Bruno Dzogovic, Bernardo Santos, Ismail Hassan, Boning Feng, V. T. Do, Niels Jacot, Thanh van Do
{"title":"基于网络服务网格和IPv6分段路由的动态5G网络切片零信任网络安全方法","authors":"Bruno Dzogovic, Bernardo Santos, Ismail Hassan, Boning Feng, V. T. Do, Niels Jacot, Thanh van Do","doi":"10.1109/DAS54948.2022.9786074","DOIUrl":null,"url":null,"abstract":"As the 5G mobile networks become widely adopted across various industries and verticals, additional requirements for strengthening their security emerge. Traditional security approaches have been successful in preventing adversarial activities across generic networks and datacenters, but the complexity and extent of the 5G communication systems renders these insufficient. Therein the need for a stringent tactic to ensure the reduction of the attack surface within the 5G core networks. This paper examines the potential threat of Distributed Denial of Service (DDoS) and specifically, flooding attacks that can wreak havoc on the 5G mobile infrastructure as well as design a solution according to the zero-trust security model to ensure the continuity of the service in corresponding disaster scenarios.","PeriodicalId":245984,"journal":{"name":"2022 International Conference on Development and Application Systems (DAS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Zero-Trust Cybersecurity Approach for Dynamic 5G Network Slicing with Network Service Mesh and Segment-Routing over IPv6\",\"authors\":\"Bruno Dzogovic, Bernardo Santos, Ismail Hassan, Boning Feng, V. T. Do, Niels Jacot, Thanh van Do\",\"doi\":\"10.1109/DAS54948.2022.9786074\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"As the 5G mobile networks become widely adopted across various industries and verticals, additional requirements for strengthening their security emerge. Traditional security approaches have been successful in preventing adversarial activities across generic networks and datacenters, but the complexity and extent of the 5G communication systems renders these insufficient. Therein the need for a stringent tactic to ensure the reduction of the attack surface within the 5G core networks. This paper examines the potential threat of Distributed Denial of Service (DDoS) and specifically, flooding attacks that can wreak havoc on the 5G mobile infrastructure as well as design a solution according to the zero-trust security model to ensure the continuity of the service in corresponding disaster scenarios.\",\"PeriodicalId\":245984,\"journal\":{\"name\":\"2022 International Conference on Development and Application Systems (DAS)\",\"volume\":\"16 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-05-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 International Conference on Development and Application Systems (DAS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/DAS54948.2022.9786074\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Conference on Development and Application Systems (DAS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/DAS54948.2022.9786074","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Zero-Trust Cybersecurity Approach for Dynamic 5G Network Slicing with Network Service Mesh and Segment-Routing over IPv6
As the 5G mobile networks become widely adopted across various industries and verticals, additional requirements for strengthening their security emerge. Traditional security approaches have been successful in preventing adversarial activities across generic networks and datacenters, but the complexity and extent of the 5G communication systems renders these insufficient. Therein the need for a stringent tactic to ensure the reduction of the attack surface within the 5G core networks. This paper examines the potential threat of Distributed Denial of Service (DDoS) and specifically, flooding attacks that can wreak havoc on the 5G mobile infrastructure as well as design a solution according to the zero-trust security model to ensure the continuity of the service in corresponding disaster scenarios.