{"title":"Secure Slicing and Allocation of Resources of 5G Networks In Software-Defined Networking / Network Functions Virtualization","authors":"Ali Jasim Ramadhan Al-Aameri","doi":"10.31436/iiumej.v23i2.1763","DOIUrl":null,"url":null,"abstract":"In 5G communications, higher data rates and lower latency are needed due to the high traffic rate. Though resource wastage is avoided by secure slicing, sliced networks are exploited by DDoS attackers. Thus, in the present paper, traffic-aware setting up is PRESENTED for resource allocation and secure slicing over the virtualization of 5G networks enabled by software-defined network/network functions. In the proposed method (called T-S3RA), to authenticate user devices, Boolean logic is used with key derivation based on passwords. Moreover, the traffic arrangement is based on the 5G access points. To implement secure resource allocation and network slicing, deep learning models are used. Renyi entropy computation is employed to predict the DDoS attackers. Through the experimental results, the effectiveness of the presented approach is proved.\nABSTRAK: Melalui komunikasi 5G, kadar data yang tinggi dan latensi yang rendah amat diperlukan kerana kadar trafik yang tinggi. Walaupun pembaziran sumber dapat dielakkan melalui pemotongan selamat, rangkaian yang dipotong sering dieksploitasi oleh penyerang DDoS. Oleh itu, kajian ini menyediakan persekitaran sedar-trafik bagi peruntukan sumber dan pemotongan selamat ke atas rangkaian 5G secara maya melalui fungsi rangkaian takrif-perisian. Melaui pendekatan yang dicadangkan (iaitu T-S3RA), peranti pengguna disahkan terlebih dahulu menggunakan logik Boolean dengan perolehan kunci berdasarkan kata laluan. Di samping itu, susunan trafik adalah berdasarkan titik akses 5G. Bagi melaksanakan peruntukan sumber yang selamat dan pemotongan rangkaian, model pembelajaran mendalam telah digunakan. Pengiraan Entropi Renyi dibuat bagi meramal penyerang DDoS. Dapatan eksperimen mengesahkan keberkesanan pendekatan yang dicadangkan.","PeriodicalId":13439,"journal":{"name":"IIUM Engineering Journal","volume":"3 1","pages":""},"PeriodicalIF":0.6000,"publicationDate":"2022-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IIUM Engineering Journal","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.31436/iiumej.v23i2.1763","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"ENGINEERING, MULTIDISCIPLINARY","Score":null,"Total":0}
引用次数: 1
Abstract
In 5G communications, higher data rates and lower latency are needed due to the high traffic rate. Though resource wastage is avoided by secure slicing, sliced networks are exploited by DDoS attackers. Thus, in the present paper, traffic-aware setting up is PRESENTED for resource allocation and secure slicing over the virtualization of 5G networks enabled by software-defined network/network functions. In the proposed method (called T-S3RA), to authenticate user devices, Boolean logic is used with key derivation based on passwords. Moreover, the traffic arrangement is based on the 5G access points. To implement secure resource allocation and network slicing, deep learning models are used. Renyi entropy computation is employed to predict the DDoS attackers. Through the experimental results, the effectiveness of the presented approach is proved.
ABSTRAK: Melalui komunikasi 5G, kadar data yang tinggi dan latensi yang rendah amat diperlukan kerana kadar trafik yang tinggi. Walaupun pembaziran sumber dapat dielakkan melalui pemotongan selamat, rangkaian yang dipotong sering dieksploitasi oleh penyerang DDoS. Oleh itu, kajian ini menyediakan persekitaran sedar-trafik bagi peruntukan sumber dan pemotongan selamat ke atas rangkaian 5G secara maya melalui fungsi rangkaian takrif-perisian. Melaui pendekatan yang dicadangkan (iaitu T-S3RA), peranti pengguna disahkan terlebih dahulu menggunakan logik Boolean dengan perolehan kunci berdasarkan kata laluan. Di samping itu, susunan trafik adalah berdasarkan titik akses 5G. Bagi melaksanakan peruntukan sumber yang selamat dan pemotongan rangkaian, model pembelajaran mendalam telah digunakan. Pengiraan Entropi Renyi dibuat bagi meramal penyerang DDoS. Dapatan eksperimen mengesahkan keberkesanan pendekatan yang dicadangkan.
在5G通信中,由于流量大,需要更高的数据速率和更低的延迟。虽然通过安全切片避免了资源浪费,但切片网络容易被DDoS攻击者利用。因此,在本文中,提出了流量感知设置,用于通过软件定义网络/网络功能实现5G网络虚拟化的资源分配和安全切片。在提出的方法(称为T-S3RA)中,为了对用户设备进行身份验证,将布尔逻辑与基于密码的密钥派生一起使用。此外,流量安排是基于5G接入点的。为了实现安全的资源分配和网络切片,使用了深度学习模型。采用Renyi熵计算对DDoS攻击者进行预测。实验结果证明了该方法的有效性。摘要:5G,数据,数据,数据,数据,数据,数据,数据,数据,数据,数据,数据,数据,数据,数据,数据,数据,数据,数据,数据,数据。Walaupun pembaziran number dapat dielakkan melalui peemotongan selamat, rangkaian yang dipoong sering dikspploitasi oleh penyerang DDoS。Oleh itu, kajian ini menyediakan persekitaran sear - traffic - ik bagi peruntukan number, dan peemotongan和selamat ke, as rangkaian 5G secara maya melalui fungsi rangkaian takrif- perisan。Melaui pendekatan yang dicadangkan (iitu T-S3RA), peranti pengguna disahkan terlebih dahulu menggunakan loggik Boolean dengan perolehan kunci berdasarkan kata lalan。在抽样调查中,苏丹的交通数据显示,5G技术是最先进的。巴吉·米拉克萨纳坎,peruntukan sumber yang selamat dan peemotongan rangkaian,模特米拉克萨纳坎,mendalam telah digunakan。Pengiraan Entropi Renyi dibui meramal penyerang DDoS。大巴坦的实验,孟格萨坎keberkesanan pendekatan yang dicadangkan。
期刊介绍:
The IIUM Engineering Journal, published biannually (June and December), is a peer-reviewed open-access journal of the Faculty of Engineering, International Islamic University Malaysia (IIUM). The IIUM Engineering Journal publishes original research findings as regular papers, review papers (by invitation). The Journal provides a platform for Engineers, Researchers, Academicians, and Practitioners who are highly motivated in contributing to the Engineering disciplines, and Applied Sciences. It also welcomes contributions that address solutions to the specific challenges of the developing world, and address science and technology issues from an Islamic and multidisciplinary perspective. Subject areas suitable for publication are as follows: -Chemical and Biotechnology Engineering -Civil and Environmental Engineering -Computer Science and Information Technology -Electrical, Computer, and Communications Engineering -Engineering Mathematics and Applied Science -Materials and Manufacturing Engineering -Mechanical and Aerospace Engineering -Mechatronics and Automation Engineering