4.7 Article

Novel modeling and optimization for joint Cybersecurity-vs-QoS Intrusion Detection Mechanisms in 5G networks

期刊

COMPUTER NETWORKS
卷 237, 期 -, 页码 -

出版社

ELSEVIER
DOI: 10.1016/j.comnet.2023.110051

关键词

Cybersecurity; Intrusion detection mechanisms; Optimization

向作者/读者索取更多资源

The rapid growth of 5G technology presents new challenges for cybersecurity, particularly in ensuring the effectiveness of intrusion detection mechanisms (IDMs) and optimizing cybersecurity levels. This research focuses on pre-deployed distributed security agents (SAs) in the network, each capable of running different IDMs with varying security and quality of service (QoS) costs. By formulating a joint security and QoS utility function, the study identifies optimal elasticity parameters that strike a balance between cybersecurity and QoS overhead. Simulation results demonstrate the importance of different parameters in achieving this balance.
The rapid emergence of 5G technology brings new cybersecurity challenges that hold significant implications for our economy, society, and environment. Among these challenges, ensuring the effectiveness of Intrusion Detection Mechanisms (IDMs) in monitoring networks and detecting 5G-related cyberattacks is of utmost importance. However, optimizing cybersecurity levels and selecting appropriate IDMs remain as critical and ongoing challenges. This work considers multiple pre-deployed distributed Security Agents (SAs) across the network, each capable of running various IDMs, where they differ by their effectiveness in detecting the attacks (referred to as security term) and the consumption of resources (referred to as Quality of Service (QoS) costs). We formulate a joint security and QoS utility function leveraging the Cobb-Douglas production utility function. There are several parameters that impact the joint objective problem, including the set of elasticity parameters, that reflect the importance of the two objectives. We derive an optimal set of elasticity parameters in closed form to identify the balancing point where both objectives have equal utility values. Through comprehensive simulations, we demonstrate that increasing the detection level of SAs enhances the security utility while simultaneously diminishing the QoS utility, as more computational, bandwidth, and monetary resources are utilized for IDM processing. After optimization, our mechanism can strike an effective balance between cybersecurity and QoS overhead while demonstrating the importance of different parameters in the joint problem.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据