Support Vector Machine (SVM) to Predict Risk Factors in the 6G Cyber Digital Transformation Process of Enterprises

Yizhou Zhao,Caishuang Hu,Rukai Wang
DOI: https://doi.org/10.1007/s11277-024-11020-7
IF: 2.017
2024-04-27
Wireless Personal Communications
Abstract:The digital transformation process in 6G technology involves more complex challenges, particularly ensuring protection in rapid technological development. Digitalization of enterprise makes vulnerable to cyber threats. Traditional methods in this field still make it difficult to handle the challenges of new evolving threats. Without detecting the threats accurately, the entire system is obtaining failed results, loss of data, and data misbehaviours normally happen. Particularly in the enterprise, most of the confidential big data are transformed with enormous complexity. The proposed study introduces a novel approach to (Deep CFS-RF) Deep Neural Network Correlation Feature Selection (CFS) and Random Forest (RF) techniques. The proposed technology combines the excess strength of (the SVM) Support vector machine to analyse and warn the entire system towards risk factors in the enterprise's 6G cyber digital transformation process. Using the benefits of these techniques, we effectively analyse and address the cybersecurity risks in the 6G cyber landscape. This proposed methodological framework is designed to adapt to the dynamic nature of cyber threats and alert the enterprise to identify and detect risk possibilities carefully. This method also offers a practical and effective means of analysing and addressing risks and also safely enhances the enterprise's overall data management. The proposed method is evaluated using the relevant datasets of CICDDOS2019, CICIDS2017, UNSWNB2015 and NSL KDD, which are rich in cybersecurity records and obtain excellent performance results, which are discussed in the further section of the study. The effectiveness of the proposed DeepCFS-RF model offers valuable insights for firms seeking to protect their virtual transformation tasks against cyber threats.
telecommunications
What problem does this paper attempt to address?