WPA3 enabled enterprise networks. GLOBECOM 2022 - 2022 IEEE Global Communications Conference. 2022, 43-48. 10.1109/GLOBECOM48099.2022.10001501

da Silva LM, Andreghetti VM, Romero RAF, Branco KRLJC: Analysis and identification of evil twin attack through data science techniques using AWID3 dataset. MLMI '23: Proceedings of the 6th International Conference on Machine Learning and Machine Intelligence. 2023, 128-135. 10.1145/3635638.3635665

Chatzoglou E, Kambourakis G, Smiliotopoulos C, Kolias C: Best of both worlds: Detecting application layer attacks through 802.11 and non-802.11 features. Sensors. 2022, 22:5633. 10.3390/s22155633

Chatzoglou E, Kambourakis G, Kolias C: Empirical evaluation of attacks against IEEE 802.11 enterprise networks: The AWID3 dataset. IEEE Access. 2021, 9:34188-34205. 10.1109/ACCESS.2021.3061609

Sethuraman SC, Dhamodaran S, Vijayakumar V: Intrusion detection system for detecting wireless attacks in IEEE 802.11 networks. IET Networks. 2019, 8:219-232. 10.1049/iet-net.2018.5050

Salah Z, Elsoud EA: Enhancing intrusion detection in 5G and IoT environments: A comprehensive machine learning approach leveraging AWID3 dataset [PREPRINT]. Preprints. 2023, 10.20944/preprints202307.1565.v1

Kasongo SM, Sun Y: A deep long short-term memory based classifier for wireless intrusion detection system. ICT Express. 2020, 6:98-103. 10.1016/j.icte.2019.08.004

Yang K, Ren J, Zhu Y, Zhang W: Active learning for wireless IoT intrusion detection. IEEE Wireless Communications. 2018, 25:19-25. 10.1109/MWC.2017.1800079

Čermák M, Svorenčík Š, Lipovský R, Kubovič O: KR00K - CVE-2019-15126: Serious vulnerability deep inside your Wi-Fi encryption. ESET White Paper. 2020.

Kolias C, Kambourakis G, Stavrou A, Gritzalis S: Intrusion detection in 802.11 networks: Empirical evaluation of threats and a public dataset. IEEE Communications Surveys & Tutorials. 2015, 18:184-208. 10.1109/COMST.2015.2402161

Tahsien SM, Karimipour H, Spachos P: Machine learning based solutions for security of Internet of Things (IoT): A survey. Journal of Network and Computer Applications. 2020, 161:102630. 10.1016/j.jnca.2020.102630

Khraisat A, Gondal I, Vamplew P, Kamruzzaman J: Survey of intrusion detection systems: techniques, datasets and challenges. Cybersecurity. 2019, 2:20. 10.1186/s42400-019-0038-7

Hamroun C, Fladenmuller A, Pariente M, Pujolle G: Intrusion detection in 5G and Wi-Fi networks: A survey of current methods, challenges and perspectives. IEEE Access. 2025, 13:40950-40976. 10.1109/access.2025.3546338

Singh NJ, Hoque N, Singh KR, Bhattacharyya DK: Botnet‐based IoT network traffic analysis using deep learning. Security and Privacy. 2023, 7:e355. 10.1002/spy2.355

Shukla P, Krishna CR, Patil NV: Iot traffic-based DDoS attacks detection mechanisms: A comprehensive review. The Journal of Supercomputing. 2024, 80:9986-10043. 10.1007/s11227-023-05843-7

Rani SVJ, Ioannou II, Nagaradjane P, Christophorou C, Vassiliou V, Yarramsetti H: A novel deep hierarchical machine learning approach for identification of known and unknown multiple security attacks in a D2D communications network. IEEE Access. 2023, 11:95161-95194. 10.1109/access.2023.3308036

Downloads

Published

2025-01-01

How to Cite

Dr. Aisha M. Yusuf. (2025). Advanced Anomaly Detection in 5G Wireless Systems: A Hybrid Learning Paradigm Utilizing the AWID3 Dataset. Frontiers in Emerging Computer Science and Information Technology, 2(01), 8–13. Retrieved from https://irjernet.com/index.php/fecsit/article/view/97