Automated Attack and Defense Framework toward 5G Security

被引:34
|
作者
Sun, Yanbin [1 ]
Tian, Zhihong [2 ]
Li, Mohan [1 ]
Zhu, Chunsheng [3 ,4 ]
Guizani, Nadra [5 ]
机构
[1] Guangzhou Univ, Guangzhou, Peoples R China
[2] Guangzhou Univ, Cyberspace Inst Adv Technol, Guangzhou, Peoples R China
[3] Southern Univ Sci & Technol, SUSTech Inst Future Networks, Shenzhen, Peoples R China
[4] Peng Cheng Lab, PCL Res Ctr Networks & Commun, Shenzhen, Peoples R China
[5] Washington State Univ, Sch Elect Engn & Comp Sci, Pullman, WA 99164 USA
来源
IEEE NETWORK | 2020年 / 34卷 / 05期
基金
中国国家自然科学基金;
关键词
5G mobile communication; Security; Software; Physical layer; Protocols; Internet of Things; Wireless communication; WIRELESS NETWORKS;
D O I
10.1109/MNET.011.1900635
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
5G networks are currently being developed rapidly and are dedicated to connect all things of the Internet with new technologies, components and services. Due to the crucial role of 5G, as well as new architectures and designs, 5G faces a great number of security threats and demands suitable security technologies. This article proposes an automated attack and defense framework toward 5G security with the aim of providing exploratory guidance for 5G security research. We first review the security challenges of attack/defense objects from the perspective of a hierarchical structure, and then propose a hierarchical security model that supports both single-layer security and cross-layer security. According to the hierarchical model, an automated attack and defense framework based on a security knowledge graph is proposed for both known and unknown security threats of 5G and provides possible directions toward 5G security automation.
引用
收藏
页码:247 / 253
页数:7
相关论文
共 50 条
  • [31] ASTRA-5G: Automated Over-the-Air Security Testing and Research Architecture for 5G SA Devices
    Khandker, Syed
    Guerra, Michele
    Bitsikas, Evangelos
    Jover, Roger Piqueras
    Ranganathan, Aanjhan
    Popper, Christina
    PROCEEDINGS OF THE 17TH ACM CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS, WISEC 2024, 2024, : 89 - 100
  • [32] Security policies definition and enforcement utilizing policy control function framework in 5G
    Gomez, German Peinado
    Batalla, Jordi Mongay
    Miche, Yoan
    Holtmanns, Silke
    Mavromoustakis, Constandinos X.
    Mastorakis, George
    Haider, Noman
    COMPUTER COMMUNICATIONS, 2021, 172 : 226 - 237
  • [33] Elevating 5G Network Security: A Profound Examination of Federated Learning Aggregation Strategies for Attack Detection
    Makris, Ioannis
    Ntampakis, Nikolaos
    Lagkas, Thomas
    Radoglou-Grammatikis, Panagiotis
    Goudos, Sotirios K.
    Argyriou, Vasileios
    Fountoukidis, Eleftherios
    Skarmeta, Antonio F.
    Saura, Pablo Fernandez
    Sarigianndis, Panagiotis
    2023 IEEE FUTURE NETWORKS WORLD FORUM, FNWF, 2024,
  • [34] When Agile Security Meets 5G
    Carvalho, Glaucio H. S.
    Woungang, Isaac
    Anpalagan, Alagan
    Traore, Issa
    IEEE ACCESS, 2020, 8 (08): : 166212 - 166225
  • [35] Machine Learning Threatens 5G Security
    Suomalainen, Jani
    Juhola, Arto
    Shahabuddin, Shahriar
    Mammela, Aarne
    Ahmad, Ijaz
    IEEE ACCESS, 2020, 8 : 190822 - 190842
  • [36] Overview on the security in 5G phase 2
    Henda N.B.
    Journal of ICT Standardization, 2019, 8 (01): : 1 - 14
  • [37] 5G: Interconnection of Services and Security Approaches
    Amgoune, Hafida
    Mazri, Tomader
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON SMART CITY APPLICATIONS (SCA'18), 2018,
  • [38] Security Trust Zone in 5G Networks
    Han, Bin
    Wong, Stan
    Mannweiler, Christian
    Dohler, Mischa
    Schotten, Hans D.
    PROCEEDINGS OF THE 24TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS (ICT 2017), 2017,
  • [39] 5G Network Slicing: A Security Overview
    Olimid, Ruxandra F.
    Nencioni, Gianfranco
    IEEE ACCESS, 2020, 8 : 99999 - 100009
  • [40] Use of 5G networks in security technologies
    Dostalova, Petra
    Hromada, Martin
    PRZEGLAD ELEKTROTECHNICZNY, 2023, 99 (08): : 87 - 91