• English
    • العربية
  • العربية
  • Login
  • QU
  • QU Library
  •  Home
  • Communities & Collections
View Item 
  •   Qatar University Digital Hub
  • Qatar University Institutional Repository
  • Academic
  • Faculty Contributions
  • College of Business and Economics
  • Accounting & Information Systems
  • View Item
  • Qatar University Digital Hub
  • Qatar University Institutional Repository
  • Academic
  • Faculty Contributions
  • College of Business and Economics
  • Accounting & Information Systems
  • View Item
  •      
  •  
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    5G Networks Security Mitigation Model: An ANN-ISM Hybrid Approach

    Thumbnail
    View/Open
    5G_Networks_Security_Mitigation_Model_An_ANN-ISM_Hybrid_Approach.pdf (22.29Mb)
    Date
    2025
    Author
    Khan, Rafiq Ahmad
    Khan, Habib Ullah
    Alwageed, Hathal Salamah
    Al Hashimi, Hussein
    Keshta, Ismail Mohamed
    Metadata
    Show full item record
    Abstract
    The advent of Fifth-Generation (5G) networks has introduced significant security challenges due to increased complexity and diverse use cases. Conventional threat models may fall short of addressing these emerging threats effectively. This paper presents a new security mitigation model using artificial neural network (ANN) with interpretive structure modeling (ISM) to improve the 5G network security system. The main goal of this study is to develop a 5G network security mitigation model (5GN-SMM) that leverages the predictive capabilities of ANN and the analysis of ISM to identify and mitigate security threats by providing practices in 5G networks. This model aims to improve the accuracy and effectiveness of security measures by integrating advanced computational practices with systematic modeling. Initially, a systematic evaluation of existing 5G network security threats was conducted to identify gaps and incorporate best practices into the proposed model. In the second phase, an empirical survey was conducted to identify and validate the systematic literature review (SLR) findings. In the third phase, we employed a hybrid approach integrating ANN for real-time threat detection and risk assessment and utilizing ISM to analyze the relationships between security threats and vulnerabilities, creating a structured framework for understanding their interdependencies. A case study was conducted in the last stage to test and evaluate 5GN-SMM. The given article illustrates that the proposed hybrid model of ANN-ISM shows a better understanding and management of the security threats than the conventional techniques. The component of the ANN then comes up with the potential of the security breach with improved accuracy, and the ISM framework helps in understanding the relationship and the priorities of the threats. We identified 15 security threats and 144 practices in 5G networks through SLR and empirical surveys. The identified security threats were then analyzed and categorized into 15 process areas and five levels of 5GN-SMM. The proposed model includes state-of-the-art machine learning with traditional information security paradigms to offer an integrated solution to the emerging complex security issues related to 5G. This approach enhances the capacity to detect threats and contributes to good policy enforcement and other risk-related activities to enhance safer 5G networks.
    DOI/handle
    http://dx.doi.org/10.1109/OJCOMS.2025.3529717
    http://hdl.handle.net/10576/67448
    Collections
    • Accounting & Information Systems [‎570‎ items ]

    entitlement

    Related items

    Showing items related by title, author, creator and subject.

    • Thumbnail

      Software-defined networking security: Pros and cons 

      Dabbagh, Mehiar; Hamdaoui, Bechir; Guizani, Mohsen; Rayes, Ammar ( Institute of Electrical and Electronics Engineers Inc. , 2015 , Article)
      Software-defined networking (SDN) is a new networking paradigm that decouples the forwarding and control planes, traditionally coupled with one another, while adopting a logically centralized architecture aiming to increase ...
    • Thumbnail

      Traffic Analysis Attacks on Tor: A Survey 

      Basyoni L.; Fetais N.; Erbad A.; Mohamed A.; Guizani M. ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference)
      The Tor anonymity network is one of the most popular and widely used tools to protect the privacy of online users. Tor provides defenses against multiple adversarial activities aiming to identify or trace the users. Traffic ...
    • Thumbnail

      Changing Dynamics of network security involving hacking/cracking with next generation firewalls (NGFW) 

      Vishwakarma, Alok; Wafa Waheeda, S. ( IGI Global , 2016 , Book chapter)
      With increasing number of users on the internet, risk of security and probability of vulnerable attacks are increasing day by day. For every user connected to network, security attacks like hacking and cracking are very ...

    Qatar University Digital Hub is a digital collection operated and maintained by the Qatar University Library and supported by the ITS department

    Contact Us | Send Feedback
    Contact Us | Send Feedback | QU

     

     

    Home

    Submit your QU affiliated work

    Browse

    All of Digital Hub
      Communities & Collections Publication Date Author Title Subject Type Language Publisher
    This Collection
      Publication Date Author Title Subject Type Language Publisher

    My Account

    Login

    Statistics

    View Usage Statistics

    Qatar University Digital Hub is a digital collection operated and maintained by the Qatar University Library and supported by the ITS department

    Contact Us | Send Feedback
    Contact Us | Send Feedback | QU

     

     

    Video