Home > Research > Publications & Outputs > Joint Security-vs-QoS Framework

Electronic data

  • Joint Security-vs-QoS Framework Optimizing the Selection of

    Rights statement: © ACM, 2022. This is the author's version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution. The definitive version was published in ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and Security http://doi.acm.org/10.1145/3538969.3544480

    Accepted author manuscript, 543 KB, PDF document

    Available under license: CC BY: Creative Commons Attribution 4.0 International License

Links

Text available via DOI:

View graph of relations

Joint Security-vs-QoS Framework: Optimizing the Selection of Intrusion Detection Mechanisms in 5G networks

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Published

Standard

Joint Security-vs-QoS Framework: Optimizing the Selection of Intrusion Detection Mechanisms in 5G networks. / Bozorgchenani, Arash; Zarakovitis, Charilaos; Fong Chien, Su et al.
ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and Security. New York: ACM, 2022. 67.

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Harvard

Bozorgchenani, A, Zarakovitis, C, Fong Chien, S, Siong Lim, H, Ni, Q, Gouglidis, A & Mallouli, W 2022, Joint Security-vs-QoS Framework: Optimizing the Selection of Intrusion Detection Mechanisms in 5G networks. in ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and Security., 67, ACM, New York. https://doi.org/10.1145/3538969.3544480

APA

Bozorgchenani, A., Zarakovitis, C., Fong Chien, S., Siong Lim, H., Ni, Q., Gouglidis, A., & Mallouli, W. (2022). Joint Security-vs-QoS Framework: Optimizing the Selection of Intrusion Detection Mechanisms in 5G networks. In ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and Security Article 67 ACM. https://doi.org/10.1145/3538969.3544480

Vancouver

Bozorgchenani A, Zarakovitis C, Fong Chien S, Siong Lim H, Ni Q, Gouglidis A et al. Joint Security-vs-QoS Framework: Optimizing the Selection of Intrusion Detection Mechanisms in 5G networks. In ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and Security. New York: ACM. 2022. 67 doi: 10.1145/3538969.3544480

Author

Bozorgchenani, Arash ; Zarakovitis, Charilaos ; Fong Chien, Su et al. / Joint Security-vs-QoS Framework : Optimizing the Selection of Intrusion Detection Mechanisms in 5G networks. ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and Security. New York : ACM, 2022.

Bibtex

@inproceedings{08ef44cb1bf847479730135ea04d164c,
title = "Joint Security-vs-QoS Framework: Optimizing the Selection of Intrusion Detection Mechanisms in 5G networks",
abstract = "The advent of 5G technology introduces new - and potentially undiscovered - cybersecurity challenges, with unforeseen impacts on our economy, society, and environment. Interestingly, Intrusion Detection Mechanisms (IDMs) can provide the necessary network monitoring to ensure - to a big extent - the detection of 5G-related cyberattacks. Yet, how to realize the attack surface of 5G networks with respect to the detected risks, and, consequently, how to optimize the cybersecurity levels of the network, remains an open critical challenge. In respect, this work focuses on deploying multiple distributed Security Agents (SAs) that can run different IDMs over various network components and proposes a cybersecurity mechanism for optimizing the network{\textquoteright}s attack surface with respect to the Quality of Service (QoS). The proposed approach relies on a new closed-form utility function to describe the trade-off between cybersecurity and QoS and uses multi-objective optimization to improve the selection of each SA detection level. We demonstrate via simulations that before optimization, an increase in the detection level of SAs brings a direct decrease in QoS as more computational, bandwidth and monetary resources are utilized for IDM processing. Thereby, after optimization, we demonstrate that our mechanism can strike a balance between cybersecurity and QoS while showcasing the impact of the importance of different objectives of the joint optimization.",
author = "Arash Bozorgchenani and Charilaos Zarakovitis and {Fong Chien}, Su and {Siong Lim}, Heng and Qiang Ni and Antonios Gouglidis and Wissam Mallouli",
note = "{\textcopyright} ACM, 2022. This is the author's version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution. The definitive version was published in ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and Security http://doi.acm.org/10.1145/3538969.3544480",
year = "2022",
month = aug,
day = "23",
doi = "10.1145/3538969.3544480",
language = "English",
booktitle = "ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and Security",
publisher = "ACM",

}

RIS

TY - GEN

T1 - Joint Security-vs-QoS Framework

T2 - Optimizing the Selection of Intrusion Detection Mechanisms in 5G networks

AU - Bozorgchenani, Arash

AU - Zarakovitis, Charilaos

AU - Fong Chien, Su

AU - Siong Lim, Heng

AU - Ni, Qiang

AU - Gouglidis, Antonios

AU - Mallouli, Wissam

N1 - © ACM, 2022. This is the author's version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution. The definitive version was published in ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and Security http://doi.acm.org/10.1145/3538969.3544480

PY - 2022/8/23

Y1 - 2022/8/23

N2 - The advent of 5G technology introduces new - and potentially undiscovered - cybersecurity challenges, with unforeseen impacts on our economy, society, and environment. Interestingly, Intrusion Detection Mechanisms (IDMs) can provide the necessary network monitoring to ensure - to a big extent - the detection of 5G-related cyberattacks. Yet, how to realize the attack surface of 5G networks with respect to the detected risks, and, consequently, how to optimize the cybersecurity levels of the network, remains an open critical challenge. In respect, this work focuses on deploying multiple distributed Security Agents (SAs) that can run different IDMs over various network components and proposes a cybersecurity mechanism for optimizing the network’s attack surface with respect to the Quality of Service (QoS). The proposed approach relies on a new closed-form utility function to describe the trade-off between cybersecurity and QoS and uses multi-objective optimization to improve the selection of each SA detection level. We demonstrate via simulations that before optimization, an increase in the detection level of SAs brings a direct decrease in QoS as more computational, bandwidth and monetary resources are utilized for IDM processing. Thereby, after optimization, we demonstrate that our mechanism can strike a balance between cybersecurity and QoS while showcasing the impact of the importance of different objectives of the joint optimization.

AB - The advent of 5G technology introduces new - and potentially undiscovered - cybersecurity challenges, with unforeseen impacts on our economy, society, and environment. Interestingly, Intrusion Detection Mechanisms (IDMs) can provide the necessary network monitoring to ensure - to a big extent - the detection of 5G-related cyberattacks. Yet, how to realize the attack surface of 5G networks with respect to the detected risks, and, consequently, how to optimize the cybersecurity levels of the network, remains an open critical challenge. In respect, this work focuses on deploying multiple distributed Security Agents (SAs) that can run different IDMs over various network components and proposes a cybersecurity mechanism for optimizing the network’s attack surface with respect to the Quality of Service (QoS). The proposed approach relies on a new closed-form utility function to describe the trade-off between cybersecurity and QoS and uses multi-objective optimization to improve the selection of each SA detection level. We demonstrate via simulations that before optimization, an increase in the detection level of SAs brings a direct decrease in QoS as more computational, bandwidth and monetary resources are utilized for IDM processing. Thereby, after optimization, we demonstrate that our mechanism can strike a balance between cybersecurity and QoS while showcasing the impact of the importance of different objectives of the joint optimization.

U2 - 10.1145/3538969.3544480

DO - 10.1145/3538969.3544480

M3 - Conference contribution/Paper

BT - ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and Security

PB - ACM

CY - New York

ER -