Autonomic protection of multi-tenant 5G mobile networks against UDP flooding DDoS attacks

被引:18
|
作者
Mamolar, Ana Serrano [1 ]
Salva-Garcia, Pablo [2 ]
Chirivella-Perez, Enrique [3 ]
Pervez, Zeeshan [3 ]
Calero, Jose M. Alcaraz [3 ]
Wang, Qi [3 ]
机构
[1] Univ West Scotland, H2020 5G PPP Phase 1 SELFNET Project, Glasgow, Lanark, Scotland
[2] Univ West Scotland, H2020 5G PPP Phase 2 SELFNET Project, Glasgow, Lanark, Scotland
[3] Univ West Scotland, Glasgow, Lanark, Scotland
基金
欧盟地平线“2020”;
关键词
Self-managed networks; Autonomic control loop; 5G network; DDoS attack; Multi-tenancy; Self-protection; DEFENSE;
D O I
10.1016/j.jnca.2019.102416
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
There is a lack of effective security solutions that autonomously, without any human intervention, detect and mitigate DDoS cyber-attacks. The lack is exacerbated when the network to be protected is a 5G mobile network. 5G networks push multi-tenancy to the edge of the network. Both the 5G user mobility and multi-tenancy are challenges to be addressed by current security solutions. These challenges lead to an insufficient protection of 5G users, tenants and infrastructures. This research proposes a novel autonomic security system, including the design, implementation and empirical validation to demonstrate the efficient protection of the network against Distributed Denial of Service (DDoS) attacks by applying countermeasures decided on and taken by an autonomic system, instead of a human. The self-management architecture provides support for all the different phases involved in a DDoS attack, from the detection of an attack to its final mitigation, through making the appropriate autonomous decisions and enforcing actions. Empirical experiments have been performed to protect a 5G multi-tenant infrastructure against a User Datagram Protocol (UDP) flooding attack, as an example of an attack to validate the design and prototype of the proposed architecture. Scalability results show self-protection against DDoS attacks, without human intervention, in around one second for an attack of 256 simultaneous attackers with 100 Mbps bandwidth per attacker. Furthermore, results demonstrate the proposed approach is flow-, user- and tenant-aware, which allows applying different protection strategies within the infrastructure.
引用
收藏
页数:12
相关论文
共 50 条
  • [41] SliceNet: End-to-End Cognitive Network Slicing and Slice Management Framework in Virtualised Multi-Domain, Multi-Tenant 5G Networks
    Wang, Qi
    Alcaraz-Calero, Jose
    Weiss, Maria Barros
    Gavras, Anastasius
    Neves, Pedro Miguel
    Cale, Rui
    Bernini, Giacomo
    Carrozzo, Gino
    Ciulli, Nicola
    Celozzi, Giuseppe
    Ciriaco, Angelo
    Levin, Anna
    Lorenz, Dean
    Barabash, Katherine
    Nikaein, Navid
    Spadaro, Salvatore
    Morris, Donal
    Chochliouros, Ioannis
    Agapiou, Yiorgos
    Patachia, Cristian
    Iordache, Marius
    Oproiu, Elena
    Lomba, Cipriano
    Aleixo, Ana Cristina
    Rodrigues, Alberto
    Hallissey, Ger
    Bozakov, Zdravko
    Koutsopoulos, Konstantinos
    Walsh, Paul
    2018 13TH IEEE INTERNATIONAL SYMPOSIUM ON BROADBAND MULTIMEDIA SYSTEMS AND BROADCASTING (BMSB), 2018,
  • [42] Experimental Demonstration of Distributed Multi-tenant Cloud/Fog and Heterogeneous SDN/NFV Orchestration for 5G Services
    Vilalta, Ricard
    Mayoral, Arturo
    Casellas, Ramon
    Martinez, Ricardo
    Munoz, Raul
    2016 EUROPEAN CONFERENCE ON NETWORKS AND COMMUNICATIONS (EUCNC), 2016, : 52 - 56
  • [43] End-to-End Slicing as a Service with Computing and Communication Resource Allocation for Multi-Tenant 5G Systems
    Chien, Hsu-Tung
    Lin, Ying-Dar
    Lai, Chia-Lin
    Wang, Chien-Ting
    IEEE WIRELESS COMMUNICATIONS, 2019, 26 (05) : 104 - 112
  • [44] Multi-tenant Hybrid Slicing with Cross-layer Heterogeneous Resource Coordination in 5G Transport Network
    Guo, Qize
    Gu, Rentao
    Cen, Mingyu
    Kang, Xueyu
    Zhao, Tianyi
    Bai, Lin
    Ji, Yuefeng
    2018 OPTICAL FIBER COMMUNICATIONS CONFERENCE AND EXPOSITION (OFC), 2018,
  • [45] End-to-End Slicing With Optimized Communication and Computing Resource Allocation in Multi-Tenant 5G Systems
    Chien, Hsu-Tung
    Lin, Ying-Dar
    Lai, Chia-Lin
    Wang, Chien-Ting
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (02) : 2079 - 2091
  • [46] Application of the Learning Set for the Detection of Jamming Attacks in 5G Mobile Networks
    Kouassi, Brou Medard
    Monsan, Vincent
    Ballo, Abou Bakary
    Ayikpa, Kacoutchy Jean
    Mamadou, Diarra
    Adou, Kablan Jerome
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (06) : 715 - 723
  • [47] Multi-tenant resource sharing with equitable-priority-based performance isolation of slices for 5G cellular systems
    Yarkina, Natalia
    Correia, Luis M.
    Moltchanov, Dmitri
    Gaidamaka, Yuliya
    Samouylov, Konstantin
    COMPUTER COMMUNICATIONS, 2022, 188 : 39 - 51
  • [48] DDoS Attacks Detection and Mitigation in 5G and Beyond Networks: A Deep Learning-based Approach
    Bousalem, Badre
    Silva, Vinicius F.
    Langar, Rami
    Cherrier, Sylvain
    2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, : 1259 - 1264
  • [49] Automating Device Fingerprinting Attacks in 4G and 5G NSA Mobile Networks
    Fraunholz, Daniel
    Brunke, Dominik
    Dumanski, Lorenz
    Koenig, Hartmut
    FOUNDATIONS AND PRACTICE OF SECURITY, FPS 2022, 2023, 13877 : 192 - 207
  • [50] On Security Against Pollution Attacks in Network Coding Enabled 5G Networks
    Vasudevan, Vipindev Adat
    Tselios, Christos
    Politis, Ilias
    IEEE ACCESS, 2020, 8 : 38416 - 38437