5G Core Security in Edge Networks: A Vulnerability Assessment Approach

被引:20
作者
Kholidy, Hisham A. [1 ]
Karam, Andrew [2 ]
Sidoran, James L. [3 ]
Rahman, Mohammad A. [4 ]
机构
[1] SUNY Polytech Inst, Network & Comp Secur, Utica, NY 13502 USA
[2] Air Force Res Lab AFRL, RIGB, Rome, NY USA
[3] Air Force Res Lab AFRL, RIGA, Rome, NY USA
[4] Florida Int Univ, Elect & Comp Engn, Miami, FL 33199 USA
来源
26TH IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (IEEE ISCC 2021) | 2021年
关键词
vulnerability analysis; 5G Edge security; 5G attack vector; 5G security testbed; 5G attack graphs;
D O I
10.1109/ISCC53001.2021.9631531
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The 5G technology will play a crucial role in global economic growth through numerous industrial developments. However, it is essential to ensure the security of these developed systems, while 5G brings unique security challenges. This paper contributes explicitly to the need for an effective Vulnerability Assessment Approach (VAA) to identify and assess the vulnerabilities in 5G networks in an accurate, salable, and dynamic way. The proposed approach develops an optimized mechanism based on the Technique for Order Preference by Similarity to an Ideal Solution (TOPSIS) to analyze the vulnerabilities in 5G Edge networks from the attacker perspective while considering the dynamic and scalable Edge properties. Furthermore, we introduce a cloud-based 5G Edge security testbed to test and evaluate the accuracy, scalability, and performance of the proposed VAA.
引用
收藏
页数:6
相关论文
共 42 条
[1]  
Abdulqadder I., 2018, IEEE ACCESS
[2]   Deployment of Robust Security Scheme in SDN Based 5G Network over NFV Enabled Cloud Environment [J].
Abdulqadder, Ihsan H. ;
Zou, Deqing ;
Aziz, Israa T. ;
Yuan, Bin ;
Dai, Weiqi .
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2021, 9 (02) :866-877
[3]  
Abhishek K., 2020, DISASTER MED PUBLIC, P1
[4]  
[Anonymous], 2020, 5G NETW EV AWS
[5]  
[Anonymous], POT THREAT VECT 5G I
[6]  
[Anonymous], 2012, Int. J. Cloud Comput., Serv. Archit.
[7]  
[Anonymous], 2005, ISO/IEC 27002
[8]  
[Anonymous], Metasploit Framework User Guide
[9]  
[Anonymous], 2012, NIST
[10]   A state-of the-art survey of TOPSIS applications [J].
Behzadian, Majid ;
Otaghsara, S. Khanmohammadi ;
Yazdani, Morteza ;
Ignatius, Joshua .
EXPERT SYSTEMS WITH APPLICATIONS, 2012, 39 (17) :13051-13069