{"title":"中间欺骗者(DitM):无线网络虚拟化中的网络欺骗安全","authors":"Abdulhamid A. Adebayo, D. Rawat","doi":"10.1109/CCNC46108.2020.9045164","DOIUrl":null,"url":null,"abstract":"Wireless virtualization has emerged as a technology of interest to overcome resource sharing problem by allowing multiple virtual networks to access the same physical wireless infrastructure concurrently based on service level agreements (SLAs). The main focus so far has been on improving the efficiency of wireless resource sharing process. From a security perspective, this technology and its variations have not commanded as much attention partly due to the early state of wireless virtualization development and the undefined nature of potential attacks. In this paper, we present a Deceptor-in-the-Middle (DitM) cyber-deception mechanism that leverages the wireless virtualization architecture to enable virtual network operators to learn about the interest and nature of attacks without the attacker being aware and also not compromising the security and quality of service requirements of the virtual network users. We also propose a detection mechanism for identifying the presence of an attacker and redirecting to deception virtual networks. The performance of the proposed approach is evaluated using numerical results obtained from Monte Carlo simulations. The numerical results signify that the proposed DitM results in higher throughput than that of without the deceptor. We also analyzed the DitM using different metrics including the probability of miss detection and false alarm.","PeriodicalId":443862,"journal":{"name":"2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"Deceptor-in-the-Middle (DitM): Cyber Deception for Security in Wireless Network Virtualization\",\"authors\":\"Abdulhamid A. Adebayo, D. Rawat\",\"doi\":\"10.1109/CCNC46108.2020.9045164\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Wireless virtualization has emerged as a technology of interest to overcome resource sharing problem by allowing multiple virtual networks to access the same physical wireless infrastructure concurrently based on service level agreements (SLAs). The main focus so far has been on improving the efficiency of wireless resource sharing process. From a security perspective, this technology and its variations have not commanded as much attention partly due to the early state of wireless virtualization development and the undefined nature of potential attacks. In this paper, we present a Deceptor-in-the-Middle (DitM) cyber-deception mechanism that leverages the wireless virtualization architecture to enable virtual network operators to learn about the interest and nature of attacks without the attacker being aware and also not compromising the security and quality of service requirements of the virtual network users. We also propose a detection mechanism for identifying the presence of an attacker and redirecting to deception virtual networks. The performance of the proposed approach is evaluated using numerical results obtained from Monte Carlo simulations. The numerical results signify that the proposed DitM results in higher throughput than that of without the deceptor. We also analyzed the DitM using different metrics including the probability of miss detection and false alarm.\",\"PeriodicalId\":443862,\"journal\":{\"name\":\"2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC)\",\"volume\":\"90 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CCNC46108.2020.9045164\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCNC46108.2020.9045164","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Deceptor-in-the-Middle (DitM): Cyber Deception for Security in Wireless Network Virtualization
Wireless virtualization has emerged as a technology of interest to overcome resource sharing problem by allowing multiple virtual networks to access the same physical wireless infrastructure concurrently based on service level agreements (SLAs). The main focus so far has been on improving the efficiency of wireless resource sharing process. From a security perspective, this technology and its variations have not commanded as much attention partly due to the early state of wireless virtualization development and the undefined nature of potential attacks. In this paper, we present a Deceptor-in-the-Middle (DitM) cyber-deception mechanism that leverages the wireless virtualization architecture to enable virtual network operators to learn about the interest and nature of attacks without the attacker being aware and also not compromising the security and quality of service requirements of the virtual network users. We also propose a detection mechanism for identifying the presence of an attacker and redirecting to deception virtual networks. The performance of the proposed approach is evaluated using numerical results obtained from Monte Carlo simulations. The numerical results signify that the proposed DitM results in higher throughput than that of without the deceptor. We also analyzed the DitM using different metrics including the probability of miss detection and false alarm.