eBPF: A New Approach to Cloud-Native Observability, Networking and Security for Current (5G) and Future Mobile Networks (6G and Beyond)

被引:11
|
作者
Soldani, David [1 ]
Nahi, Petrit [1 ]
Bour, Hami [1 ]
Jafarizadeh, Saber [1 ]
Soliman, Mohammed F. [1 ]
Di Giovanna, Leonardo [2 ]
Monaco, Francesco [2 ]
Ognibene, Giuseppe [2 ]
Risso, Fulvio [2 ]
机构
[1] Rakuten Mobile Inc, Setagaya Ku, Tokyo 1580094, Japan
[2] Politecn Torino, DAUIN Dept, I-10129 Turin, Italy
关键词
5G mobile communication; Cloud computing; Security; Observability; Linux; 6G mobile communication; Band-pass filters; eBPF; extended Berkeley packet filter; cloud-native observability; cloud-native security; cloud-native networking; cloud-native monitoring; 5G; 5G Advanced; 6G; Kubernetes; K8s;
D O I
10.1109/ACCESS.2023.3281480
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Modern mobile communication networks and new service applications are deployed on cloud-native platforms. Kubernetes (K8s) is the de facto distributed operating system for container orchestration, and the extended version of the Berkeley Packet Filter (eBPF)- in the Linux (and MS Windows) kernel- is fundamentally changing the approach to cloud-native networking, security, and observability. In this paper, we introduce what eBPF is, its potential for Telco cloud, and review some of the most promising pricing and billing models applied to this revolutionary operating system (OS) technology. These models include schemes based on a data source usage model or the number of eBPF agents deployed on the network, linked to specific eBPF modules. These modules encompass network observability, runtime security, and power dissipation monitoring. Next, we present our eBPF platform, named Sauron in this work, and demonstrate how eBPF allows us to write custom code and dynamically load eBPF programs into the kernel. These programs enable us to estimate the energy consumption of cloud-native functions, derive performance counters and gauges for transport networks, 5G applications, and non-access stratum protocols. Additionally, we can detect and respond to unauthorized access to cloud-native resources in real-time using eBPF. Our experimental results demonstrate the technical feasibility of eBPF in achieving highly performant monitoring, observability, and security tooling for current mobile networks (5G, 5G Advanced) as well as future networks (6G and beyond).
引用
收藏
页码:57174 / 57202
页数:29
相关论文
共 50 条
  • [31] Machine Learning based Performance Prediction for Cloud-native 5G Mobile Core Network
    Hirai, Shiku
    Baba, Hiroki
    Matsumoto, Minoru
    Hamano, Takafumi
    Noguchi, Kento
    2022 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2022, : 1230 - 1235
  • [32] Blockchain Function Virtualization: A New Approach for Mobile Networks Beyond 5G
    Taskou, Shiva Kazemi
    Rasti, Mehdi
    Nardelli, Pedro H. J.
    IEEE NETWORK, 2022, 36 (06): : 134 - 141
  • [33] A microservice migration approach to controlling latency in 5G/6G networks
    Kaur, Kiranpreet
    Guillemin, Fabrice
    Sailhan, Francoise
    ICC 2023-IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2023, : 4912 - 4917
  • [34] Security among UPFs belonging to Different 5G/B5G/6G Networks
    Hsiao, Liang-Sheng
    Tsai, Kun-Lin
    Liu, Jung-Chun
    Leu, Fang-Yie
    Lu, Yu-Syuan
    Lin, I-Long
    INFORMATION SYSTEMS FRONTIERS, 2024,
  • [35] Evolution of Wireless Communication Networks from 5G to 6G: Future Perspective
    Alam M.S.
    Siddiqui S.T.
    Qidwai K.A.
    Aftab A.
    Kamal M.S.
    Shahi F.I.
    Radioelectronics and Communications Systems, 2023, 66 (05) : 213 - 222
  • [36] XAI-driven Model Design for Resource Utilization Forecasting in Cloud-native 6G Networks
    Liatsas, Lazaros
    Kibalya, Godfrey Mirondo
    Antonopoulos, Angelos
    2024 IEEE INTERNATIONAL MEDITERRANEAN CONFERENCE ON COMMUNICATIONS AND NETWORKING, MEDITCOM 2024, 2024, : 566 - 571
  • [37] SANCUS: Multi-layers Vulnerability Management Framework for Cloud-native 5G networks
    Zarakovitis, Charilaos
    Klonidis, Dimitrios
    Salazar, Zujany
    Prudnikova, Anna
    Bozorgchenani, Arash
    Ni, Qiang
    Klitis, Charalambos
    Guirgis, George
    Cavalli, Ana
    Sgouros, Nicholas
    Makri, Eftychia
    Lalas, Antonios
    Votis, Konstantinos
    Amponis, George
    Mallouli, Wissam
    ARES 2021: 16TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, 2021,
  • [38] Security assessment in Vehicle-to-Everything communications with the integration of 5G and 6G networks
    Khan, Shah Khalid
    Shiwakoti, Nirajan
    Stasinopoulos, Peter
    Warren, Matthew
    2021 INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND INTELLIGENT CONTROLS (ISCSIC 2021), 2021, : 154 - 158
  • [39] The 5G-EPICENTRE Approach for Decreasing Attack Surface on Cross-Testbeds Cloud-native 5G Scenarios
    Henriques, Joao
    Rosa, Luis
    Gomes, Andre
    Cordeiro, Luis
    Apostolakis, Konstantinos C.
    Margetis, George
    Constantine, Stephanidis
    Maria-Andrea, R. Anastasi
    Christos, Skoufis
    Siokis, Apostolos
    Ramantas, Kostas
    2021 IEEE INTERNATIONAL MEDITERRANEAN CONFERENCE ON COMMUNICATIONS AND NETWORKING (IEEE MEDITCOM 2021), 2021, : 7 - 12
  • [40] MECHATRON - Security Analysis of 6G and 5G Networks Using Multiaccess Edge Computing
    Berardi, Davide
    Martini, Barbara
    2024 15TH INTERNATIONAL CONFERENCE ON NETWORK OF THE FUTURE, NOF 2024, 2024, : 25 - 27