IDEAS home Printed from https://ideas.repec.org/a/wly/intnem/v35y2025i2ne70003.html
   My bibliography  Save this article

Network Security Threats and Defense Mechanisms for 6G Multi‐Virtual Network Scenarios

Author

Listed:
  • Yu Zhou

Abstract

The introduction of 6G networks presents substantial challenges for network security, particularly in multi‐virtual network topologies. The combination of network function virtualization (NFV) and software‐defined networking (SDN) in 6G is designed to increase scalability and flexibility; nevertheless, these advances complicate network security management. The goal is to identify risks to network security and develop defense solutions for 6G multi‐virtual network situations. SDN's virtualized network functions (VNFs) are utilized to provide stateful firewall services that provide scalable and dynamic threat prevention. The SDN controller is critical in developing a set of rules to prevent risky network connectivity and decrease possible risks. 6G multi‐virtual network domains—attacking threats that involve different socket addresses so complex that usually applicable protection measures hardly tackle that scenario, machine learning (ML) algorithms, and Intelligent Osprey Optimized Versatile Random Forest (IOO‐VRF) model—have been proposed for potentially harmful connection detection and predicting cyber threats accessing the network. Multiple open‐access sources can be exploited to gather diverse data for collecting valuable information on studying network traffic and cyber threats. The experimental results indicate that IOO‐VRF achieved prediction accuracy comparable to that of other traditional algorithms. The proposed model is assessed on various types of metrics, including accuracy (98%), precision (97.4%), recall (94%), and F1‐score (93%). The results emphasized the importance of ML in combination with SDN and NFV for security in the case of resilient, expandable, and flexible security measures for future multi‐virtual 6G network communications networks.

Suggested Citation

  • Yu Zhou, 2025. "Network Security Threats and Defense Mechanisms for 6G Multi‐Virtual Network Scenarios," International Journal of Network Management, John Wiley & Sons, vol. 35(2), March.
  • Handle: RePEc:wly:intnem:v:35:y:2025:i:2:n:e70003
    DOI: 10.1002/nem.70003
    as

    Download full text from publisher

    File URL: https://doi.org/10.1002/nem.70003
    Download Restriction: no

    File URL: https://libkey.io/10.1002/nem.70003?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:wly:intnem:v:35:y:2025:i:2:n:e70003. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Wiley Content Delivery (email available below). General contact details of provider: https://doi.org/10.1002/(ISSN)1099-1190 .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.