2019 IEEE Conference on Communications and Network Security (CNS) 2019
DOI: 10.1109/cns.2019.8802852
|View full text |Cite
|
Sign up to set email alerts
|

Towards Secure Slicing: Using Slice Isolation to Mitigate DDoS Attacks on 5G Core Network Slices

Abstract: In this paper, we propose a solution to proactively mitigate Distributed Denial-of-Service attacks in 5G core network slicing using slice isolation. Network slicing is one of the key technologies that allow 5G networks to offer dedicated resources to different industries (services). However, a Distributed Denialof-Service attack could severely impact the performance and availability of the slices as they could share the same physical resources in a multi-tenant virtualized networking infrastructure. Slice isol… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
61
0
1

Year Published

2020
2020
2022
2022

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 95 publications
(63 citation statements)
references
References 14 publications
1
61
0
1
Order By: Relevance
“…The impact of slice-initiated attacks could have been worse if other hosted slices were using some CPU intensive applications. The results for both scenarios are consistent with our previous work [59].…”
Section: Ddos Flooding Attacksupporting
confidence: 93%
See 1 more Smart Citation
“…The impact of slice-initiated attacks could have been worse if other hosted slices were using some CPU intensive applications. The results for both scenarios are consistent with our previous work [59].…”
Section: Ddos Flooding Attacksupporting
confidence: 93%
“…The sharing of common physical resources between slices could lead to information leakage and side-channel attacks [63,64]. The side-channel attacks can be used to determine co-residency and extract valuable information (e.g., cryptographic keys [65]) from the victim slices or perform Denial-of-Service attacks [59]. Several types of side-channel attacks can be used to determine co-residency by using different shared resources such as CPU cache, main memory, and network traffic [65].…”
Section: Art Wittmannmentioning
confidence: 99%
“…We highlight here the need for authenticity and integrity verification for the network slice, to prevent fake or modified instances [16]. Specific mitigation techniques against Distributed DoS (DDoS) by slice isolation have been considered [38]. Dynamic NFV that enables ondemand security mechanisms needs still to be studied but is a good candidate for mitigating security issues at runtime [16].…”
Section: ) Run-time Phasementioning
confidence: 99%
“…They formulated an Integer Linear Programming (ILP) model and designed a heuristic algorithm to realize efficient and secure 5G core network slice provisioning. The authors in [25] used slice isolation to mitigate the impact of DDoS attacks on slice authentication and the solution was evaluated by a combination of simulation and an experimental testbed. However, the solutions proposed in [24], [25] are only suitable for core network slicing.…”
Section: B Security In Network Slicingmentioning
confidence: 99%