Conference paper Open Access

Combined NFV and SDN Applications for Mitigation of Cyber-Attacks Conducted by Botnets in 5G Mobile Networks

Bernini, Giacomo; Giardina, Pietro Giuseppe; Carrozzo, Gino; Huertas Celdran, Alberto; Gil Perez, Manuel; Alcaraz Calero, Jose M.; Wang, Qi; Koutsopoulos, Konstantinos; Neves, Pedro


MARC21 XML Export

<?xml version='1.0' encoding='UTF-8'?>
<record xmlns="http://www.loc.gov/MARC21/slim">
  <leader>00000nam##2200000uu#4500</leader>
  <datafield tag="653" ind1=" " ind2=" ">
    <subfield code="a">SDN; NFV; 5G; cyber-protection</subfield>
  </datafield>
  <controlfield tag="005">20200120150304.0</controlfield>
  <controlfield tag="001">1489770</controlfield>
  <datafield tag="700" ind1=" " ind2=" ">
    <subfield code="u">Nextworks</subfield>
    <subfield code="a">Giardina, Pietro Giuseppe</subfield>
  </datafield>
  <datafield tag="700" ind1=" " ind2=" ">
    <subfield code="u">Nextworks</subfield>
    <subfield code="a">Carrozzo, Gino</subfield>
  </datafield>
  <datafield tag="700" ind1=" " ind2=" ">
    <subfield code="u">University of Murcia</subfield>
    <subfield code="a">Huertas Celdran, Alberto</subfield>
  </datafield>
  <datafield tag="700" ind1=" " ind2=" ">
    <subfield code="u">University of Murcia</subfield>
    <subfield code="a">Gil Perez, Manuel</subfield>
  </datafield>
  <datafield tag="700" ind1=" " ind2=" ">
    <subfield code="u">University of West Scotland</subfield>
    <subfield code="a">Alcaraz Calero, Jose M.</subfield>
  </datafield>
  <datafield tag="700" ind1=" " ind2=" ">
    <subfield code="u">University of West Scotland</subfield>
    <subfield code="a">Wang, Qi</subfield>
  </datafield>
  <datafield tag="700" ind1=" " ind2=" ">
    <subfield code="u">Creative Systems Engineering</subfield>
    <subfield code="a">Koutsopoulos, Konstantinos</subfield>
  </datafield>
  <datafield tag="700" ind1=" " ind2=" ">
    <subfield code="u">Altice Labs</subfield>
    <subfield code="a">Neves, Pedro</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2=" ">
    <subfield code="s">296033</subfield>
    <subfield code="z">md5:4eaf7908ecf8dd368e37b3e1b8fb72a6</subfield>
    <subfield code="u">https://zenodo.org/record/1489770/files/ICN17.pdf</subfield>
  </datafield>
  <datafield tag="542" ind1=" " ind2=" ">
    <subfield code="l">open</subfield>
  </datafield>
  <datafield tag="260" ind1=" " ind2=" ">
    <subfield code="c">2017-04-25</subfield>
  </datafield>
  <datafield tag="909" ind1="C" ind2="O">
    <subfield code="p">openaire</subfield>
    <subfield code="o">oai:zenodo.org:1489770</subfield>
  </datafield>
  <datafield tag="100" ind1=" " ind2=" ">
    <subfield code="u">Nextworks</subfield>
    <subfield code="a">Bernini, Giacomo</subfield>
  </datafield>
  <datafield tag="245" ind1=" " ind2=" ">
    <subfield code="a">Combined NFV and SDN Applications for Mitigation of Cyber-Attacks Conducted by Botnets in 5G Mobile Networks</subfield>
  </datafield>
  <datafield tag="536" ind1=" " ind2=" ">
    <subfield code="c">671672</subfield>
    <subfield code="a">SELFNET - FRAMEWORK FOR SELF-ORGANIZED NETWORK MANAGEMENT IN VIRTUALIZED AND SOFTWARE DEFINED NETWORKS</subfield>
  </datafield>
  <datafield tag="540" ind1=" " ind2=" ">
    <subfield code="u">https://creativecommons.org/licenses/by/4.0/legalcode</subfield>
    <subfield code="a">Creative Commons Attribution 4.0 International</subfield>
  </datafield>
  <datafield tag="650" ind1="1" ind2="7">
    <subfield code="a">cc-by</subfield>
    <subfield code="2">opendefinition.org</subfield>
  </datafield>
  <datafield tag="520" ind1=" " ind2=" ">
    <subfield code="a">&lt;p&gt;5G networks are envisioned to support substantially more users than the current 4G does as a direct consequence of the anticipated large diffusion of Machine-2-Machine (M2M) and Internet of Things (IoT) interconnected devices, often with significantly higher committed data rates than general bandwidth currently available into Long Term Evolution (LTE) and broadband networks. The expected large number of 5G subscribers will offer new opportunities to compromise devices and user services, which will allow attackers to trigger much larger and effective cyberattacks. Significant advances in network management automation are therefore needed to manage 5G networks and services in an efficient, scalable, and effective way while protecting users and infrastructures from a wide plethora of advanced security threats. This paper presents a novel self-organized network management approach for 5G mobile networks where autonomic capabilities are tightly combined with Network Functions Virtualization (NFV) and Software-Defined Networking (SDN) technologies so as to provide an effective detection and mitigation of cyber-attacks.&lt;/p&gt;</subfield>
  </datafield>
  <datafield tag="773" ind1=" " ind2=" ">
    <subfield code="n">doi</subfield>
    <subfield code="i">isVersionOf</subfield>
    <subfield code="a">10.5281/zenodo.1489769</subfield>
  </datafield>
  <datafield tag="024" ind1=" " ind2=" ">
    <subfield code="a">10.5281/zenodo.1489770</subfield>
    <subfield code="2">doi</subfield>
  </datafield>
  <datafield tag="980" ind1=" " ind2=" ">
    <subfield code="a">publication</subfield>
    <subfield code="b">conferencepaper</subfield>
  </datafield>
</record>
47
32
views
downloads
All versions This version
Views 4747
Downloads 3232
Data volume 9.5 MB9.5 MB
Unique views 4242
Unique downloads 3030

Share

Cite as