Autonomic protection of multi-tenant 5G mobile networks against UDP flooding DDoS attacks

被引:18
|
作者
Mamolar, Ana Serrano [1 ]
Salva-Garcia, Pablo [2 ]
Chirivella-Perez, Enrique [3 ]
Pervez, Zeeshan [3 ]
Calero, Jose M. Alcaraz [3 ]
Wang, Qi [3 ]
机构
[1] Univ West Scotland, H2020 5G PPP Phase 1 SELFNET Project, Glasgow, Lanark, Scotland
[2] Univ West Scotland, H2020 5G PPP Phase 2 SELFNET Project, Glasgow, Lanark, Scotland
[3] Univ West Scotland, Glasgow, Lanark, Scotland
基金
欧盟地平线“2020”;
关键词
Self-managed networks; Autonomic control loop; 5G network; DDoS attack; Multi-tenancy; Self-protection; DEFENSE;
D O I
10.1016/j.jnca.2019.102416
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
There is a lack of effective security solutions that autonomously, without any human intervention, detect and mitigate DDoS cyber-attacks. The lack is exacerbated when the network to be protected is a 5G mobile network. 5G networks push multi-tenancy to the edge of the network. Both the 5G user mobility and multi-tenancy are challenges to be addressed by current security solutions. These challenges lead to an insufficient protection of 5G users, tenants and infrastructures. This research proposes a novel autonomic security system, including the design, implementation and empirical validation to demonstrate the efficient protection of the network against Distributed Denial of Service (DDoS) attacks by applying countermeasures decided on and taken by an autonomic system, instead of a human. The self-management architecture provides support for all the different phases involved in a DDoS attack, from the detection of an attack to its final mitigation, through making the appropriate autonomous decisions and enforcing actions. Empirical experiments have been performed to protect a 5G multi-tenant infrastructure against a User Datagram Protocol (UDP) flooding attack, as an example of an attack to validate the design and prototype of the proposed architecture. Scalability results show self-protection against DDoS attacks, without human intervention, in around one second for an attack of 256 simultaneous attackers with 100 Mbps bandwidth per attacker. Furthermore, results demonstrate the proposed approach is flow-, user- and tenant-aware, which allows applying different protection strategies within the infrastructure.
引用
收藏
页数:12
相关论文
共 50 条
  • [31] Preventing Cross Network Slice Disruptions in a Zero-Trust and Multi-Tenant Future 5G Networks
    Vittal, Shwetha
    Dixit, Unnati
    Sovitkar, Siddhesh Pratim
    Sowjanya, K.
    Franklin, Antony A.
    2023 IEEE 9TH INTERNATIONAL CONFERENCE ON NETWORK SOFTWARIZATION, NETSOFT, 2023, : 227 - 231
  • [32] 5G-PICTURE: A Programmable Multi-tenant 5G Compute-RAN-Transport Infrastructure
    Camps-Mur, Daniel
    Katsalis, Kostas
    Freire, Igor
    Gutierrez, Jesus
    Makris, Nikos
    Pontarelli, Salvatore
    Schmidt, Robert
    2019 EUROPEAN CONFERENCE ON NETWORKS AND COMMUNICATIONS (EUCNC), 2019, : 469 - 474
  • [33] Reinforcement Learning-Based Slice Isolation Against DDoS Attacks in Beyond 5G Networks
    Javadpour, Amir
    Ja'fari, Forough
    Taleb, Tarik
    Benzaid, Chafika
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2023, 20 (03): : 3930 - 3946
  • [34] Attacks Against Mobility Prediction in 5G Networks
    Al Atiiq, Syafiq
    Yuan, Yachao
    Gehrmann, Christian
    Sternby, Jakob
    Barriga, Luis
    2023 IEEE 22ND INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, BIGDATASE, CSE, EUC, ISCI 2023, 2024, : 1502 - 1511
  • [35] Online Orchestration of Cooperative Defense against DDoS Attacks for 5G MEC
    Li, Hongjia
    Wang, Liming
    2018 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2018,
  • [36] Attacks Against Mobility Prediction in 5G Networks
    Atiiq, Syafiq Al
    Yuan, Yachao
    Gehrmann, Christian
    Sternby, Jakob
    Barriga, Luis
    Proceedings - 2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom/BigDataSE/CSE/EUC/iSCI 2023, 2023, : 1502 - 1511
  • [37] Deep Learning-based Approach for DDoS Attacks Detection and Mitigation in 5G and Beyond Mobile Networks
    Bousalem, Badre
    Silva, Vinicius F.
    Langar, Rami
    Cherrier, Sylvain
    PROCEEDINGS OF THE 2022 IEEE 8TH INTERNATIONAL CONFERENCE ON NETWORK SOFTWARIZATION (NETSOFT 2022): NETWORK SOFTWARIZATION COMING OF AGE: NEW CHALLENGES AND OPPORTUNITIES, 2022, : 228 - 230
  • [38] 5G RAN resource slicing with flexible functional splits over multi-tenant environment
    Dalgitsis, Michail
    Vardakas, John S.
    Verikoukis, Christos
    2021 IEEE 26TH INTERNATIONAL WORKSHOP ON COMPUTER AIDED MODELING AND DESIGN OF COMMUNICATION LINKS AND NETWORKS (CAMAD), 2021,
  • [39] Attacks against Machine Learning Models in 5G Networks
    Zolotukhin, Mikhail
    Zhang, Di
    Miraghaie, Parsa
    Hamalainen, Timo
    Ke, Wang
    Dunderfelt, Marja
    2022 6TH EUROPEAN CONFERENCE ON ELECTRICAL ENGINEERING & COMPUTER SCIENCE, ELECS, 2022, : 106 - 114
  • [40] SliceNetVSwitch: Definition, Design and Implementation of 5G Multi-Tenant Network Slicing in Software Data Paths
    Matencio-Escolar, Antonio
    Wang, Qi
    Calero, Jose M. Alcaraz
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2020, 17 (04): : 2212 - 2225