Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

5G network multistage attack mitigation method based on software defined network (SDN) and network function virtualization (NFV)

A network and 5G technology, applied in the field of 5G network multi-level attack mitigation based on SDN and NFV, can solve the problems that cannot be directly applied to SDN-MN, and cannot be directly used in 5G networks

Active Publication Date: 2016-04-20
SHANGHAI JIAO TONG UNIV
View PDF3 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

There are currently many studies using attack graphs for general network security assessment, but these methods cannot be directly used in 5G networks
The second is the choice of security strategy
There are also some studies on strategy selection, but most of them study strategy selection in special environments and cannot be directly applied to SDN-MN

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • 5G network multistage attack mitigation method based on software defined network (SDN) and network function virtualization (NFV)
  • 5G network multistage attack mitigation method based on software defined network (SDN) and network function virtualization (NFV)
  • 5G network multistage attack mitigation method based on software defined network (SDN) and network function virtualization (NFV)

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0084] The present invention will be described in detail below in conjunction with specific embodiments. The following examples will help those skilled in the art to further understand the present invention, but do not limit the present invention in any form. It should be noted that those skilled in the art can make several modifications and improvements without departing from the concept of the present invention. These all belong to the protection scope of the present invention.

[0085] The present invention first extends the definition of SDN-MN architecture in 5G to improve system capabilities and monitor comprehensive network events and deploy network security functions in a timely manner, and then proposes an evidence-driven security assessment mechanism using SDN-MN factors and NFV detection, Finally, a mechanism for attack mitigation using SDN control and NFV deployment is proposed.

[0086] Concrete steps of the present invention include:

[0087] Step S1: Extend t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a 5G network multistage attack mitigation method based on SDN and FNV. The 5G network multistage attack mitigation method comprises the following steps of a first step, expanding an SDN-MN architecture; a second step, according to the expanded SDN-MN architecture, obtaining a proof driving security evaluation mechanism in which a software defined network-mobile network (SDN-MN) based on NFV detection; a third step, measuring the security level of a static network through the proof driving security evaluation mechanism and a generated new-probability proof driving attack graph; a fourth step, calculating a state node probability, an action node probability and a posterior probability in the attack graph through a security evaluation algorithm in the proof driving security evaluation mechanism; and a fifth step, disposing an attack mitigation mechanism by means of SDN control and NFV, and disposing a corresponding attack mitigation plan through a security level which is obtained from the proof driving attack graph. The 5G network multistage attack mitigation method can be directly used in a 5G network and can perform strategy decision according to a current network environment and settles an attack mitigation strategy disposition problem.

Description

technical field [0001] The present invention relates to the field of mobile communication security, in particular to a multi-level attack mitigation method for 5G networks based on SDN and NFV. Background technique [0002] The development of mobile communication networks has promoted the birth of the next generation of mobile communication 5G networks. 5G networks can connect various smart devices and heterogeneous networks together, making 5G networks more diverse and complex than ever. With a large amount of sensitive and confidential information accessing 5G networks, how to provide effective security services is a key issue that 5G networks need to solve. [0003] At the same time, multi-stage attacks are one of the most harmful cybersecurity threats. It tries to conceal the attack by attacking in multiple steps, and each step deals less damage than the total damage. Most current security devices only analyze single-stage attacks, so it is difficult to prevent a comp...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/1433H04L63/1441H04L65/1073H04W12/121
Inventor 伍军罗世波张尚华郭龙华李建华银鹰
Owner SHANGHAI JIAO TONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products