Quarantining Malicious IoT Devices in Intelligent Sliced Mobile Networks

被引:4
作者
Candal-Ventureira, David [1 ]
Fondo-Ferreiro, Pablo [1 ]
Gil-Castineira, Felipe [1 ]
Javier Gonzalez-Castano, Francisco [1 ]
机构
[1] Univ Vigo, AtlanTTic Res Ctr Telecommun Technol, Informat Technol Grp, Vigo 36310, Spain
关键词
internet of things; 5G; network slicing; malware; denial of service; SOFTWARE-DEFINED NETWORKING; 5G MOBILE; ARCHITECTURES; SDN;
D O I
10.3390/s20185054
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
The unstoppable adoption of the Internet of Things (IoT) is driven by the deployment of new services that require continuous capture of information from huge populations of sensors, or actuating over a myriad of "smart" objects. Accordingly, next generation networks are being designed to support such massive numbers of devices and connections. For example, the 3rd Generation Partnership Project (3GPP) is designing the different 5G releases specifically with IoT in mind. Nevertheless, from a security perspective this scenario is a potential nightmare: the attack surface becomes wider and many IoT nodes do not have enough resources to support advanced security protocols. In fact, security is rarely a priority in their design. Thus, including network-level mechanisms for preventing attacks from malware-infected IoT devices is mandatory to avert further damage. In this paper, we propose a novel Software-Defined Networking (SDN)-based architecture to identify suspicious nodes in 4G or 5G networks and redirect their traffic to a secondary network slice where traffic is analyzed in depth before allowing it reaching its destination. The architecture can be easily integrated in any existing deployment due to its interoperability. By following this approach, we can detect potential threats at an early stage and limit the damage by Distributed Denial of Service (DDoS) attacks originated in IoT devices.
引用
收藏
页码:1 / 18
页数:18
相关论文
共 42 条
  • [1] Ahmad Ijaz, 2018, IEEE Communications Standards Magazine, V2, P36, DOI 10.1109/MCOMSTD.2018.1700063
  • [2] [Anonymous], 2018, Annual cybersecurity report
  • [3] Apthorpe N., 2017, ARXIV201717080504
  • [4] Bagaa M., 2019, TECHNICAL REPORT
  • [5] Software-defined networking (SDN): a survey
    Benzekki, Kamal
    El Fergougui, Abdeslam
    Elalaoui, Abdelbaki Elbelrhiti
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (18) : 5803 - 5833
  • [6] Bhardwaj K., 2018, USENIX WORKSHOP HOT
  • [7] A real-time attack defense framework for 5G network slicing
    Bonfim, Michel
    Santos, Marcelo
    Dias, Kelvin
    Fernandes, Stenio
    [J]. SOFTWARE-PRACTICE & EXPERIENCE, 2020, 50 (07) : 1228 - 1257
  • [8] Candal-Ventureira D., IOT DDOS DETECTION S
  • [9] Chatras B, 2017, CONF INNOV CLOUD, P219, DOI 10.1109/ICIN.2017.7899415
  • [10] Machine Learning DDoS Detection for Consumer Internet of Things Devices
    Doshi, Rohan
    Apthorpe, Noah
    Feamster, Nick
    [J]. 2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2018), 2018, : 29 - 35