Toward vulnerability assessment for 5G mobile communication networks

Shibo Luo, Jun Wu, Jianhua Li, Longhua Guo, Bei Pei

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Abstract

For 5G, Software-Defined Networking have emerged as a future mobile network architecture. It is so called Software-Defined Networking based Mobile Networks (SDN-MN). Because of the dynamic and virtual features of SDN-MN, most traditional network vulnerability assessment methodologies cannot be applied in SDN-MN directly. As a result, a new methodology of vulnerability assessment for SDN-MN is needed. In this paper, an effective vulnerability assessment mechanism is proposed for SDN-MN using attack graph algorithm and analytic hierarchy process (AHP). An optimized attack graph is given to alleviate scalability problem. In order to quantify security level, we define node minimal effort to quantify attack cost and then derive system security level. Aiming to calculate node minimal effort of attack graph in SDN-MN dynamic environment, AHP and Technique for Order Preference by Similarity to an Ideal Solution (TOPSIS) are integrated into the methodology with regard to dynamic vulnerability factors in SDN-MN. Finally, we offer a case study to validate the methodology. The case study and evaluation show the advantages of the proposed vulnerability assessment mechanism.

Original languageEnglish
Title of host publicationProceedings - 2015 IEEE International Conference on Smart City, SmartCity 2015, Held Jointly with 8th IEEE International Conference on Social Computing and Networking, SocialCom 2015, 5th IEEE International Conference on Sustainable Computing and Communications, SustainCom 2015, 2015 International Conference on Big Data Intelligence and Computing, DataCom 2015, 5th International Symposium on Cloud and Service Computing, SC2 2015
EditorsXingang Liu, Peicheng Wang, Yufeng Wang, Mianxiong Dong, Robert C. H. Hsu, Feng Xia, Yuhui Deng
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages72-76
Number of pages5
ISBN (Electronic)9781509018932
DOIs
Publication statusPublished - 2015
Externally publishedYes
EventIEEE International Conference on Smart City, SmartCity 2015 - Chengdu, China
Duration: 2015 Dec 192015 Dec 21

Publication series

NameProceedings - 2015 IEEE International Conference on Smart City, SmartCity 2015, Held Jointly with 8th IEEE International Conference on Social Computing and Networking, SocialCom 2015, 5th IEEE International Conference on Sustainable Computing and Communications, SustainCom 2015, 2015 International Conference on Big Data Intelligence and Computing, DataCom 2015, 5th International Symposium on Cloud and Service Computing, SC2 2015

Other

OtherIEEE International Conference on Smart City, SmartCity 2015
Country/TerritoryChina
CityChengdu
Period15/12/1915/12/21

Keywords

  • 5G
  • Analytic hierarchy process
  • Attack graph
  • Node minimal effort
  • Software-Defined Networking based Mobile Networks
  • Vulnerability assessment

ASJC Scopus subject areas

  • Information Systems
  • Media Technology
  • Computer Science Applications
  • Signal Processing
  • Computer Networks and Communications
  • Modelling and Simulation
  • Sociology and Political Science
  • Urban Studies

Fingerprint

Dive into the research topics of 'Toward vulnerability assessment for 5G mobile communication networks'. Together they form a unique fingerprint.

Cite this