Early warning model of cyber threats in 5G networks using Markov processes
DOI:
https://doi.org/10.30837/rt.2024.1.216.08Keywords:
Cyber threat, 5G networks, Markov processes, Vulnerability detection and remediationAbstract
Security of telecommunication networks, in which the transmission channel can be used by many users simultaneously, is a particularly important problem. In wireless metropolitan networks, this problem is compounded by the fact that the communication channel is publicly available. In other words, information transmitted in such networks can be easily intercepted by intruders. This can lead to theft of personal data, financial losses, or even to a breach of security of critical infrastructure.
Information security can be compromised by failures that affect the availability, integrity, or confidentiality of information. These failures can be caused by vulnerabilities, namely, defects in software or hardware that can be exploited by attackers to gain unauthorized access to information. Information security is one of the components of 5G networks reliability. The main security threat to such systems is vulnerabilities, primarily of software components. Despite the fact that information about vulnerabilities of software products is publicly available, there is not enough data to quantify the security of these products using a single general criterion. It is also impossible to predict how well they will be protected from attacks in the future. One of the main problems of choosing the most secure 5G configuration is the difficulty in quantifying the level of information security. In addition, it is difficult to choose adequate evaluation indicators that take into account all the factors affecting successful network penetration and the amount of potential damage.
The search for vulnerabilities in software components is an urgent and resource-intensive task that has recently been taken up by large companies and research centers. Analysis of vulnerability detection and remediation processes shows that they can be described by a mass service system with an infinite queue length.
A model for early warning of cyber threats in 5G networks using Markov processes has been developed. Using simulation modeling in the Matlab environment, a time diagram of the arrival of requests for vulnerability detection was obtained. The change in the probabilities of states was also obtained. Thus, knowing the intensity of the flows, it is possible to model and predict the processes of the arrival of requests for vulnerability detection in real time.
References
Nick McKeown. Openflow: enabling innovation in campus networks/ Nick McKeown, Tom Anderson, Hari Balakrishnan, Guru Parulkar, Larry Peterson, Jennifer Rexford, Scott Shenker, Jonathan Turner // ACM SIGCOMM Computer Communication Review, 38[2]. 2008. Р. 69–74.
OpenFlow Switch Specification Ver 1.5.1, 2016 [accessed January 11, 2016]. https://www.opennetworking.org/images/stories/downloads/sdnresources/ onf-specifications/openflow/openflow-switch-v1.5.1.pdf.
Партика Т.Л., Попов І.І. Інформаційна безпека : навч. посіб. для студентів закладів середньой професійної освіти. Москва : ФОРУМ: ІНФРА-М, 2002. 368с.
Лукацький А. Інформаційна безпека 2015 // Іт-безпека. Стандарти. Засоби захисту. Заходи. 2013. № 12. С.64–69.
Ложковський А.Г. Теорія масового обслуговування в телекомунікаціях : підручник. Одеса : ОНАС ім. А. С. Попова, 2012. 112 с. ISBN 978-966-7595-43-3.
Ложковський А.Г. Моделювання багатоканальної системи обслуговування з організацією черги / А.Г. Ложковський, Н.С. Салманов, О.В.Вербанов // Східно-європейський журнал передових технологій. 2007. №3/6(27). С.72–76.
Muliar B., Koliadenko Y., Moskalets M., Loshakov V. and Ageyev D. Interaction Model and Phase States at Frequency Resource Allocation in a Grouping of Radio-Electronic Equipment of 5G Mobile Communication Network // 2022 IEEE 9th International Conference on Problems of Infocommunications, Science and Technology (PIC S&T), Kharkiv, Ukraine, 2022, pp. 495–501, doi: 10.1109/PICST57299.2022.10238581.
Koliadenko Y., Moskalets M., Badieiev V., Savchenko R. (2023). Method Radio Resource Allocation in Cognitive Radio Network // Dovgyi, S., Trofymchuk, O., Ustimenko, V., Globa, L. (eds) Information and Communication Technologies and Sustainable Development. ICT&SD 2022. Lecture Notes in Networks and Systems, vol 809. Springer, Cham. Pp. 102-115 https://doi.org/10.1007/978-3-031-46880-3_7
Downloads
Published
How to Cite
Issue
Section
License
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).