Cargando…
A Security Assessment Mechanism for Software-Defined Networking-Based Mobile Networks
Software-Defined Networking-based Mobile Networks (SDN-MNs) are considered the future of 5G mobile network architecture. With the evolving cyber-attack threat, security assessments need to be performed in the network management. Due to the distinctive features of SDN-MNs, such as their dynamic natur...
Autores principales: | , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2015
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4721806/ https://www.ncbi.nlm.nih.gov/pubmed/26694409 http://dx.doi.org/10.3390/s151229887 |
_version_ | 1782411285437087744 |
---|---|
author | Luo, Shibo Dong, Mianxiong Ota, Kaoru Wu, Jun Li, Jianhua |
author_facet | Luo, Shibo Dong, Mianxiong Ota, Kaoru Wu, Jun Li, Jianhua |
author_sort | Luo, Shibo |
collection | PubMed |
description | Software-Defined Networking-based Mobile Networks (SDN-MNs) are considered the future of 5G mobile network architecture. With the evolving cyber-attack threat, security assessments need to be performed in the network management. Due to the distinctive features of SDN-MNs, such as their dynamic nature and complexity, traditional network security assessment methodologies cannot be applied directly to SDN-MNs, and a novel security assessment methodology is needed. In this paper, an effective security assessment mechanism based on attack graphs and an Analytic Hierarchy Process (AHP) is proposed for SDN-MNs. Firstly, this paper discusses the security assessment problem of SDN-MNs and proposes a methodology using attack graphs and AHP. Secondly, to address the diversity and complexity of SDN-MNs, a novel attack graph definition and attack graph generation algorithm are proposed. In order to quantify security levels, the Node Minimal Effort (NME) is defined to quantify attack cost and derive system security levels based on NME. Thirdly, to calculate the NME of an attack graph that takes the dynamic factors of SDN-MN into consideration, we use AHP integrated with the Technique for Order Preference by Similarity to an Ideal Solution (TOPSIS) as the methodology. Finally, we offer a case study to validate the proposed methodology. The case study and evaluation show the advantages of the proposed security assessment mechanism. |
format | Online Article Text |
id | pubmed-4721806 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2015 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-47218062016-01-26 A Security Assessment Mechanism for Software-Defined Networking-Based Mobile Networks Luo, Shibo Dong, Mianxiong Ota, Kaoru Wu, Jun Li, Jianhua Sensors (Basel) Article Software-Defined Networking-based Mobile Networks (SDN-MNs) are considered the future of 5G mobile network architecture. With the evolving cyber-attack threat, security assessments need to be performed in the network management. Due to the distinctive features of SDN-MNs, such as their dynamic nature and complexity, traditional network security assessment methodologies cannot be applied directly to SDN-MNs, and a novel security assessment methodology is needed. In this paper, an effective security assessment mechanism based on attack graphs and an Analytic Hierarchy Process (AHP) is proposed for SDN-MNs. Firstly, this paper discusses the security assessment problem of SDN-MNs and proposes a methodology using attack graphs and AHP. Secondly, to address the diversity and complexity of SDN-MNs, a novel attack graph definition and attack graph generation algorithm are proposed. In order to quantify security levels, the Node Minimal Effort (NME) is defined to quantify attack cost and derive system security levels based on NME. Thirdly, to calculate the NME of an attack graph that takes the dynamic factors of SDN-MN into consideration, we use AHP integrated with the Technique for Order Preference by Similarity to an Ideal Solution (TOPSIS) as the methodology. Finally, we offer a case study to validate the proposed methodology. The case study and evaluation show the advantages of the proposed security assessment mechanism. MDPI 2015-12-17 /pmc/articles/PMC4721806/ /pubmed/26694409 http://dx.doi.org/10.3390/s151229887 Text en © 2015 by the authors; licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons by Attribution (CC-BY) license (http://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Luo, Shibo Dong, Mianxiong Ota, Kaoru Wu, Jun Li, Jianhua A Security Assessment Mechanism for Software-Defined Networking-Based Mobile Networks |
title | A Security Assessment Mechanism for Software-Defined Networking-Based Mobile Networks |
title_full | A Security Assessment Mechanism for Software-Defined Networking-Based Mobile Networks |
title_fullStr | A Security Assessment Mechanism for Software-Defined Networking-Based Mobile Networks |
title_full_unstemmed | A Security Assessment Mechanism for Software-Defined Networking-Based Mobile Networks |
title_short | A Security Assessment Mechanism for Software-Defined Networking-Based Mobile Networks |
title_sort | security assessment mechanism for software-defined networking-based mobile networks |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4721806/ https://www.ncbi.nlm.nih.gov/pubmed/26694409 http://dx.doi.org/10.3390/s151229887 |
work_keys_str_mv | AT luoshibo asecurityassessmentmechanismforsoftwaredefinednetworkingbasedmobilenetworks AT dongmianxiong asecurityassessmentmechanismforsoftwaredefinednetworkingbasedmobilenetworks AT otakaoru asecurityassessmentmechanismforsoftwaredefinednetworkingbasedmobilenetworks AT wujun asecurityassessmentmechanismforsoftwaredefinednetworkingbasedmobilenetworks AT lijianhua asecurityassessmentmechanismforsoftwaredefinednetworkingbasedmobilenetworks AT luoshibo securityassessmentmechanismforsoftwaredefinednetworkingbasedmobilenetworks AT dongmianxiong securityassessmentmechanismforsoftwaredefinednetworkingbasedmobilenetworks AT otakaoru securityassessmentmechanismforsoftwaredefinednetworkingbasedmobilenetworks AT wujun securityassessmentmechanismforsoftwaredefinednetworkingbasedmobilenetworks AT lijianhua securityassessmentmechanismforsoftwaredefinednetworkingbasedmobilenetworks |