TY - JOUR
T1 - Towards the transversal detection of DDoS network attacks in 5G multi-tenant overlay networks
AU - Serrano Mamolar, Ana
AU - Pervez, Zeeshan
AU - Alcaraz Calero, Jose M.
AU - Masood Khattak, Asad
PY - 2018/11
Y1 - 2018/11
N2 - Currently, there is no any effective security solution which can detect cyber-attacks against 5G networks where multitenancy and user mobility are some unique characteristics that impose significant challenges over such security solutions. This paper focuses on addressing a transversal detection system to be able to protect at the same time, infrastructures, tenants and 5G users in both edge and core network segments of the 5G multi-tenant infrastructures. A novel approach which significantly extends the capabilities of a commonly used IDS, to accurately identify attacking nodes in a 5G network, regardless of multiple network traffic encapsulations, has been proposed in this paper. The proposed approach is suitable to be deployed in almost all 5G network segments including the Mobile Edge Computing. Both architectural design and data models are described in this contribution. Empirical experiments have been carried out a realistic 5G multi-tenant infrastructures to intensively validate the design of the proposed approach regarding scalability and flexibility.
AB - Currently, there is no any effective security solution which can detect cyber-attacks against 5G networks where multitenancy and user mobility are some unique characteristics that impose significant challenges over such security solutions. This paper focuses on addressing a transversal detection system to be able to protect at the same time, infrastructures, tenants and 5G users in both edge and core network segments of the 5G multi-tenant infrastructures. A novel approach which significantly extends the capabilities of a commonly used IDS, to accurately identify attacking nodes in a 5G network, regardless of multiple network traffic encapsulations, has been proposed in this paper. The proposed approach is suitable to be deployed in almost all 5G network segments including the Mobile Edge Computing. Both architectural design and data models are described in this contribution. Empirical experiments have been carried out a realistic 5G multi-tenant infrastructures to intensively validate the design of the proposed approach regarding scalability and flexibility.
KW - DDoS attack
KW - Multi-tenant
KW - 5G network
KW - security
KW - intrusion detection system
UR - https://www.sciencedirect.com/science/article/pii/S0167404818309313?via%3Dihub
U2 - 10.1016/j.cose.2018.07.017
DO - 10.1016/j.cose.2018.07.017
M3 - Article
SN - 0167-4048
VL - 79
SP - 132
EP - 147
JO - Computers and Security
JF - Computers and Security
ER -