Next Article in Journal
Mapping Relationship Between Field and Laboratory Direct Shear Strength Indicators of Soil and Rock Layers at Shallow Depths in Arid–Hot Valley Regions
Previous Article in Journal
Many-Objective Edge Computing Server Deployment Optimization for Vehicle Road Cooperation
Previous Article in Special Issue
Exploring the Potential of Anomaly Detection Through Reasoning with Large Language Models
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
This is an early access version, the complete PDF, HTML, and XML versions will be available soon.
Article

Lightweight Multi-Class Autoencoder Model for Malicious Traffic Detection in Private 5G Networks

1
Department of Cybersecurity, Kookmin University, Seoul 02707, Republic of Korea
2
Department of Information Security, Cryptography and Mathematics, Kookmin University, Seoul 02707, Republic of Korea
*
Author to whom correspondence should be addressed.
Appl. Sci. 2025, 15(22), 12242; https://doi.org/10.3390/app152212242
Submission received: 23 October 2025 / Revised: 15 November 2025 / Accepted: 17 November 2025 / Published: 18 November 2025
(This article belongs to the Special Issue AI-Enabled Next-Generation Computing and Its Applications)

Abstract

This study proposes a lightweight autoencoder-based detection framework for the efficient detection of multi-class malicious traffic within a private 5G network slicing environment. Conventional deep learning-based detection approaches encounter difficulties in real-time processing and edge environment applications because of their significant computational complexity and resource demands. To address this issue, this study balances traffic data using slice-label-based hierarchical sampling and performs domain-specific feature grouping to reflect semantic similarity. Independent autoencoders are trained for each group, and the latent vectors from the encoder outputs are combined to be used as input for an SVM-based multi-class classifier. This structure reflects traffic differences between slices while also improving computational efficiency. Four sets of experiments were constructed to verify the model’s performance and evaluate its structural performance, resource usage efficiency, classifier generalization performance, and whether it met SLA constraints from various perspectives. As a result, the proposed Multi-AE model achieved an accuracy of 0.93, a balanced accuracy of 0.93, and an ECE of 0.03, demonstrating high stability and detection reliability. Regarding resource utilization efficiency, GPU utilization was under 7%, and the average memory usage was approximately 5.7 GB, demonstrating resource efficiency. In SLA verification, inference latency below 10 ms and a throughput of 564 samples/s were achieved based on URLLC. This study is significant in that it experimentally demonstrated a detection structure that achieves a balance of accuracy, lightweight design, and real-time performance in a 5G slicing environment.
Keywords: private 5G network; network slicing; network security; autoencoder; SLA; multi-class private 5G network; network slicing; network security; autoencoder; SLA; multi-class

Share and Cite

MDPI and ACS Style

Kim, J.; Na, S.; Kim, H. Lightweight Multi-Class Autoencoder Model for Malicious Traffic Detection in Private 5G Networks. Appl. Sci. 2025, 15, 12242. https://doi.org/10.3390/app152212242

AMA Style

Kim J, Na S, Kim H. Lightweight Multi-Class Autoencoder Model for Malicious Traffic Detection in Private 5G Networks. Applied Sciences. 2025; 15(22):12242. https://doi.org/10.3390/app152212242

Chicago/Turabian Style

Kim, Jinha, Seungjoon Na, and Hwankuk Kim. 2025. "Lightweight Multi-Class Autoencoder Model for Malicious Traffic Detection in Private 5G Networks" Applied Sciences 15, no. 22: 12242. https://doi.org/10.3390/app152212242

APA Style

Kim, J., Na, S., & Kim, H. (2025). Lightweight Multi-Class Autoencoder Model for Malicious Traffic Detection in Private 5G Networks. Applied Sciences, 15(22), 12242. https://doi.org/10.3390/app152212242

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Article metric data becomes available approximately 24 hours after publication online.
Back to TopTop