Towards the Development of a Digital Forensic Readiness Model for 5G NFV Environments

被引:0
作者
Makura, Sheunesu [1 ]
Venter, Hein [1 ]
机构
[1] Univ Pretoria, Lynnwood Rd, ZA-0028 Pretoria, South Africa
来源
2024 IST-AFRICA CONFERENCE | 2024年
关键词
5G; digital forensics; digital forensic readiness; NFV;
D O I
10.23919/IST-Africa63983.2024.10569788
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
5G has revolutionized wireless cellular networks by providing faster speeds, higher capacity, and lower latency. Key 5G technologies include Network Functional Virtualization (NFV) and network slicing. NFV replaces dedicated network appliances with virtualized instances running on commercial off-the-shelf hardware. As the use of 5G networks becomes widespread, the utilisation of these 5G technologies, specifically NFV has created an avenue for cybercriminals to perform cyberattacks including VNF location shift and DNS amplification attacks. Investigating these attacks in 5G NFV environments requires proactive approaches such as Digital Forensic Readiness (DFR). The challenge lies in the lack of suitable forensic tools and standards for DFR in volatile 5G NFV environments, hindering the collection of Potential Digital Evidence (PDE). This paper proposes a model to enable DFR in 5G NFV environments, addressing the need for robust forensic processes amidst evolving network architectures and security threats.
引用
收藏
页数:12
相关论文
共 22 条
[1]  
Ajijola A, 2014, WOR CONGR INTERNET, P66, DOI 10.1109/WorldCIS.2014.7028169
[2]   Threats Against the Virtual Machine Environment of NFV [J].
Alnaim, Abdulrahman K. ;
Alwakeel, Ahmed M. ;
Fernandez, Eduardo B. .
2019 2ND INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS & INFORMATION SECURITY (ICCAIS), 2019,
[3]   5G network slicing using SDN and NFV: A survey of taxonomy, architectures and future challenges [J].
Barakabitze, Alcardo Alex ;
Ahmad, Arslan ;
Mijumbi, Rashid ;
Hines, Andrew .
COMPUTER NETWORKS, 2020, 167 (167)
[4]  
Dahlman E., 2018, 5G NR NEXT GENERATIO, DOI [10.1016/C2017-0-01347-2, DOI 10.1016/C2017-0-01347-2]
[5]  
Dutta Ashutosh, 2020, 2020 IEEE 3rd 5G World Forum (5GWF), P109, DOI 10.1109/5GWF49715.2020.9221122
[6]   Blockchain and artificial intelligence for 5G-enabled Internet of Things: Challenges, opportunities, and solutions [J].
Dwivedi, Ashutosh Dhar ;
Singh, Rajani ;
Kaushik, Keshav ;
Mukkamala, Raghava Rao ;
Alnumay, Waleed S. .
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2024, 35 (04)
[7]  
Ellison D, 2019, 2019 IEEE CONFERENCE ON APPLICATION, INFORMATION AND NETWORK SECURITY (AINS), P83, DOI [10.1109/ains47559.2019.8968696, 10.1109/AINS47559.2019.8968696]
[8]  
Fernandez E. B., 2019, 2 INT C COMP APPL IN, DOI [10.1109/CAIS.2019.8769449, DOI 10.1109/CAIS.2019.8769449]
[9]  
Gallagher J.C., 2019, 5 GENERATION 5G TELE
[10]   Edge Computing in 5G: A Review [J].
Hassan, Najmul ;
Yau, Kok-Lim Alvin ;
Wu, Celimuge .
IEEE ACCESS, 2019, 7 :127276-127289