Skip to main content
Top
Published in: Mobile Networks and Applications 6/2019

28-10-2019

SDNFV Based Threat Monitoring and Security Framework for Multi-Access Edge Computing Infrastructure

Published in: Mobile Networks and Applications | Issue 6/2019

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

DDoS botnet attacks such as Advanced Persistent & Ransom DoS assaults, Botnets and Application DDoS flood attacks are examples of multi-vector, sophisticated application-layer attacks. Conventional IT security approaches are centralized and have limitations in terms of scale, network-wide monitoring and resources for distributed detection. This paper proposes a newer approach that integrates multi-layer cooperative security intelligence on to a converged Software-Defined-Networking/Network-Function-Virtualization architecture in typical Multi-access Edge Computing (MEC) scenario. The key features of framework include: a) distributed lightweight real-time DDoS Threat Analytics and Response Framework (DTARS), to identify DDoS/botnets closer to the source of attacks b) behavioral monitoring and profiling functions in data plane and validation of control plane operations, c) advanced correlation, signature, and anomaly detection techniques, d) real-time threat analytics system e) scalable and agile mitigation mechanisms based on a stateful-data plane and security-aware SDN stack. We evaluate the performance of DTARS framework within three practical MEC case studies: SDN enabled Mobile LTE MEC network, SDN enabled IoT MEC network and Software-Defined Datacenter Edge network. In comparison to legacy MEC network, DTARS incurs about 60% less overhead than the Legacy LTE and 40% lesser than a prior OVS SDN based MEC-LTE solution, detection speed that was about 10x faster, detection accuracy of about 96% at different attack intensities and improves the overall end-to-end connection management performance under rapid scaling of end users.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Show more products
Literature
5.
go back to reference McKeown N, Anderson T, Balakrishnan H, Parulkar G, Peterson L, Rexford J, Shenker S, Turner J (2008) OpenFlow: Enabling Innovation in Campus Networks. SIGCOMM Comput Commun Rev McKeown N, Anderson T, Balakrishnan H, Parulkar G, Peterson L, Rexford J, Shenker S, Turner J (2008) OpenFlow: Enabling Innovation in Campus Networks. SIGCOMM Comput Commun Rev
7.
go back to reference Zhou L, Guo H (2017) Applying nfv/sdn in mitigating ddos attacks. Proceedings of IEEE TENCON, PenangCrossRef Zhou L, Guo H (2017) Applying nfv/sdn in mitigating ddos attacks. Proceedings of IEEE TENCON, PenangCrossRef
9.
go back to reference Nguyen B, Choi N, Thottan M, der Merwe JV (2017) SIMECA: SDN-based IoT Mobile Edge Cloud Ar- chitecture. In: 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), pp. 503–509 Nguyen B, Choi N, Thottan M, der Merwe JV (2017) SIMECA: SDN-based IoT Mobile Edge Cloud Ar- chitecture. In: 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), pp. 503–509
10.
go back to reference Nikaein HN, Stenbock T, Ksentini A, Bonnet C (2017) Low Latency MEC Framework for SDN- based LTE/LTE-A Networks. IEEE International Conference on Communications, ICC ‘17, pp. 1–6 Nikaein HN, Stenbock T, Ksentini A, Bonnet C (2017) Low Latency MEC Framework for SDN- based LTE/LTE-A Networks. IEEE International Conference on Communications, ICC ‘17, pp. 1–6
11.
go back to reference Wang K et al (2015) A fast moving personal cloud in the mobile network, in: Proceedings of the 5th Workshop on All Things Cellular: Operations, Applications and Challenges, AllThingsCellular ‘15, ACM, New York, pp. 19–24 Wang K et al (2015) A fast moving personal cloud in the mobile network, in: Proceedings of the 5th Workshop on All Things Cellular: Operations, Applications and Challenges, AllThingsCellular ‘15, ACM, New York, pp. 19–24
12.
go back to reference Kempf J, Johansson B, Pettersson S, Lning H, Nilsson T (2012) Moving the mobile evolved packet core to the cloud, in: 2012 IEEE 8th International Confer- ence on Wireless and Mobile Computing. Networking and Communications (WiMob) Kempf J, Johansson B, Pettersson S, Lning H, Nilsson T (2012) Moving the mobile evolved packet core to the cloud, in: 2012 IEEE 8th International Confer- ence on Wireless and Mobile Computing. Networking and Communications (WiMob)
13.
go back to reference Nikaein N et al (2015) Network store: Exploring slicing in future 5g networks. In Proceedings of the 10th International Workshop on Mobility in the Evolving Internet Architecture, MobiArch ‘15, ACM, NY, pp. 8–13 Nikaein N et al (2015) Network store: Exploring slicing in future 5g networks. In Proceedings of the 10th International Workshop on Mobility in the Evolving Internet Architecture, MobiArch ‘15, ACM, NY, pp. 8–13
14.
go back to reference Shameli-Sendi et al (2015) Taxonomy of distributed denial of service mitigation approaches for cloud computing. J Netw Comput Appl 58:165–179CrossRef Shameli-Sendi et al (2015) Taxonomy of distributed denial of service mitigation approaches for cloud computing. J Netw Comput Appl 58:165–179CrossRef
15.
go back to reference Yunhe et al (2016) SD-Anti-DDoS: Fast and Efficient DDoS Defense in Software-Defined Networks. J Netw Comput Appl 68:65–79CrossRef Yunhe et al (2016) SD-Anti-DDoS: Fast and Efficient DDoS Defense in Software-Defined Networks. J Netw Comput Appl 68:65–79CrossRef
16.
go back to reference Kalkan et al (2016) Filtering-Based Defense Mechanisms Against DDoS Attacks: A Survey. IEEE Syst J Kalkan et al (2016) Filtering-Based Defense Mechanisms Against DDoS Attacks: A Survey. IEEE Syst J
17.
go back to reference Chang et al (2016) Detection DDoS attacks based on neural-network using Apache Spark. IEEE International Conference on (ICASI) Chang et al (2016) Detection DDoS attacks based on neural-network using Apache Spark. IEEE International Conference on (ICASI)
18.
go back to reference Giotis K et al (2014) Combining openflow and sflow for an effective and scalable anomaly detection and mitigation mechanism on SDN environments. Comput Netw 62(7):122–136CrossRef Giotis K et al (2014) Combining openflow and sflow for an effective and scalable anomaly detection and mitigation mechanism on SDN environments. Comput Netw 62(7):122–136CrossRef
19.
go back to reference Nagai R et al. Design and Implementation of an OpenFlow-based TCP SYN Flood Mitigation. 2018 6th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering Nagai R et al. Design and Implementation of an OpenFlow-based TCP SYN Flood Mitigation. 2018 6th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering
20.
go back to reference Han B et al (2018) OverWatch: A Cross-Plane DDoS Attack Defense Framework with Collaborative Intelligence in SDN. Hindawi Security and Communication Networks Han B et al (2018) OverWatch: A Cross-Plane DDoS Attack Defense Framework with Collaborative Intelligence in SDN. Hindawi Security and Communication Networks
21.
go back to reference Pan J, Yang Z (2018) Cybersecurity Challenges and Opportunities in the New Edge Computing+ IoT World. In ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, pp. 29–32 Pan J, Yang Z (2018) Cybersecurity Challenges and Opportunities in the New Edge Computing+ IoT World. In ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, pp. 29–32
22.
go back to reference Massonet P et al. (2017) End-to-end security architecture for federated cloud and IoT networks. IEEE International Conference on Smart Computing (SMARTCOMP), pp. 1–6 Massonet P et al. (2017) End-to-end security architecture for federated cloud and IoT networks. IEEE International Conference on Smart Computing (SMARTCOMP), pp. 1–6
24.
go back to reference Nikaein N, Marina MK, Manickam S, Dawson A, Knopp R, Bonnet C (2014) OpenAirInterface: A flexible platform for 5g research. SIGCOMM Comput Commun Rev Nikaein N, Marina MK, Manickam S, Dawson A, Knopp R, Bonnet C (2014) OpenAirInterface: A flexible platform for 5g research. SIGCOMM Comput Commun Rev
25.
go back to reference Schiller E, Nikaein N, Kalogeiton E, Gasparyan M, Braun T (2018) CDS-MEC: NFV/SDN-based Application Management for MEC in 5G Systems. Comput Netw 135:96–107CrossRef Schiller E, Nikaein N, Kalogeiton E, Gasparyan M, Braun T (2018) CDS-MEC: NFV/SDN-based Application Management for MEC in 5G Systems. Comput Netw 135:96–107CrossRef
26.
go back to reference Ali A et al (2017) SDNFV-Based DDoS Detection and Remediation in Multi-tenant, Virtualised Infrastructures. Springer International Publishing AG Computer Communications and Networks. 10.1007/978-3-319-64653-4_7 Ali A et al (2017) SDNFV-Based DDoS Detection and Remediation in Multi-tenant, Virtualised Infrastructures. Springer International Publishing AG Computer Communications and Networks. 10.1007/978-3-319-64653-4_7
27.
go back to reference Bernini G et al. Combined NFV and SDN Applications for Mitigation of Cyber-Attacks Conducted by Botnets in 5G Mobile Networks:ICN 2017: The Sixteenth International Conference on Networks Bernini G et al. Combined NFV and SDN Applications for Mitigation of Cyber-Attacks Conducted by Botnets in 5G Mobile Networks:ICN 2017: The Sixteenth International Conference on Networks
28.
go back to reference Son J, Buyya R (2017) A Taxonomy of SDN-enabled Cloud Computing. ACM Comput Surv 1(1):1CrossRef Son J, Buyya R (2017) A Taxonomy of SDN-enabled Cloud Computing. ACM Comput Surv 1(1):1CrossRef
29.
go back to reference Shin S, Yegneswaran V, Porras P, Gu G (2013) AVANT- GUARD: Scalable and vigilant switch flow management in software-defined networks. In Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, CCS 2013, pp. 413–424 Shin S, Yegneswaran V, Porras P, Gu G (2013) AVANT- GUARD: Scalable and vigilant switch flow management in software-defined networks. In Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, CCS 2013, pp. 413–424
30.
go back to reference Wang R, Jia Z, Ju L (2015) An entropy-based distributed DDoS detection mechanism in software-defined networking. In 2015 IEEE Trustcom/BigDataSE/ISPA, vol. 1, pp. 310–317 Wang R, Jia Z, Ju L (2015) An entropy-based distributed DDoS detection mechanism in software-defined networking. In 2015 IEEE Trustcom/BigDataSE/ISPA, vol. 1, pp. 310–317
32.
go back to reference ETSI, “Mobile Edge Computing (MEC); Framework and Reference Architecture.” ETSI GS MEC 003 V1.1.1 (2016-03) ETSI, “Mobile Edge Computing (MEC); Framework and Reference Architecture.” ETSI GS MEC 003 V1.1.1 (2016-03)
33.
go back to reference Yu M, Rexford J, Freedman MJ, Wang J (2010) Scalable flow-based networking with DIFANE. ACM SIGCOMM Comput Commun Rev 40(4):351–362CrossRef Yu M, Rexford J, Freedman MJ, Wang J (2010) Scalable flow-based networking with DIFANE. ACM SIGCOMM Comput Commun Rev 40(4):351–362CrossRef
34.
go back to reference Afek Y, Bremler-Barr A, Shafir L (2017) Network anti-spoofing with SDN data plane. IEEE INFOCOM - IEEE Conference on Computer Communications Afek Y, Bremler-Barr A, Shafir L (2017) Network anti-spoofing with SDN data plane. IEEE INFOCOM - IEEE Conference on Computer Communications
35.
go back to reference Hesham Mekky, Fang Hao, Sarit Mukherjee, Zhi-Li Zhang, and T.V. Lakshman (2014) Application-aware data plane processing in sdn. In Proceedings of the Third Workshop on Hot Topics in Software Defined Networking, HotSDN ‘14, pages 13–18, ACM, New York Hesham Mekky, Fang Hao, Sarit Mukherjee, Zhi-Li Zhang, and T.V. Lakshman (2014) Application-aware data plane processing in sdn. In Proceedings of the Third Workshop on Hot Topics in Software Defined Networking, HotSDN ‘14, pages 13–18, ACM, New York
36.
go back to reference Bi Y et al (2018) Mobility Support for Fog Computing: An SDN Approach. IEEE Commun Mag Bi Y et al (2018) Mobility Support for Fog Computing: An SDN Approach. IEEE Commun Mag
37.
go back to reference Zhang PY et al (2018) Security and trust issues in Fog computing: A survey. Futur Gener Comput Syst 88:16–27CrossRef Zhang PY et al (2018) Security and trust issues in Fog computing: A survey. Futur Gener Comput Syst 88:16–27CrossRef
38.
go back to reference Wang D et al (2018) MiFo: A novel edge network integration framework for fog computing. Peer-to-Peer Networking and Applications Wang D et al (2018) MiFo: A novel edge network integration framework for fog computing. Peer-to-Peer Networking and Applications
39.
go back to reference Li H, Wang L (2018) Online Orchestration of Cooperative Defense against DDoS Attacks for 5G MEC. IEEE Wireless Communications and Networking Conference (WCNC) Li H, Wang L (2018) Online Orchestration of Cooperative Defense against DDoS Attacks for 5G MEC. IEEE Wireless Communications and Networking Conference (WCNC)
40.
go back to reference Raghunath K, Krishnan P (2018) Towards A Secure SDN Architecture. 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT) Raghunath K, Krishnan P (2018) Towards A Secure SDN Architecture. 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT)
42.
go back to reference Varga P et al (2017) Real-Time Security Services for SDN-based Datacenters. In Network and Service Management (CNSM), 2017, IFIP/IEEE International Conference on. IEEE Varga P et al (2017) Real-Time Security Services for SDN-based Datacenters. In Network and Service Management (CNSM), 2017, IFIP/IEEE International Conference on. IEEE
43.
go back to reference Krishnan et al (2017) SDN Framework for Securing IoT Networks. In International Conference on Ubiquitous Communications and Network Computing, pp. 116–129. Springer, Cham Krishnan et al (2017) SDN Framework for Securing IoT Networks. In International Conference on Ubiquitous Communications and Network Computing, pp. 116–129. Springer, Cham
44.
go back to reference Krishnan P et al. Managing Network Functions in Stateful Application Aware SDN. 2018 6th International Symposium on Security in Computing and Communications, Springer Communications in Computer and Information Science Series (CCIS), ISSN: 1865:0929 Krishnan P et al. Managing Network Functions in Stateful Application Aware SDN. 2018 6th International Symposium on Security in Computing and Communications, Springer Communications in Computer and Information Science Series (CCIS), ISSN: 1865:0929
46.
go back to reference Huang A, Nikaein N, Stenbock T, Ksentini A, Bonnet C (2017) Low Latency MEC Framework for SDN- based LTE/LTE-A Networks. in: IEEE Interna- tional Conference on Communications, ICC ‘17, pp. 1–6 Huang A, Nikaein N, Stenbock T, Ksentini A, Bonnet C (2017) Low Latency MEC Framework for SDN- based LTE/LTE-A Networks. in: IEEE Interna- tional Conference on Communications, ICC ‘17, pp. 1–6
48.
go back to reference Roman R, Lopez J, Mambo M (2018) Mobile edge computing, Fog et al.: A survey and analysis of security threats and challenges. Futur Gener Comput Syst 78:680–698CrossRef Roman R, Lopez J, Mambo M (2018) Mobile edge computing, Fog et al.: A survey and analysis of security threats and challenges. Futur Gener Comput Syst 78:680–698CrossRef
49.
go back to reference Peng S, Fajardo JO, Khodashenas PS, Blanco B, Liberal F, Ruiz C, Turyagyenda C, Wilson M, Vadgama S (2017) QoE-Oriented Mobile Edge Service Management Leveraging SDN and NFV. Mob Inf Syst 2017 Peng S, Fajardo JO, Khodashenas PS, Blanco B, Liberal F, Ruiz C, Turyagyenda C, Wilson M, Vadgama S (2017) QoE-Oriented Mobile Edge Service Management Leveraging SDN and NFV. Mob Inf Syst 2017
50.
go back to reference Farris I, Bernabe J, Toumi N, Garcia-Carrillo D, Taleb T, Skarmeta A, Sahlin B (2017) Towards Provisioning of SDN/NFV- based Security Enablers for Integrated Protection of IoT Systems. In IEEE Conference on Standards for Communications & Networking (CSCN), pp. 1–6 Farris I, Bernabe J, Toumi N, Garcia-Carrillo D, Taleb T, Skarmeta A, Sahlin B (2017) Towards Provisioning of SDN/NFV- based Security Enablers for Integrated Protection of IoT Systems. In IEEE Conference on Standards for Communications & Networking (CSCN), pp. 1–6
51.
go back to reference Aggarwal C, Srivastava K (2016) Securing IoT devices using SDN and edge computing. In 2nd International Conference on Next Generation Computing Technologies (NGCT). IEEE, pp. 877–882 Aggarwal C, Srivastava K (2016) Securing IoT devices using SDN and edge computing. In 2nd International Conference on Next Generation Computing Technologies (NGCT). IEEE, pp. 877–882
56.
go back to reference Dao N-N, Vu D-N, Lee Y, Park M, Cho S. MAEC-X: DDoS prevention leveraging multi-access edge computing. 2018 International Conference on Information Networking (ICOIN) Dao N-N, Vu D-N, Lee Y, Park M, Cho S. MAEC-X: DDoS prevention leveraging multi-access edge computing. 2018 International Conference on Information Networking (ICOIN)
Metadata
Title
SDNFV Based Threat Monitoring and Security Framework for Multi-Access Edge Computing Infrastructure
Publication date
28-10-2019
Published in
Mobile Networks and Applications / Issue 6/2019
Print ISSN: 1383-469X
Electronic ISSN: 1572-8153
DOI
https://doi.org/10.1007/s11036-019-01389-2

Other articles of this Issue 6/2019

Mobile Networks and Applications 6/2019 Go to the issue