Autonomic protection of multi-tenant 5G mobile networks against UDP flooding DDoS attacks

被引:20
作者
Mamolar, Ana Serrano [1 ]
Salva-Garcia, Pablo [2 ]
Chirivella-Perez, Enrique [3 ]
Pervez, Zeeshan [3 ]
Calero, Jose M. Alcaraz [3 ]
Wang, Qi [3 ]
机构
[1] Univ West Scotland, H2020 5G PPP Phase 1 SELFNET Project, Glasgow, Lanark, Scotland
[2] Univ West Scotland, H2020 5G PPP Phase 2 SELFNET Project, Glasgow, Lanark, Scotland
[3] Univ West Scotland, Glasgow, Lanark, Scotland
基金
欧盟地平线“2020”;
关键词
Self-managed networks; Autonomic control loop; 5G network; DDoS attack; Multi-tenancy; Self-protection; DEFENSE;
D O I
10.1016/j.jnca.2019.102416
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
There is a lack of effective security solutions that autonomously, without any human intervention, detect and mitigate DDoS cyber-attacks. The lack is exacerbated when the network to be protected is a 5G mobile network. 5G networks push multi-tenancy to the edge of the network. Both the 5G user mobility and multi-tenancy are challenges to be addressed by current security solutions. These challenges lead to an insufficient protection of 5G users, tenants and infrastructures. This research proposes a novel autonomic security system, including the design, implementation and empirical validation to demonstrate the efficient protection of the network against Distributed Denial of Service (DDoS) attacks by applying countermeasures decided on and taken by an autonomic system, instead of a human. The self-management architecture provides support for all the different phases involved in a DDoS attack, from the detection of an attack to its final mitigation, through making the appropriate autonomous decisions and enforcing actions. Empirical experiments have been performed to protect a 5G multi-tenant infrastructure against a User Datagram Protocol (UDP) flooding attack, as an example of an attack to validate the design and prototype of the proposed architecture. Scalability results show self-protection against DDoS attacks, without human intervention, in around one second for an attack of 256 simultaneous attackers with 100 Mbps bandwidth per attacker. Furthermore, results demonstrate the proposed approach is flow-, user- and tenant-aware, which allows applying different protection strategies within the infrastructure.
引用
收藏
页数:12
相关论文
共 20 条
[1]  
Adat V, 2017, 2017 INTERNATIONAL CONFERENCE ON COMMUNICATION AND SIGNAL PROCESSING (ICCSP), P2036, DOI 10.1109/ICCSP.2017.8286761
[2]  
[Anonymous], 2016, CISC VIS NETW IND GL
[3]   Machine Learning for Cognitive Network Management [J].
Ayoubi, Sara ;
Limam, Noura ;
Salahuddin, Mohammad A. ;
Shahriar, Nashid ;
Boutaba, Raouf ;
Estrada-Solano, Felipe ;
Caicedo, Oscar M. .
IEEE COMMUNICATIONS MAGAZINE, 2018, 56 (01) :158-165
[4]  
Bhunia S. S, 2017, 2017 27 INT TEL NETW, P1
[5]  
Buragohain Chaitanya, 2016, 2016 3rd International Conference on Signal Processing and Integrated Networks (SPIN), P519, DOI 10.1109/SPIN.2016.7566750
[6]   SD-Anti-DDoS: Fast and efficient DDoS defense in software-defined networks [J].
Cui, Yunhe ;
Yan, Lianshan ;
Li, Saifei ;
Xing, Huanlai ;
Pan, Wei ;
Zhu, Jian ;
Zheng, Xiaoyang .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 68 :65-79
[7]   Combining Open Flow and sFlow for an effective and scalable anomaly detection and mitigation mechanism on SDN environments [J].
Giotis, K. ;
Argyropoulos, C. ;
Androulidakis, G. ;
Kalogeras, D. ;
Maglaris, V. .
COMPUTER NETWORKS, 2014, 62 :122-136
[8]  
Hu D., 2017, P GLOBECOM 2017 2017, P1, DOI 10.1109/GLOCOM. 2017.8254023
[9]  
Hyun D, 2017, I C INF COMM TECH CO, P834, DOI 10.1109/ICTC.2017.8190794
[10]  
Kim J, 2005, INT REAL ESTATE REV, V8, P1