4.8 Article

Zero-Touch Security Management for mMTC Network Slices: DDoS Attack Detection and Mitigation

Journal

IEEE INTERNET OF THINGS JOURNAL
Volume 10, Issue 9, Pages 7800-7812

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JIOT.2022.3230875

Keywords

5G mobile communication; Internet of Things; Denial-of-service attack; Computer crime; Network slicing; Security management; Performance evaluation; 5G; denial of service; machine learning (ML); network slicing; security; zero-touch service management (ZSM)

Ask authors/readers for more resources

Massive machine-type communications (mMTCs) network slices in 5G bring the risk of widened attack surface, especially in terms of in-slice attacks on shared infrastructure components. This article proposes a zero-touch security management solution that utilizes machine learning to detect and mitigate Distributed Denial-of-Service (DDoS) attacks on the 5G core network (CN) components.
Massive machine-type communications (mMTCs) network slices in 5G aim to connect a massive number of MTC devices, opening the door for a widened attack surface. Network slices are well isolated, resulting in a low impact on other running slices when attackers control IoT devices belonging to an mMTC network slice (i.e., in-slice attack). However, the impact of the in-slice attacks on the shared infrastructure components with other slices, such as the 5G core network (CN), can be harmful, considering the massive number that can be part of mMTC slice. In this article, we propose a zero-touch security management solution that uses machine learning (ML) to detect and mitigate in-slice attacks on 5G CN components, focusing on Distributed Denial-of-Service (DDoS) attacks. To this aim, we propose: 1) a novel closed-control loop that assists the 5G CN in detecting and mitigating attacks; 2) an ML algorithm that predicts the upper bound of expected MTC devices Attach Requests during a time interval (or an event); 3) a detection algorithm that analyzes an event and uses the ML output to compute a probability that a specific device has participated to an attack; 4) a mitigation algorithm that disconnects and blocks MTC devices suspected to be part of an attack; and (5) a proof-of-concept implementation on top of a 5G facility.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.8
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available