Securing real world 5G MEC deployments

Detalhes bibliográficos
Autor(a) principal: Escaleira, Pedro Miguel Nicolau
Data de Publicação: 2022
Tipo de documento: Dissertação
Idioma: eng
Título da fonte: Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos)
Texto Completo: http://hdl.handle.net/10773/38905
Resumo: Edge Computing is a paradigm that has been gaining some popularity among the research community and the telecommunications industry, since it is viewed, by some, as a 5th Generation Mobile Network (5G) technology enabler. Some of its promises include a decrease in network latency and an increase in network throughput, by allowing computation to be performed at the Edge of the network, rather than on distant Cloud servers. These and other associated benefits are crucial for multiple businesses’ vertical use cases, such as Smart Factories, Intelligent Transportation Systems, Smart Cities, or Big Data Analytics, among many others. However, although some standardization organizations, such as the European Telecommunications Standards Institute (ETSI), have been gathering efforts to specify this new paradigm, there is still a lack of real implementations and evaluations of a fully functional Edge Computing architecture. By this fact, the security aspects related to this new concept have been overlooked. Most of the academic research done in that field, until this point, is more focused on the theoretical than on the practical aspects, which leads to an absence of real cybersecurity implementations that can be used in a real Edge Computing infrastructure. To this end, this dissertation aims to propose a system to enhance the security of applications deployed at the network’s Edge. Therefore, it first proposes a state of the art Multi-access Edge Computing (MEC) architecture based on the Network Functions Virtualization (NFV) framework, with a Proof of Concept (PoC), to fill the gap that exists in MEC implementations. Then, with that architecture in mind, it is proposed the first Moving Target Defense as a Service (MTDaaS) mechanism to date, which allows a Telecommunications Operator to offer an MTD system that protects any of its clients’ MEC Applications. The created methodology increases the protection of an application by increasing its heterogeneity, which in this work was achieved by moving the application’s version being executed over time. The evaluation made towards the PoC of that MTDaaS methodology demonstrated an increase of the attack difficulty in all phases of the Intrusion Kill Chain, except for the Weaponization and Delivery, meaning that with the presence of this system, a potential intruder will have less success in achieving its objectives when attempting to assault a MEC Application.
id RCAP_fe7c40bcd22a7075a1e847820c13dff9
oai_identifier_str oai:ria.ua.pt:10773/38905
network_acronym_str RCAP
network_name_str Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos)
repository_id_str 7160
spelling Securing real world 5G MEC deployments5GMECNFVMANOOSMMTDMTDaaSCybersecurityEdge Computing is a paradigm that has been gaining some popularity among the research community and the telecommunications industry, since it is viewed, by some, as a 5th Generation Mobile Network (5G) technology enabler. Some of its promises include a decrease in network latency and an increase in network throughput, by allowing computation to be performed at the Edge of the network, rather than on distant Cloud servers. These and other associated benefits are crucial for multiple businesses’ vertical use cases, such as Smart Factories, Intelligent Transportation Systems, Smart Cities, or Big Data Analytics, among many others. However, although some standardization organizations, such as the European Telecommunications Standards Institute (ETSI), have been gathering efforts to specify this new paradigm, there is still a lack of real implementations and evaluations of a fully functional Edge Computing architecture. By this fact, the security aspects related to this new concept have been overlooked. Most of the academic research done in that field, until this point, is more focused on the theoretical than on the practical aspects, which leads to an absence of real cybersecurity implementations that can be used in a real Edge Computing infrastructure. To this end, this dissertation aims to propose a system to enhance the security of applications deployed at the network’s Edge. Therefore, it first proposes a state of the art Multi-access Edge Computing (MEC) architecture based on the Network Functions Virtualization (NFV) framework, with a Proof of Concept (PoC), to fill the gap that exists in MEC implementations. Then, with that architecture in mind, it is proposed the first Moving Target Defense as a Service (MTDaaS) mechanism to date, which allows a Telecommunications Operator to offer an MTD system that protects any of its clients’ MEC Applications. The created methodology increases the protection of an application by increasing its heterogeneity, which in this work was achieved by moving the application’s version being executed over time. The evaluation made towards the PoC of that MTDaaS methodology demonstrated an increase of the attack difficulty in all phases of the Intrusion Kill Chain, except for the Weaponization and Delivery, meaning that with the presence of this system, a potential intruder will have less success in achieving its objectives when attempting to assault a MEC Application.Edge Computing é um paradigma que tem vindo a ganhar popularidade quer entre a comunidade académica, quer na indústria de telecomunicações, uma vez que é considerado um dos facilitadores da tecnologia da Rede Móvel de 5ª Geração (5G). Algumas de suas promessas incluem a diminuição da latência e um aumento na taxa de transferência da rede, permitindo que a computação seja realizada no “limite da rede“, ao invés de em servidores Cloud distantes. Esses e outros benefícios são cruciais para os casos de uso de certos verticais, como Fábricas, Sistemas de Transporte e Cidades Inteligentes ou Análise de Big Data, entre muitos outros. No entanto, embora algumas organizações de normalização, como o European Telecommunications Standards Institute (ETSI), tenham vindo a reunir esforços para especificar este novo paradigma, existe ainda alguma carência de implementações e avaliações reais de uma arquitetura de Edge Computing funcional. Desta forma, os aspetos de segurança relacionados a este novo conceito têm vindo a ser negligenciados. Grande parte da pesquisa académica feita nesta área tem tido um maior foco nos aspetos teóricos do que nos práticos, resultando na ausência de implementações de segurança concretas que possam ser usadas numa infraestrutura real de Edge Computing. Assim sendo, esta dissertação tem como objetivo propor um sistema que aumente a segurança de aplicações instaladas nestes ambientes. Portanto, tendo em conta a lacuna existente relacionada a implementações de Edge, este trabalho começa por propor uma arquitetura de Multi-access Edge Computing (MEC) baseada baseada em Network Functions Virtualization (NFV), assim como uma Prova de Conceito (PoC) da mesma. De seguida, considerando esta arquitetura, é proposto o primeiro mecanismo de Moving Target Defense as a Service (MTDaaS) até à data, que permite que um Operador de Telecomunicações ofereça um sistema MTD que proteja qualquer Aplicação MEC dos seus clientes. A metodologia criada aumenta a proteção de uma aplicação ao expandir a sua heterogeneidade, o que neste trabalho foi alcançado movendo a versão da aplicação que é executada ao longo do tempo. A avaliação feita ao PoC da metodologia MTDaaS demonstrou um aumento na dificuldade de ataque em todas as fases da Intrusion Kill Chain, exceto nas fases de Weaponization e Delivery, permitindo concluir que, com a presença deste sistema, um potencial atacante terá menos sucesso em alcançar os seu objetivos ao tentar atacar uma Aplicação MEC.2023-07-21T14:19:37Z2022-12-14T00:00:00Z2022-12-14info:eu-repo/semantics/publishedVersioninfo:eu-repo/semantics/masterThesisapplication/pdfhttp://hdl.handle.net/10773/38905engEscaleira, Pedro Miguel Nicolauinfo:eu-repo/semantics/openAccessreponame:Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos)instname:Agência para a Sociedade do Conhecimento (UMIC) - FCT - Sociedade da Informaçãoinstacron:RCAAP2024-02-22T12:15:47Zoai:ria.ua.pt:10773/38905Portal AgregadorONGhttps://www.rcaap.pt/oai/openaireopendoar:71602024-03-20T03:09:07.966854Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos) - Agência para a Sociedade do Conhecimento (UMIC) - FCT - Sociedade da Informaçãofalse
dc.title.none.fl_str_mv Securing real world 5G MEC deployments
title Securing real world 5G MEC deployments
spellingShingle Securing real world 5G MEC deployments
Escaleira, Pedro Miguel Nicolau
5G
MEC
NFV
MANO
OSM
MTD
MTDaaS
Cybersecurity
title_short Securing real world 5G MEC deployments
title_full Securing real world 5G MEC deployments
title_fullStr Securing real world 5G MEC deployments
title_full_unstemmed Securing real world 5G MEC deployments
title_sort Securing real world 5G MEC deployments
author Escaleira, Pedro Miguel Nicolau
author_facet Escaleira, Pedro Miguel Nicolau
author_role author
dc.contributor.author.fl_str_mv Escaleira, Pedro Miguel Nicolau
dc.subject.por.fl_str_mv 5G
MEC
NFV
MANO
OSM
MTD
MTDaaS
Cybersecurity
topic 5G
MEC
NFV
MANO
OSM
MTD
MTDaaS
Cybersecurity
description Edge Computing is a paradigm that has been gaining some popularity among the research community and the telecommunications industry, since it is viewed, by some, as a 5th Generation Mobile Network (5G) technology enabler. Some of its promises include a decrease in network latency and an increase in network throughput, by allowing computation to be performed at the Edge of the network, rather than on distant Cloud servers. These and other associated benefits are crucial for multiple businesses’ vertical use cases, such as Smart Factories, Intelligent Transportation Systems, Smart Cities, or Big Data Analytics, among many others. However, although some standardization organizations, such as the European Telecommunications Standards Institute (ETSI), have been gathering efforts to specify this new paradigm, there is still a lack of real implementations and evaluations of a fully functional Edge Computing architecture. By this fact, the security aspects related to this new concept have been overlooked. Most of the academic research done in that field, until this point, is more focused on the theoretical than on the practical aspects, which leads to an absence of real cybersecurity implementations that can be used in a real Edge Computing infrastructure. To this end, this dissertation aims to propose a system to enhance the security of applications deployed at the network’s Edge. Therefore, it first proposes a state of the art Multi-access Edge Computing (MEC) architecture based on the Network Functions Virtualization (NFV) framework, with a Proof of Concept (PoC), to fill the gap that exists in MEC implementations. Then, with that architecture in mind, it is proposed the first Moving Target Defense as a Service (MTDaaS) mechanism to date, which allows a Telecommunications Operator to offer an MTD system that protects any of its clients’ MEC Applications. The created methodology increases the protection of an application by increasing its heterogeneity, which in this work was achieved by moving the application’s version being executed over time. The evaluation made towards the PoC of that MTDaaS methodology demonstrated an increase of the attack difficulty in all phases of the Intrusion Kill Chain, except for the Weaponization and Delivery, meaning that with the presence of this system, a potential intruder will have less success in achieving its objectives when attempting to assault a MEC Application.
publishDate 2022
dc.date.none.fl_str_mv 2022-12-14T00:00:00Z
2022-12-14
2023-07-21T14:19:37Z
dc.type.status.fl_str_mv info:eu-repo/semantics/publishedVersion
dc.type.driver.fl_str_mv info:eu-repo/semantics/masterThesis
format masterThesis
status_str publishedVersion
dc.identifier.uri.fl_str_mv http://hdl.handle.net/10773/38905
url http://hdl.handle.net/10773/38905
dc.language.iso.fl_str_mv eng
language eng
dc.rights.driver.fl_str_mv info:eu-repo/semantics/openAccess
eu_rights_str_mv openAccess
dc.format.none.fl_str_mv application/pdf
dc.source.none.fl_str_mv reponame:Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos)
instname:Agência para a Sociedade do Conhecimento (UMIC) - FCT - Sociedade da Informação
instacron:RCAAP
instname_str Agência para a Sociedade do Conhecimento (UMIC) - FCT - Sociedade da Informação
instacron_str RCAAP
institution RCAAP
reponame_str Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos)
collection Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos)
repository.name.fl_str_mv Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos) - Agência para a Sociedade do Conhecimento (UMIC) - FCT - Sociedade da Informação
repository.mail.fl_str_mv
_version_ 1799137742393704448