Abstract
A novel security management framework is presented in this paper leveraging the current ETSI NFV MANO architecture and taking into account Software Defined Security principles. Specifically, the proposed VISECO framework allows developers, service providers to consider security across lifecycle: from embedding of security properties in the source code, parsing and interpreting for automatic deployment to active responding during operation. Mobile operator can use VISECO to secure its infrastructure and to provide “Security-as-a-Service” solution to potential customers such as IoT service providers. As an illustration, a framework prototyping and an IoT use case application are implemented and discussed.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Gartner Forecasts Worldwide Cloud-Based Security Services to Grow 21 Percent in 2017. http://www.gartner.com/newsroom/id/3744617
I2NSF Problem Statement and Use Cases. https://tools.ietf.org/html/draft-ietf-i2nsf-problem-and-use-cases-16
ETSI NFV Security Management and Monitoring. http://www.etsi.org/deliver/etsi_gs/NFV-SEC/001_099/013/03.01.01_60/gs_NFV-SEC013v030101p.pdf
5G-PPP Phase 1 Security Landscape. https://5g-ppp.eu/new-security-group-5g-ppp-white-paper-phase-1-security-landscape/
IETF Interface to Network Security Functions (I2NSF) RFC 8192: Problem Statement and Use Cases, July 2017. https://tools.ietf.org/html/rfc8192
Smith, D.: No Stopping Johannesburg’s Traffic Light Thieves, January 2011. http://www.guardian.co.uk/world/2011/jan/06/johannesburg-traffic-light-thieves-sim
Fox-Brewster, T.: How Hacked Cameras are Helping Launch the Biggest Attacks the Internet has Ever Seen, September 2016. https://www.forbes.com/sites/thomasbrewster/2016/09/25/brian-krebs-overwatch-ovh-smashed-by-largest-ddos-attacks-ever/
Market Guide for Mobile Threat Defense Solutions, August 2017. https://www.gartner.com/doc/3789664/market-guide-mobile-threat-defense
Requirements for Client-Facing Interface to Security Controller. https://tools.ietf.org/html/draft-ietf-i2nsf-client-facing-interface-req-03
Jaeger, B.: Security orchestrator: introducing a security orchestrator in the context of the ETSI NFV reference architecture. In: 2015 IEEE Trustcom/BigDataSE/ISPA, Helsinki, pp. 1255–1260 (2015)
Open Security Controller Project. https://www.opensecuritycontroller.org
Cisco Defense Orchestrator. http://www.cisco.com/c/dam/en/us/products/collateral/security/defense-orchestrator/at-a-glance-c45-736943.pdf
T-NOVA European FP7 Project. http://www.t-nova.eu/objectives/
5G ENSURE Project. http://www.5gensure.eu
5G SONATA Project. http://www.sonata-nfv.eu
SHIELD Project. https://torsec.github.io/shield-h2020/
ANASTACIA Project. http://www.anastacia-h2020.eu
Cloud Security, Identity & Compliance with AWS. https://aws.amazon.com/products/security/
Google Cloud Platform Security. https://cloud.google.com/security/
OpenStack Security Guide. https://docs.openstack.org/security-guide/
Cloud Native Computing Foundation. https://www.cncf.io/
What CSOs Need to Know About Software-Defined Security. http://itsecurityleaders.com/wp-content/uploads/2015/03/Cloud-Passage-What-CSOs-Need-To-Know-About-SDSec.pdf
ETSI NFV MANO Specification. http://www.etsi.org/deliver/etsi_gs/NFV-MAN/001_099/001/01.01.01_60/gs_NFV-MAN001v010101p.pdf
ETSI GR NFV-IFA 015: Management and Orchestration; Report on NFV Information Model, January 2017. http://www.etsi.org/deliver/etsi_gr/NFV-IFA/001_099/015/02.01.01_60/gr_NFV-IFA015v020101p.pdf
TOSCA Simple Profile for NFV, March 2016. http://docs.oasis-open.org/tosca/tosca-nfv/v1.0/csd03/tosca-nfv-v1.0-csd03.pdf
Open Mobile Alliance: Next Generation Service Interfaces Architecture, May 2012. http://www.openmobilealliance.org/release/NGSI/V1_0-20120529-A/OMA-AD-NGSI-V1_0-20120529-A.pdf
FIWARE-NGSI v2 Specification. http://fiware.github.io/context.Orion/api/v2/stable/
OpenBaton, http://openbaton.github.io
FIWARE Orion Context Broker GE. https://fiware-orion.readthedocs.io
A Simple Yet Powerful Java Rules Engine. https://github.com/j-easy/easy-rules/wiki
Drools - Business Rules Management System. https://www.drools.org/
Spring Framework: The Source for Modern Java. https://spring.io
H2020 ARCADIA Project. http://www.arcadia-framework.eu
H2020 ASTRID Project. https://www.astrid-project.eu
Acknowledgment
The research leading to these results has partly received funding from the European Community’s Horizon 2020 Framework Programme (ASTRID project [34] under grant no. 786922).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Thanh, T.Q., Covaci, S., Magedanz, T. (2019). VISECO: An Annotated Security Management Framework for 5G. In: Renault, É., Boumerdassi, S., Bouzefrane, S. (eds) Mobile, Secure, and Programmable Networking. MSPN 2018. Lecture Notes in Computer Science(), vol 11005. Springer, Cham. https://doi.org/10.1007/978-3-030-03101-5_21
Download citation
DOI: https://doi.org/10.1007/978-3-030-03101-5_21
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-03100-8
Online ISBN: 978-3-030-03101-5
eBook Packages: Computer ScienceComputer Science (R0)