Li Yang

and 3 more

Zero-Touch Networks (ZTNs) represent a state-of-the-art paradigm shift towards fully automated and intelligent network management, enabling the automation and intelligence required to manage the complexity, scale, and dynamic nature of next-generation (6G) networks. ZTNs leverage Artificial Intelligence (AI) and Machine Learning (ML) to enhance operational efficiency, support intelligent decision-making, and ensure effective resource allocation. However, the implementation of ZTNs is subject to security challenges that need to be resolved to achieve their full potential. In particular, two critical challenges arise: the need for human expertise in developing AI/ML-based security mechanisms, and the threat of adversarial attacks targeting AI/ML models. In this survey paper, we provide a comprehensive review of current security issues in ZTNs, emphasizing the need for advanced AI/ML-based security mechanisms that require minimal human intervention and protect AI/ML models themselves. Furthermore, we explore the potential of Automated ML (AutoML) technologies in developing robust security solutions for ZTNs. Through case studies, we illustrate practical approaches to securing ZTNs against both conventional and AI/ML-specific threats, including the development of autonomous intrusion detection systems and strategies to combat Adversarial ML (AML) attacks. The paper concludes with a discussion of the future research directions for the development of ZTN security approaches. Abstract content goes here

Mirna El Rajab

and 2 more

In the era of 5G and Beyond (5G+) networks, characterized by increased complexity and vulnerability to cyberthreats, the detection of cyberattacks within network traffic becomes more challenging. Machine Learning (ML) offers a promising solution for detecting cyberthreats. However, the constantly ever-evolving technology landscape introduces rapidly evolving attacks, requiring continuous ML model updates. Accordingly, this paper leverages the power of Automated ML (AutoML) and Digital Twin (DT) technologies to deploy an Intrusion Detection System (IDS) in resource-constrained environments, which remains effective over time. An AutoML pipeline is proposed in this paper for multi-class network attack detection, consisting of three offline and automated phases-data preprocessing, feature engineering, and model learning-and an online phase for model monitoring and updates. Additionally, a DT has been introduced to continually update and evolve the ML model in response to the dynamic nature of new attacks, emphasizing low overhead and efficient synchronization. Specifically, two data generation approaches within the DT are explored: uniform sampling based on statistical properties and generative models (such as Variational AutoEncoders (VAEs) and Generative Adversarial Networks (GANs)) using raw data. The experimental results demonstrate that uniform sampling achieves the fastest recovery, lowest overhead, and highest privacy in enhancing the multi-layer perceptron, the best-performing ML model.