• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

基于动态六边形模糊方法的5G边缘网络多层攻击图分析

Multi-Layer Attack Graph Analysis in the 5G Edge Network Using a Dynamic Hexagonal Fuzzy Method.

作者信息

Kholidy Hisham A

机构信息

Department of Networks and Computer Security, College of Engineering, State University of New York (SUNY) Polytechnic Institute, Utica, NY 13502, USA.

出版信息

Sensors (Basel). 2021 Dec 21;22(1):9. doi: 10.3390/s22010009.

DOI:10.3390/s22010009
PMID:35009551
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC8747503/
Abstract

Overall, 5G networks are expected to become the backbone of many critical IT applications. With 5G, new tech advancements and innovation are expected; 5G currently operates on software-defined networking. This enables 5G to implement network slicing to meet the unique requirements of every application. As a result, 5G is more flexible and scalable than 4G LTE and previous generations. To avoid the growing risks of hacking, 5G cybersecurity needs some significant improvements. Some security concerns involve the network itself, while others focus on the devices connected to 5G. Both aspects present a risk to consumers, governments, and businesses alike. There is currently no real-time vulnerability assessment framework that specifically addresses 5G Edge networks, with regard to their real-time scalability and dynamic nature. This paper studies the vulnerability assessment in the 5G networks and develops an optimized dynamic method that integrates the Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS) with the hexagonal fuzzy numbers to accurately analyze the vulnerabilities in 5G networks. The proposed method considers both the vulnerability and 5G network dynamic factors such as latency and accessibility to find the potential attack graph paths where the attack might propagate in the network and quantifies the attack cost and security level of the network. We test and validate the proposed method using our 5G testbed and we compare the optimized method to the classical TOPSIS and the known vulnerability scanner tool, Nessus.

摘要

总体而言,预计5G网络将成为许多关键IT应用的支柱。借助5G,有望实现新的技术进步和创新;5G目前基于软件定义网络运行。这使5G能够实施网络切片以满足每个应用的独特需求。因此,5G比4G LTE及前代网络更灵活、更具可扩展性。为避免日益增长的黑客攻击风险,5G网络安全需要一些重大改进。一些安全问题涉及网络本身,而其他问题则聚焦于连接到5G的设备。这两个方面都给消费者、政府和企业带来风险。目前尚无专门针对5G边缘网络实时可扩展性和动态特性的实时漏洞评估框架。本文研究了5G网络中的漏洞评估,并开发了一种优化的动态方法,该方法将逼近理想解排序法(TOPSIS)与六边形模糊数相结合,以准确分析5G网络中的漏洞。所提出的方法既考虑了漏洞,又考虑了5G网络的动态因素,如延迟和可达性,以找到攻击可能在网络中传播的潜在攻击图路径,并量化攻击成本和网络安全级别。我们使用5G测试平台对所提出的方法进行了测试和验证,并将优化后的方法与经典TOPSIS和已知的漏洞扫描工具Nessus进行了比较。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/808f/8747503/ca0ab8307edf/sensors-22-00009-g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/808f/8747503/d892d7aba24e/sensors-22-00009-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/808f/8747503/ee48782d3e1c/sensors-22-00009-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/808f/8747503/cbf210e5b271/sensors-22-00009-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/808f/8747503/eb643a850478/sensors-22-00009-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/808f/8747503/4485b71df23a/sensors-22-00009-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/808f/8747503/df0db9eb6608/sensors-22-00009-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/808f/8747503/781974daaf99/sensors-22-00009-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/808f/8747503/92e7347926c4/sensors-22-00009-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/808f/8747503/77a87a3cae9b/sensors-22-00009-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/808f/8747503/a4816b10a044/sensors-22-00009-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/808f/8747503/ed0f5bda0a17/sensors-22-00009-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/808f/8747503/e960092b93e9/sensors-22-00009-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/808f/8747503/93ad2759239d/sensors-22-00009-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/808f/8747503/ca0ab8307edf/sensors-22-00009-g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/808f/8747503/d892d7aba24e/sensors-22-00009-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/808f/8747503/ee48782d3e1c/sensors-22-00009-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/808f/8747503/cbf210e5b271/sensors-22-00009-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/808f/8747503/eb643a850478/sensors-22-00009-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/808f/8747503/4485b71df23a/sensors-22-00009-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/808f/8747503/df0db9eb6608/sensors-22-00009-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/808f/8747503/781974daaf99/sensors-22-00009-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/808f/8747503/92e7347926c4/sensors-22-00009-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/808f/8747503/77a87a3cae9b/sensors-22-00009-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/808f/8747503/a4816b10a044/sensors-22-00009-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/808f/8747503/ed0f5bda0a17/sensors-22-00009-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/808f/8747503/e960092b93e9/sensors-22-00009-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/808f/8747503/93ad2759239d/sensors-22-00009-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/808f/8747503/ca0ab8307edf/sensors-22-00009-g014.jpg

相似文献

1
Multi-Layer Attack Graph Analysis in the 5G Edge Network Using a Dynamic Hexagonal Fuzzy Method.基于动态六边形模糊方法的5G边缘网络多层攻击图分析
Sensors (Basel). 2021 Dec 21;22(1):9. doi: 10.3390/s22010009.
2
A Security Assessment Mechanism for Software-Defined Networking-Based Mobile Networks.一种基于软件定义网络的移动网络安全评估机制。
Sensors (Basel). 2015 Dec 17;15(12):31843-58. doi: 10.3390/s151229887.
3
A Novel Approach to Multi-Provider Network Slice Selector for 5G and Future Communication Systems.一种适用于 5G 和未来通信系统的多供应商网络切片选择器的新方法。
Sensors (Basel). 2022 Aug 13;22(16):6066. doi: 10.3390/s22166066.
4
Dynamic QoS Management for a Flexible 5G/6G Network Core: A Step toward a Higher Programmability.面向灵活的 5G/6G 网络核心的动态服务质量(QoS)管理:迈向更高可编程性的一步。
Sensors (Basel). 2022 Apr 7;22(8):2849. doi: 10.3390/s22082849.
5
Empowering the Internet of Vehicles with Multi-RAT 5G Network Slicing.借助多无线接入技术的5G网络切片赋能车联网
Sensors (Basel). 2019 Jul 13;19(14):3107. doi: 10.3390/s19143107.
6
SDN-Based Network Slicing Mechanism for a Scalable 4G/5G Core Network: A Kubernetes Approach.基于 SDN 的可扩展 4G/5G 核心网网络切片机制:一种 Kubernetes 方法。
Sensors (Basel). 2021 May 29;21(11):3773. doi: 10.3390/s21113773.
7
Beyond private 5G networks: applications, architectures, operator models and technological enablers.超越私有5G网络:应用、架构、运营商模式及技术使能器
EURASIP J Wirel Commun Netw. 2021;2021(1):195. doi: 10.1186/s13638-021-02067-2. Epub 2021 Dec 4.
8
A fuzzy TOPSIS based analysis toward selection of effective security requirements engineering approach for trustworthy healthcare software development.基于模糊 TOPSIS 的可信医疗软件开发有效安全需求工程方法选择分析。
BMC Med Inform Decis Mak. 2020 Sep 18;20(1):236. doi: 10.1186/s12911-020-01209-8.
9
5G Standalone and 4G Multi-Carrier Network-in-a-Box Using a Software Defined Radio Framework.使用软件定义无线电框架的5G独立和4G多载波一体化网络
Sensors (Basel). 2021 Aug 22;21(16):5653. doi: 10.3390/s21165653.
10
A constrained optimization model for the provision of services in a 5G network with multi-level cybersecurity investments.一种用于在具有多级网络安全投资的5G网络中提供服务的约束优化模型。
Soft comput. 2022 May 3:1-18. doi: 10.1007/s00500-022-07117-5.

引用本文的文献

1
A threat modeling framework for IoT-Based botnet attacks.一种针对基于物联网的僵尸网络攻击的威胁建模框架。
Heliyon. 2024 Oct 15;10(20):e39192. doi: 10.1016/j.heliyon.2024.e39192. eCollection 2024 Oct 30.
2
Predicting Attack Pattern via Machine Learning by Exploiting Stateful Firewall as Virtual Network Function in an SDN Network.通过在软件定义网络(SDN)网络中将有状态防火墙用作虚拟网络功能,利用机器学习预测攻击模式。
Sensors (Basel). 2022 Jan 18;22(3):709. doi: 10.3390/s22030709.

本文引用的文献

1
5G Security Threat Assessment in Real Networks.5G 网络中的安全威胁评估。
Sensors (Basel). 2021 Aug 17;21(16):5524. doi: 10.3390/s21165524.
2
A fuzzy TOPSIS based analysis toward selection of effective security requirements engineering approach for trustworthy healthcare software development.基于模糊 TOPSIS 的可信医疗软件开发有效安全需求工程方法选择分析。
BMC Med Inform Decis Mak. 2020 Sep 18;20(1):236. doi: 10.1186/s12911-020-01209-8.
3
Enabling the Orchestration of IoT Slices through Edge and Cloud Microservice Platforms.
通过边缘和云微服务平台实现物联网切片的编排。
Sensors (Basel). 2019 Jul 5;19(13):2980. doi: 10.3390/s19132980.