Intrinsic Security and Self-Adaptive Cooperative Protection Enabling Cloud Native Network Slicing

      

ABSTARCT :

With the emergence of cloud native technology, the network slicing enables automatic service orchestration, flexible network scheduling and scalable network resource allocation, which profoundly affects the traditional security solution. Security is regarded as a technology independent of the cloud native architecture in the initial design, traditional passive defense such as “reinforced” and “stacked” is relied on to achieve system security protection. The lack of intrinsic security mechanisms makes the system capability insufficient when faces the uncertain threat brought by vulnerabilities and backdoors under the ecosystem of opening-up and sharing. The static nature of existing networks and computing systems makes them easy to be compromised and hard to defend, and thus it is urgent to provide intrinsic security and proactive protection against the unpredictable attacks. To this end, this paper proposes a novel paradigm named intrinsic cloud security (iCS) from the perspective of dynamic defense. The dynamic defense provides component-level security, and has complementary and consistency with the cloud native environment. In particular, iCS introduces mimic defense and moving target defense (MTD), and makes full use of the new features introduced by cloud native to implement an intrinsic and proactive defense mechanism with acceptable costs and efficiency. The iCS paradigm achieves seamless integration and symbiosis evolution between security and cloud native. We implement a trial of iCS based on 5GC commercial system and evaluate its performance on costs, efficiency and attack success. The result shows that the iCS enhanced mode always can provide a better and more stable defense effects.

EXISTING SYSTEM :

? A realization of virtualization in the RAN, aligned with virtualization capabilities in the CN, is a significant departure from the existing implementations in a traditional RAN, where the implementations are proprietary in nature with a tight coupling of hardware and software functions resulting in limited flexibility. ? Robust hashing algorithms and cryptographic algorithms to prevent hash function collision and cracking of an existing block hash in the distributed ledger. ? The 5G and beyond ecosystem is characterized by a prolific evolution and expansion of the service paradigm, over a distributed heterogeneous access with variable coverage area footprints, and multiple access technologies coexisting and cooperating with the advancing capabilities of New Radio (NR) access.

DISADVANTAGE :

? These innovative, customisable and extensible HoN metrics greatly facilitate speedy and more precise identification of common network problems. ? When a user enters a new cell, the user and the BS must find each other in space by turning their beamformers in the proper direction, in what denoted as initial access problem. ? On the other hand, mm-waves are ideal for backhauling, since they offer a huge spectrum and the connected devices are fixed, thus not posing channel tracking problems. ? To avoid this problem, and to offer a wider perspective on the different modulation formats, we intend to provide the reader with the instruments to compare different transceiver architectures from an information-theoretic point of view.

PROPOSED SYSTEM :

• In, Soft Information is proposed as a basis for positioning to overcome the limitations of SVE-based localization, and to leverage radio information available in different radio channels. • The design of each one of the proposed modules will be made so that most of the execution time is spent in the last module, related to the attack detection itself. • These proposed models are previously trained using genuine traffic, which will later allow the system to detect anomalous patterns that will identify as attacks. • Several power configuration algorithms have been proposed to optimize the network capacity, eliminate inter-cell interferences and regulate the coverage area of the network cells.

ADVANTAGE :

? We will see some specific network platforms for each vertical sector with dedicated features and performance requirements (e.g. high reliability for health or automobile verticals or high density of terminals for smart cities). ? 5G is mandated to significantly increase the available communication system performance, according to several system parameters and Key Performance Indicators (KPI). ? The architectural changes to the telecommunication systems, needed to fulfil the expected 5G business and performance requirements, are significant compared to the existing deployed networks. ? In fact, 4G design drivers were mainly based on mass-market access to high speed mobile Internet, whilst 5G also takes into account applications in professional environments requiring much higher performance and grade of service levels.

Download DOC Download PPT

We have more than 145000 Documents , PPT and Research Papers

Have a question ?

Chat on WhatsApp