Advanced Anomaly Detection in 5G Wireless Systems: A Hybrid Learning Paradigm Utilizing the AWID3 Dataset
Keywords:
5G wireless systems, anomaly detection, hybrid learning, AWID3 datasetAbstract
The rapid evolution of 5G wireless networks has introduced unprecedented capabilities alongside heightened security challenges, particularly in detecting sophisticated network anomalies. This paper proposes an advanced anomaly detection framework that leverages a hybrid learning paradigm combining supervised and unsupervised techniques to enhance detection accuracy and adaptability in 5G environments. Utilizing the AWID3 dataset as a comprehensive benchmark, the study integrates deep learning-based feature extraction with ensemble classifiers to identify known and unknown attack patterns. Extensive experiments demonstrate that the hybrid approach outperforms conventional single-method models in terms of detection rate, false positive reduction, and computational efficiency. The findings highlight the critical role of hybrid learning architectures and rich wireless intrusion datasets in fortifying next-generation communication infrastructures against evolving cyber threats.
References
Chettri L, Bera R: A comprehensive survey on Internet of Things (IoT) toward 5G wireless systems. IEEE Internet of Things Journal. 2020, 7:16-32. 10.1109/jiot.2019.2948888
Brownlee J: Introduction to Dimensionality Reduction for Machine Learning. Machine Learning Mastery, Vermont, Australia; 2020.
Islam T, Allayear SM: Capable of classifying the tuples with wireless attacks detection using machine learning. Intelligent Computing Systems. Brito-Loeza C, Martin-Gonzalez A, Castañeda-Zeman V, Safi A (ed): Springer, Cham; 2022. 1569:1-16. 10.1007/978-3-030-98457-1_1
Chatzoglou E, Kambourakis G, Kolias C, Smiliotopoulos C: Pick quality over quantity: Expert feature selection and data preprocessing for 802.11 Intrusion Detection Systems. IEEE Access. 2022, 10:64761-64784. 10.1109/access.2022.3183597
Saini R, Halder D, Baswade AM: RIDS: Real-time intrusion detection system for WPA3 enabled enterprise networks. GLOBECOM 2022 - 2022 IEEE Global Communications Conference. 2022, 43-48. 10.1109/GLOBECOM48099.2022.10001501
da Silva LM, Andreghetti VM, Romero RAF, Branco KRLJC: Analysis and identification of evil twin attack through data science techniques using AWID3 dataset. MLMI '23: Proceedings of the 6th International Conference on Machine Learning and Machine Intelligence. 2023, 128-135. 10.1145/3635638.3635665
Chatzoglou E, Kambourakis G, Smiliotopoulos C, Kolias C: Best of both worlds: Detecting application layer attacks through 802.11 and non-802.11 features. Sensors. 2022, 22:5633. 10.3390/s22155633
Chatzoglou E, Kambourakis G, Kolias C: Empirical evaluation of attacks against IEEE 802.11 enterprise networks: The AWID3 dataset. IEEE Access. 2021, 9:34188-34205. 10.1109/ACCESS.2021.3061609
Sethuraman SC, Dhamodaran S, Vijayakumar V: Intrusion detection system for detecting wireless attacks in IEEE 802.11 networks. IET Networks. 2019, 8:219-232. 10.1049/iet-net.2018.5050
Salah Z, Elsoud EA: Enhancing intrusion detection in 5G and IoT environments: A comprehensive machine learning approach leveraging AWID3 dataset [PREPRINT]. Preprints. 2023, 10.20944/preprints202307.1565.v1
Kasongo SM, Sun Y: A deep long short-term memory based classifier for wireless intrusion detection system. ICT Express. 2020, 6:98-103. 10.1016/j.icte.2019.08.004
Yang K, Ren J, Zhu Y, Zhang W: Active learning for wireless IoT intrusion detection. IEEE Wireless Communications. 2018, 25:19-25. 10.1109/MWC.2017.1800079
Čermák M, Svorenčík Š, Lipovský R, Kubovič O: KR00K - CVE-2019-15126: Serious vulnerability deep inside your Wi-Fi encryption. ESET White Paper. 2020.
Kolias C, Kambourakis G, Stavrou A, Gritzalis S: Intrusion detection in 802.11 networks: Empirical evaluation of threats and a public dataset. IEEE Communications Surveys & Tutorials. 2015, 18:184-208. 10.1109/COMST.2015.2402161
Tahsien SM, Karimipour H, Spachos P: Machine learning based solutions for security of Internet of Things (IoT): A survey. Journal of Network and Computer Applications. 2020, 161:102630. 10.1016/j.jnca.2020.102630
Khraisat A, Gondal I, Vamplew P, Kamruzzaman J: Survey of intrusion detection systems: techniques, datasets and challenges. Cybersecurity. 2019, 2:20. 10.1186/s42400-019-0038-7
Hamroun C, Fladenmuller A, Pariente M, Pujolle G: Intrusion detection in 5G and Wi-Fi networks: A survey of current methods, challenges and perspectives. IEEE Access. 2025, 13:40950-40976. 10.1109/access.2025.3546338
Singh NJ, Hoque N, Singh KR, Bhattacharyya DK: Botnet‐based IoT network traffic analysis using deep learning. Security and Privacy. 2023, 7:e355. 10.1002/spy2.355
Shukla P, Krishna CR, Patil NV: Iot traffic-based DDoS attacks detection mechanisms: A comprehensive review. The Journal of Supercomputing. 2024, 80:9986-10043. 10.1007/s11227-023-05843-7
Rani SVJ, Ioannou II, Nagaradjane P, Christophorou C, Vassiliou V, Yarramsetti H: A novel deep hierarchical machine learning approach for identification of known and unknown multiple security attacks in a D2D communications network. IEEE Access. 2023, 11:95161-95194. 10.1109/access.2023.3308036
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Dr. Aisha M. Yusuf

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors retain the copyright of their articles published in this journal. All articles are licensed under the Creative Commons Attribution 4.0 International License (CC BY 4.0). This license permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are properly cited.