| Literature DB >> 26694409 |
Shibo Luo1, Mianxiong Dong2, Kaoru Ota3, Jun Wu4, Jianhua Li5.
Abstract
Software-Defined Networking-based Mobile Networks (SDN-MNs) are considered the future of 5G mobile network architecture. With the evolving cyber-attack threat, security assessments need to be performed in the network management. Due to the distinctive features of SDN-MNs, such as their dynamic nature and complexity, traditional network security assessment methodologies cannot be applied directly to SDN-MNs, and a novel security assessment methodology is needed. In this paper, an effective security assessment mechanism based on attack graphs and an Analytic Hierarchy Process (AHP) is proposed for SDN-MNs. Firstly, this paper discusses the security assessment problem of SDN-MNs and proposes a methodology using attack graphs and AHP. Secondly, to address the diversity and complexity of SDN-MNs, a novel attack graph definition and attack graph generation algorithm are proposed. In order to quantify security levels, the Node Minimal Effort (NME) is defined to quantify attack cost and derive system security levels based on NME. Thirdly, to calculate the NME of an attack graph that takes the dynamic factors of SDN-MN into consideration, we use AHP integrated with the Technique for Order Preference by Similarity to an Ideal Solution (TOPSIS) as the methodology. Finally, we offer a case study to validate the proposed methodology. The case study and evaluation show the advantages of the proposed security assessment mechanism.Entities:
Keywords: 5G; analytic hierarchy process; attack graph; security assessment; software-defined networking based mobile networks
Year: 2015 PMID: 26694409 PMCID: PMC4721806 DOI: 10.3390/s151229887
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1Security attack vectors of SDNs.
Figure 2LTE network architecture.
Figure 3The MobileFlow network architecture.
Figure 4Basic idea of security assessment for SDN-MNs.
Figure 5Attack graph definition for SDNs.
Figure 6State evolution process for an attack graph.
Figure 7Hierarchical structure of security factors.
Figure 8Case of Software-Defined mobile network.
Details of vulnerabilities in case network.
| ID | Node Name | CVE# | Detail |
|---|---|---|---|
| 1 | “Administrator Workstation” module | CVE-2004-0330 | Vulnerability that allows remote users to execute arbitrary code in some Serv-U versions. |
| CVE-2004-1992 | Vulnerability that allows remote attackers to execute DoS in some Serv-U versions. | ||
| 2 | “Northbound Interface” module | CVE-2003-0533 | Stack buffer overflow in Active Directory service. |
| 3 | “Radio Interface” module | CVE-2004-0417 | Integer overflow in some CVS versions. |
| CVE-2004-0415 | Vulnerability that allows local users to access portions of kernel memory. | ||
| 4 | “Network Configuration” module | CVE-2002-0392 | Vulnerability that allows remote attackers to execute DoS and execute arbitrary codes. |
Figure 9Generated attack graph case.
AHP matrix of the criteria layer.
| 01 | 02 | 03 | |
|---|---|---|---|
| 01 | 1 | 1/3 | 1/5 |
| 02 | 3 | 1 | 1/2 |
| 03 | 5 | 2 | 1 |
No. 01 AHP matrix of the indicator layer.
| 011 | 012 | 013 | 014 | 015 | 016 | |
|---|---|---|---|---|---|---|
| 011 | 1 | 1 | 1/3 | 1/3 | 1/2 | 1/2 |
| 012 | 1 | 1 | 1/3 | 1/3 | 1/2 | 1/2 |
| 013 | 3 | 3 | 1 | 1 | 1/2 | 1/2 |
| 014 | 3 | 3 | 1 | 1 | 1/2 | 1/2 |
| 015 | 2 | 2 | 2 | 2 | 1 | 1 |
| 016 | 2 | 2 | 2 | 2 | 1 | 1 |
No. 02 AHP matrix of the indicator layer.
| 021 | 022 | 023 | |
|---|---|---|---|
| 021 | 1 | 2 | 1/2 |
| 022 | 1/2 | 1 | 1/3 |
| 023 | 2 | 3 | 1 |
No. 03 AHP matrix of the indicator layer.
| 031 | 032 | 033 | 034 | 035 | |
|---|---|---|---|---|---|
| 031 | 1 | 1/3 | 3 | 1 | 2 |
| 032 | 3 | 1 | 6 | 3 | 5 |
| 033 | 1/3 | 1/6 | 1 | 1/2 | 1 |
| 034 | 1 | 1/3 | 2 | 1 | 2 |
| 035 | 1/2 | 1/5 | 1 | 1/2 | 1 |
Decision matrix in our case.
| “Network Administrator” Scheme | “Application User” Scheme | |
|---|---|---|
| 011 | 13113511131135135111131 | 15553955155539553955515 |
| 012 | 13223522132235225221132 | 15663966156639663966615 |
| 013 | 13224622132246224622113 | 15664966156649664966615 |
| 014 | 34334633343346334633134 | 37774774377747744777437 |
| 015 | 33443643334436433643133 | 37773773377737733777337 |
| 016 | 87515511875155115511187 | 82515211825152115211182 |
| 021 | 36346841363468416841136 | 47457952474579527955247 |
| 022 | 36346841363468416841136 | 36346841363468416841136 |
| 023 | 25135631251356315631125 | 58568962585689628962258 |
| 031 | 59119911591199119911159 | 59119911591199119911159 |
| 032 | 11117111111171117111111 | 11777171117771717171111 |
| 033 | 73556353735563536353373 | 73556353735563536353373 |
| 034 | 75776573757765736573375 | 75776573757765736573375 |
| 035 | 75556553755565536553375 | 75556553755565536553375 |
Figure 10Attack cost values of actions.
Figure 11Shortest attack paths: (a) “Network Administrator” scheme; (b) “Application User” scheme.