Automated Attack and Defense Framework toward 5G Security

被引:30
|
作者
Sun, Yanbin [1 ]
Tian, Zhihong [2 ]
Li, Mohan [1 ]
Zhu, Chunsheng [3 ,4 ]
Guizani, Nadra [5 ]
机构
[1] Guangzhou Univ, Guangzhou, Peoples R China
[2] Guangzhou Univ, Cyberspace Inst Adv Technol, Guangzhou, Peoples R China
[3] Southern Univ Sci & Technol, SUSTech Inst Future Networks, Shenzhen, Peoples R China
[4] Peng Cheng Lab, PCL Res Ctr Networks & Commun, Shenzhen, Peoples R China
[5] Washington State Univ, Sch Elect Engn & Comp Sci, Pullman, WA 99164 USA
来源
IEEE NETWORK | 2020年 / 34卷 / 05期
基金
中国国家自然科学基金;
关键词
5G mobile communication; Security; Software; Physical layer; Protocols; Internet of Things; Wireless communication; WIRELESS NETWORKS;
D O I
10.1109/MNET.011.1900635
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
5G networks are currently being developed rapidly and are dedicated to connect all things of the Internet with new technologies, components and services. Due to the crucial role of 5G, as well as new architectures and designs, 5G faces a great number of security threats and demands suitable security technologies. This article proposes an automated attack and defense framework toward 5G security with the aim of providing exploratory guidance for 5G security research. We first review the security challenges of attack/defense objects from the perspective of a hierarchical structure, and then propose a hierarchical security model that supports both single-layer security and cross-layer security. According to the hierarchical model, an automated attack and defense framework based on a security knowledge graph is proposed for both known and unknown security threats of 5G and provides possible directions toward 5G security automation.
引用
下载
收藏
页码:247 / 253
页数:7
相关论文
共 50 条
  • [31] Overview of 5G security technology
    Ji, Xinsheng
    Huang, Kaizhi
    Jin, Liang
    Tang, Hongbo
    Liu, Caixia
    Zhong, Zhou
    You, Wei
    Xu, Xiaoming
    Zhao, Hua
    Wu, Jiangxing
    Yi, Ming
    SCIENCE CHINA-INFORMATION SCIENCES, 2018, 61 (08)
  • [32] 5G and Security Service Innovation
    Marukawa K.
    Kyokai Joho Imeji Zasshi/Journal of the Institute of Image Information and Television Engineers, 2020, 74 (03): : 428 - 433
  • [33] Overview of 5G security technology
    Xinsheng JI
    Kaizhi HUANG
    Liang JIN
    Hongbo TANG
    Caixia LIU
    Zhou ZHONG
    Wei YOU
    Xiaoming XU
    Hua ZHAO
    Jiangxing WU
    Ming YI
    Science China(Information Sciences), 2018, 61 (08) : 107 - 131
  • [34] A Security Architecture for 5G Networks
    Arfaoul, Ghada
    Bisson, Pascal
    Blom, Rolf
    Borgaonkar, Ravishankar
    Englund, Hakan
    Felix, Edith
    Klaedtke, Felix
    Nakarmi, Prajwol Kumar
    Naslund, Mats
    O'Hanlon, Piers
    Papay, Juri
    Suomalainen, Jani
    Surridge, Mike
    Wary, Jean-Philippe
    Zahariev, Alexander
    IEEE ACCESS, 2018, 6 : 22466 - 22479
  • [35] 5G Security Threats and Recommendations
    Bajahzar, Abdullah
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2019, 19 (11): : 82 - 90
  • [36] Security Analysis of 5G Network
    Khan, John A.
    Chowdhury, Minhaz
    2021 IEEE INTERNATIONAL CONFERENCE ON ELECTRO INFORMATION TECHNOLOGY (EIT), 2021, : 1 - 6
  • [37] The Security Aspect of 5G Fronthaul
    Wong, Marcus
    Prasad, Anand
    Soong, Anthony C. K.
    IEEE WIRELESS COMMUNICATIONS, 2022, 29 (02) : 116 - 122
  • [38] Overview of 5G security technology
    Xinsheng Ji
    Kaizhi Huang
    Liang Jin
    Hongbo Tang
    Caixia Liu
    Zhou Zhong
    Wei You
    Xiaoming Xu
    Hua Zhao
    Jiangxing Wu
    Ming Yi
    Science China Information Sciences, 2018, 61
  • [39] 5G Cyberspace Security Game
    Xu J.
    Wu H.
    Tao X.
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2020, 42 (10): : 2319 - 2329
  • [40] Attack Configuration Engine for 5G Networks
    Salazar, Zujany
    Huu Nghia Nguyen
    Mallouli, Wissam
    Cavalli, Ana R.
    de Oca, Edgardo Montes
    TESTING SOFTWARE AND SYSTEMS, ICTSS 2021, 2022, 13045 : 227 - 229