The mobile telecommunications industry is moving swiftly towards 5G networks that will offer ultra-fast mobile broadband and ultra-low latency services with exceptional reliability for vertical markets. To meet the surge in demand for connectivity, mobile network operators (MNOs) are finding it exceedingly difficult to offset the capital and operational expenses of traditional Radio Access Networks (RANs) against the reduced income. Cloud RANs (C-RANs) are a feasible alternative, offering seemingly infinite resources (i.e., compute, storage, radio), centralized operation of baseband units (BBUs), and scalable deployment of lightweight remote radio heads (RRHs) as small cells. C-RANs enable flexible coordination between centralized virtual BBUs (vBBUs) and distributed virtual RRHs (vRRHs) that are managed via software-defined networking (SDN) and network functions virtualization (NFV), focusing on the flexible and elastic 5G network slicing to meet end-user demands for different levels of quality of service (QoS). Furthermore, virtualization and elastic resource allocation facilitate on-demand hosting of additional services within C-RAN. However, as C-RANs consist of a large number of resources that act as pivotal connecting points, a security breach could lead to the unavailability of resources, and compromise the integrity of system and data. Furthermore, an attack, such as distributed denial-of-service (DDoS), could potentially disrupt services and degrade QoS/QoE for legitimate end-users, resulting in loss of revenue for, and reputation of, the service provider. Hence, it is imperative to secure C-RANs and their services, to ensure high levels of robustness and dependability.
Traditional hardware-based security middleboxes (e.g., firewalls, deep packet inspection) are inflexible for the dynamic and volatile C-RAN environment. Thus, this project aims to provide a novel and timely solution to address security in C-RANs, particularly focusing on: (i) automated intrusion detection - automatically protect E-RANs against known and unknown DDoS attacks, and (ii) automated attack response and mitigation - efficiently and automatically deploy countermeasures at the network edge. This project will leverage machine learning (ML) to develop novel techniques for anomaly-based intrusion detection. For response and mitigation, ML along with the flexibility of SDN and NFV will be leveraged for efficient network slice reconfiguration across a multi-tenant C-RAN infrastructure. The proposed research will broaden the scope of intrusion detection and mitigation, including protection against zero-day threats in C-RANs.
A. Tabiban, H. A. Alameddine, M. A. Salahuddin, R. Boutaba. Signaling Storm in O-RAN: Challenges and Research Opportunities. IEEE Communications Magazine. Accepted December 2023.
V. Pourahmadi, H. Alameddine, M. A. Salahuddin, and R. Boutaba. Spotting Anomalies at the Edge: Outlier Exposure-based Cross-silo Federated Learning for DDoS Detection. IEEE Transactions on Dependable and Secure Computing. IEEE Press. Vol. 20(5), pp. 4002-4015, September-October 2023.