Network security and in particular, dynamic virtual security agent (VSA) based monitoring in a network.
The Third Generation Partnership Project (3GPP) has developed and is developing standards for Fourth Generation (4G) (also referred to as Long Term Evolution (LTE)) and Fifth Generation (5G) (also referred to as New Radio (NR)) wireless communication systems. Such systems provide, among other features, broadband communication between network nodes, such as base stations, and mobile wireless devices (WD), as well as communication between network nodes and between WDs.
In particular, the 5G user plane carries a large bandwidth for transferring the data packets, additionally in several use cases (e.g., ultra-reliable low-latency communication (ULLC) there are constraints on the response time which may make efficient security mechanisms in a security management architecture important in 5G networks as some security mechanisms cause additional delay for these types of communications.
However, there are several issues with such an investigation performed by existing systems. For example, monitoring all wireless devices in the system using network security appliances until a source of the anomaly is found may cause too much delay for certain types of communication such as for ULLC. Further, applying the same network security appliance to all wireless devices in the network until the source of the anomaly is found may be inefficient.
Some embodiments advantageously provide a method and system for dynamic virtual security agent (VSA) based monitoring in a network.
For example, in one or more embodiments, the system proactively finds the potential attackers in the network by placing VSA in the operator's network dynamically in terms of physical locations as well as different layers/tiers, e.g. access, edge or core in order to reduce the resource consumption and provide highly efficient defense mechanisms.
According to one or more embodiments, when one or several wireless devices are suspected of malicious behavior, the network management can rely on different virtual security appliances (VSA) (for example, the trained artificial intelligence (AI)/machine learning (ML) model) to locate the optimal place(s) to put additional VSA instances (also referred to as VSAs) with the optimal functionality to monitor traffic associated with a group of wireless devices. In one or more embodiments, traffic can be steered using SDN (e.g., software-defined networking) or other techniques, which may allow a VSA to avoid extra load. In one or more embodiments, a multi-tier strategy is used in finding/determining places/location in the network to place VSAs in order to narrow down the set of suspected wireless devices (i.e., wireless devices suspected of malicious behavior). These places/locations within the network may be optimal locations that are placed physically and/or logically closer to the suspected wireless device. This may be performed by instantiating the finer grained VSA and placing them appropriately in the network in order to cover smaller and smaller sets of suspected wireless devices. This way, the defense boundary is pushed or located closer to the sources of the attack, i.e., malicious wireless devices.
In one or more embodiments, a “gradual” approach to the detection is implemented, based on using VSA at different levels of granularity, placed accordingly to cover/monitor an appropriate or predefined number of suspect wireless devices in the network. At the high level, the boundary to defend the operator's network is set up and adjusted dynamically based on the outcome of the virtual security assurance prediction model (for example, AI/ML based anomaly detection, classification or/and prediction).
In one or more embodiments, when the suspected wireless devices move from one location to another (e.g., from one cell to another cell), the security orchestrator (SO) works in sync with the mobility management in the operator's network so as to coordinate the move of the wireless device investigation to other VSAs in order to follow moving wireless device(s), which may allow new VSAs to be place physically and/or logically near the wireless device(s) after the move/handover. At the finest grained level, when a VSA is assigned to a wireless device, the VSA moves with the wireless device or changes its location in order to cover the multi-access approach (when wireless device changes access method). In one or more embodiments, at the finest grained level of the process, a single VSA is assigned to a single suspected wireless device.
According to one aspect of the present disclosure, an orchestrator node is provided. The orchestrator node includes processing circuitry configured to: receive, from a first virtual security agent, VSA, an indication of a first plurality of wireless devices where each wireless device of the first plurality of wireless devices meets a first criteria associated with a first level of monitoring of bi-directional network communications; in response to the indication of the first plurality of wireless devices, configure a second VSA to monitor communications associated with each of the first plurality of wireless devices; receive, from the second VSA, an indication of a first subset of the first plurality of wireless devices where each wireless device of the first subset of the first plurality of wireless devices meets a second criteria associated with a second level of monitoring of bi-directional network communications; and determine to modify a granularity of wireless device monitoring of bi-directional network communications based at least on the indication of the first subset of the first plurality of wireless devices.
According to some embodiments of this aspect, the first VSA is configured in a first node and the second VSA is configured in a second node different from the first node. According to some embodiments of this aspect, the processing circuitry is further configured to, in response to the indication of the first plurality of wireless devices, configure a plurality of VSAs to monitor communications associated with each of the first plurality of wireless devices, the plurality of VSAs including the second VSA, where each of the plurality of VSAs is associated with a same logical level of granularity of wireless device monitoring of bi-directional network communications. According to some embodiments of this aspect, the plurality of VSAs are positioned at a plurality of physical locations within a network based at least on a number of the first plurality of wireless devices.
According to some embodiments of this aspect, the plurality of VSAs correspond to the second VSA and at least one clone of the second VSA. According to some embodiments of this aspect, plurality of VSAs are configured to inspect the bi-directional network communications at a protocol level different from a protocol level used by the first VSA. According to some embodiments of this aspect, the first node is one of: a first type of logical node, in a core network, that is different from a second type of logical node, in the core network, associated with the second node, part of the core network while the second node is part of an access network, and in a first type of physical node, in the access network, that is different from a second type of physical node, in the access network, associated with the second node.
According to some embodiments of this aspect, the processing circuitry is configured to determine a location within a network to configure the second VSA where the determined location configured to provide the second VSA access to bi-directional network communications of the first plurality of wireless devices for the monitoring of the first plurality of wireless devices, and the determined location is based at least on a number the first plurality of wireless devices. According to some embodiments of this aspect, the processing circuitry is further configured to cause at least a portion of the bi-direction network communication of the first plurality of wireless devices to be steered toward the second VSA. According to some embodiments of this aspect, the processing circuitry is further configured to receive, from a third VSA, an indication of a second subset of the first subset of the plurality of wireless devices, each wireless device of the second subset meeting a third criteria associated with a third level of monitoring of bi-directional network communications.
According to some embodiments of this aspect, the processing circuitry is further configured to configure a third VSA to monitor communications associated with the first subset of the first plurality of wireless devices, the first subset of the first plurality of wireless devices including only a first wireless device. According to some embodiments of this aspect, the processing circuitry is further configured to: receive monitoring data, from the third VSA, associated with the first wireless device, and determine the first wireless device is associated with at least one network attack. According to some embodiments of this aspect, the processing circuitry is further configured to configure the first VSA in response to at least one network behavior of the first wireless device.
According to some embodiments of this aspect, the processing circuitry is further configured to: determine the first wireless device has participated in a handover process from a first access node to a second access node, and cause the third VSA to move from the first access node to the second access node to continue monitoring the first wireless device. According to some embodiments of this aspect, the modified granularity of wireless device monitoring corresponds to the third VSA being configured to provide a higher granularity of wireless device monitoring than a granularity of wireless device monitoring associated with the second VSA. According to some embodiments of this aspect, the modified granularity corresponds to increasing granularity at least in part by decreasing a number of wireless devices to be monitored.
According to another aspect of the present disclosure, a node in communication with a orchestrator node is provided. The node implements a first monitor a first plurality of wireless devices where each wireless device of the first plurality of wireless devices meets a first criteria associated with a first level of monitoring of bi-directional network communications; determine a first subset of the first plurality of wireless devices meet a second criteria associated with a second level of monitoring of bi-directional network communications different from the first level of monitoring; and indicate the first subset of the first plurality of wireless devices to the orchestrator node for further monitoring by a second VSA.
According to some embodiments of this aspect, the first VSA is configured in a first node that is different from a second node providing the second VSA. According to some embodiments of this aspect, the first node is one of: a first type of logical node, in a core network, that is different from a second type of logical node, in the core network, associated with the second node; part of the core network while the second node is part of an access network, and in a first type of physical node, in the access network, that is different from a second type of physical node, in the access network, associated with the second node. According to some embodiments of this aspect, the first VSA is configured to inspect the bi-direction network communications at a protocol level different from a protocol level used by the second VSA.
According to some embodiments of this aspect, the second level of monitoring is associated with a higher granularity of wireless device monitoring than a granularity of wireless device monitoring associated with the first level of monitoring. According to some embodiments of this aspect, the higher granularity corresponds to a decreased number of wireless devices to be monitored compared to a number of wireless device to be monitored according to the first level of monitoring. According to some embodiments of this aspect, at least a portion of the bi-directional network communications of the first plurality of wireless devices corresponds to communications that are steered to the first VSA.
According to another aspect of the present disclosure, a method implemented by an orchestrator node is provided. An indication of a first plurality of wireless devices is received from a first virtual security agent, VSA, where each wireless device of the first plurality of wireless devices meets a first criteria associated with a first level of monitoring of bi-directional network communications. In response to the indication of the first plurality of wireless devices, a second VSA is configured to monitor communications associated with each of the first plurality of wireless devices. An indication of a first subset of the first plurality of wireless devices is received from the second VSA where each wireless device of the first subset of the first plurality of wireless devices meeting a second criteria associated with a second level of monitoring of bi-directional network communications. A determination is made to modify a granularity of wireless device monitoring of bi-directional network communications based at least on the indication of the first subset of the first plurality of wireless devices.
According to some embodiments of the present disclosure, the first VSA is configured in a first node and the second VSA is configured in a second node different from the first node. According to some embodiments of the present disclosure, in response to the indication of the first plurality of wireless devices, a plurality of VSAs are configured to monitor communications associated with each of the first plurality of wireless devices where the plurality of VSAs include the second VSA, where each of the plurality of VSAs is associated with a same logical level of granularity of wireless device monitoring of bi-directional network communications. According to some embodiments of the present disclosure, the plurality of VSAs are positioned at a plurality of physical locations within a network based at least on a number of the first plurality of wireless devices.
According to some embodiments of the present disclosure, the plurality of VSAs correspond to the second VSA and at least one clone of the second VSA. According to some embodiments of the present disclosure, plurality of VSAs are configured to inspect the bi-directional network communications at a protocol level different from a protocol level used by the first VSA. According to some embodiments of the present disclosure, the first node is one of: a first type of logical node, in a core network, that is different from a second type of logical node, in the core network, associated with the second node; part of the core network while the second node is part of an access network; and in a first type of physical node, in the access network, that is different from a second type of physical node, in the access network, associated with the second node.
According to some embodiments of the present disclosure, a determination is made of a location within a network to configure the second VSA where the determined location is configured to provide the second VSA access to bi-directional network communications of the first plurality of wireless devices for the monitoring of the first plurality of wireless devices, and where the determined location is based at least on a number the first plurality of wireless devices. According to some embodiments of the present disclosure, at least a portion of the bi-direction network communication of the first plurality of wireless devices is caused to be steered toward the second VSA. According to some embodiments of the present disclosure, an indication of a second subset of the first subset of the plurality of wireless devices is received from a third VSA where each wireless device of the second subset meeting a third criteria associated with a third level of monitoring of bi-directional network communications.
According to some embodiments of the present disclosure, a third VSA is configured to monitor communications associated with the first subset of the first plurality of wireless devices where the first subset of the first plurality of wireless devices includes only a first wireless device. According to some embodiments of the present disclosure, monitoring data is received from the third VSA and is associated with the first wireless device. A determination is made that the first wireless device is associated with at least one network attack. According to some embodiments of the present disclosure, the first VSA is configured in response to at least one network behavior of the first wireless device.
According to some embodiments of the present disclosure, a determination is made that the first wireless device has participated in a handover process from a first access node to a second access node. The third VSA is caused to move from the first access node to the second access node to continue monitoring the first wireless device. According to some embodiments of the present disclosure, the modified granularity of wireless device monitoring corresponds to the third VSA being configured to provide a higher granularity of wireless device monitoring than a granularity of wireless device monitoring associated with the second VSA. According to some embodiments of the present disclosure, the modified granularity corresponds to increasing granularity at least in part by decreasing a number of wireless devices to be monitored.
According to another aspect of the present disclosure, a method implemented by a node that is in communication with a orchestrator node is provided. The node implements a first virtual security agent, VSA. A first plurality of wireless devices are monitored where each wireless device of the first plurality of wireless devices meet a first criteria associated with a first level of monitoring of bi-directional network communications. A determination is made that a first subset of the first plurality of wireless devices meet a second criteria associated with a second level of monitoring of bi-directional network communications different from the first level of monitoring. The first subset of the first plurality of wireless devices are indicated to the orchestrator node for further monitoring by a second VSA.
According to some embodiments of this aspect, the first VSA is configured in a first node that is different from a second node providing the second VSA. According to some embodiments of this aspect, the first node is one of: a first type of logical node, in a core network, that is different from a second type of logical node, in the core network, associated with the second node; part of the core network while the second node is part of an access network; and in a first type of physical node, in the access network, that is different from a second type of physical node, in the access network, associated with the second node. According to some embodiments of this aspect, the first VSA is configured to inspect the bi-direction network communications at a protocol level different from a protocol level used by the second VSA.
According to some embodiments of this aspect, the second level of monitoring is associated with a higher granularity of wireless device monitoring than a granularity of wireless device monitoring associated with the first level of monitoring. According to some embodiments of this aspect, the higher granularity corresponds to a decreased number of wireless devices to be monitored compared to a number of wireless device to be monitored according to the first level of monitoring. According to some embodiments of this aspect, at least a portion of the bi-directional network communications of the first plurality of wireless devices corresponds to communications that are steered to the first VSA.
A more complete understanding of the present embodiments, and the attendant advantages and features thereof, will be more readily understood by reference to the following detailed description when considered in conjunction with the accompanying drawings wherein:
Before describing in detail example embodiments, it is noted that the embodiments reside primarily in combinations of apparatus components and processing steps related to dynamic virtual security agent (VSA) based monitoring in a network. Accordingly, components have been represented where appropriate by conventional symbols in the drawings, showing only those specific details that are pertinent to understanding the embodiments so as not to obscure the disclosure with details that will be readily apparent to those of ordinary skill in the art having the benefit of the description herein. Like numbers refer to like elements throughout the description.
As used herein, relational terms, such as “first” and “second,” “top” and “bottom,” and the like, may be used solely to distinguish one entity or element from another entity or element without necessarily requiring or implying any physical or logical relationship or order between such entities or elements. The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the concepts described herein. As used herein, the singular forms “a”, “an” and “the” are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms “comprises,” “comprising,” “includes” and/or “including” when used herein, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
In embodiments described herein, the joining term, “in communication with” and the like, may be used to indicate electrical or data communication, which may be accomplished by physical contact, induction, electromagnetic radiation, radio signaling, infrared signaling or optical signaling, for example. One having ordinary skill in the art will appreciate that multiple components may interoperate and modifications and variations are possible of achieving the electrical and data communication.
In some embodiments described herein, the term “coupled,” “connected,” and the like, may be used herein to indicate a connection, although not necessarily directly, and may include wired and/or wireless connections.
The term “network node” used herein can be any kind of network node comprised in a radio network which may further comprise any of base station (BS), radio base station, base transceiver station (BTS), base station controller (BSC), radio network controller (RNC), g Node B (gNB), evolved Node B (eNB or eNodeB), Node B, multi-standard radio (MSR) radio node such as MSR BS, multi-cell/multicast coordination entity (MCE), integrated access and backhaul (IAB) node, relay node, donor node controlling relay, radio access point (AP), transmission points, transmission nodes, Remote Radio Unit (RRU) Remote Radio Head (RRH), a core network node (e.g., mobile management entity (MME), self-organizing network (SON) node, a coordinating node, positioning node, MDT node, etc.), an external node (e.g., 3rd party node, a node external to the current network), nodes in distributed antenna system (DAS), a spectrum access system (SAS) node, an element management system (EMS), etc. The network node may also comprise test equipment. The term “radio node” used herein may be used to also denote a wireless device (WD) such as a wireless device (WD) or a radio network node.
In some embodiments, the non-limiting terms wireless device (WD) or a user equipment (UE) are used interchangeably. The WD herein can be any type of wireless device capable of communicating with a network node or another WD over radio signals, such as wireless device (WD). The WD may also be a radio communication device, target device, device to device (D2D) WD, machine type WD or WD capable of machine to machine communication (M2M), low-cost and/or low-complexity WD, a sensor equipped with WD, Tablet, mobile terminals, smart phone, laptop embedded equipped (LEE), laptop mounted equipment (LME), USB dongles, Customer Premises Equipment (CPE), an Internet of Things (IoT) device, or a Narrowband IoT (NB-IOT) device, etc.
Transmitting in downlink may pertain to transmission from the network or network node to the wireless device. Transmitting in uplink may pertain to transmission from the wireless device to the network or network node. Transmitting in sidelink may pertain to (direct) transmission from one wireless device to another. Uplink, downlink and sidelink (e.g., sidelink transmission and reception) may be considered communication directions. In some variants, uplink and downlink may also be used to described wireless communication between network nodes, e.g. for wireless backhaul and/or relay communication and/or (wireless) network communication for example between base stations or similar network nodes, in particular communication terminating at such. It may be considered that backhaul and/or relay communication and/or network communication is implemented as a form of sidelink or uplink communication or similar thereto.
Also, in some embodiments the generic term “radio network node” is used. It can be any kind of a radio network node which may comprise any of base station, radio base station, base transceiver station, base station controller, network controller, RNC, evolved Node B (eNB), Node B, gNB, Multi-cell/multicast Coordination Entity (MCE), IAB node, relay node, access point, radio access point, Remote Radio Unit (RRU) Remote Radio Head (RRH).
Note that although terminology from one particular wireless system, such as, for example, 3GPP LTE and/or New Radio (NR), may be used in this disclosure, this should not be seen as limiting the scope of the disclosure to only the aforementioned system. Other wireless systems, including without limitation Wide Band Code Division Multiple Access (WCDMA), Worldwide Interoperability for Microwave Access (WiMax), Ultra Mobile Broadband (UMB) and Global System for Mobile Communications (GSM), may also benefit from exploiting the ideas covered within this disclosure.
Note further, that functions described herein as being performed by a wireless device or a network node may be distributed over a plurality of wireless devices and/or network nodes. In other words, it is contemplated that the functions of the network node and wireless device described herein are not limited to performance by a single physical device and, in fact, can be distributed among several physical devices.
Unless otherwise defined, all terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this disclosure belongs. It will be further understood that terms used herein should be interpreted as having a meaning that is consistent with their meaning in the context of this specification and the relevant art and will not be interpreted in an idealized or overly formal sense unless expressly so defined herein. Some embodiments provide dynamic virtual security agent (VSA) based monitoring in a network.
Referring again to the drawing figures, in which like elements are referred to by like reference numerals, there is shown in
Also, it is contemplated that a WD 22 can be in simultaneous communication and/or configured to separately communicate with more than one network node 16 and more than one type of network node 16. For example, a WD 22 can have dual connectivity with a network node 16 that supports LTE and the same or a different network node 16 that supports NR. As an example, WD 22 can be in communication with an eNB for LTE/E-UTRAN and a gNB for NR/NG-RAN.
Core network 14 includes an orchestrator node 15 is configured to include orchestrator unit 31 that is configured to perform one or more orchestrator node 15 functions as described herein such as with respect to monitoring communications associated with one or more wireless devices 22. For example, orchestrator node 15 may cause one or more one or more virtual security agents 32 (collectively referred to as VSAs 32) to be instantiated in one or more entities in core network 14, access network 12, etc. In some embodiments, a network node 16 is configured to include a VSA 32 which is configured to perform one or more VSA actions as described herein such as with respect to monitoring communications associated with one or more wireless devices 22. Further, core network 14 may include one or more core nodes 24 (collectively referred to as core node 24). Core node 24 may include one or more VSAs 32 as configured by orchestrator node 15 as described herein.
Example implementations, in accordance with an embodiment, of the WD 22, network node 16, orchestrator node 15 and core node 24 discussed in the preceding paragraphs will now be described with reference to
Processing circuitry 42 may be configured to control any of the methods and/or processes described herein and/or to cause such methods, and/or processes to be performed, e.g., by core node 24. Processor 44 corresponds to one or more processors 44 for performing code node 24 functions described herein. The core node 24 includes memory 46 that is configured to store data, programmatic software code and/or other information described herein. In some embodiments, the software 48 may include instructions that, when executed by the processor 44 and/or processing circuitry 42, causes the processor 44 and/or processing circuitry 42 to perform the processes described herein with respect to core node 24. The instructions may be software associated with the core node 24.
The software 48 may be executable by the processing circuitry 42. The processing circuitry 42 of the core node 24 may include VSA unit 32 (also referred to as VSA 32) that is configured to perform one or more core node 24 functions related to monitoring communications associated with one or more wireless devices 22.
The communication system 10 further includes a network node 16 provided in a communication system 10 and including hardware 58 enabling it to communicate with the core node 24 and with the WD 22. The hardware 58 may include a communication interface 60 for setting up and maintaining a wired or wireless connection with an interface of a different communication device of the communication system 10, as well as a radio interface 62 for setting up and maintaining at least a wireless connection 64 with a WD 22 located in a coverage area 18 served by the network node 16. The radio interface 62 may be formed as or may include, for example, one or more RF transmitters, one or more RF receivers, and/or one or more RF transceivers. The communication interface 60 may be configured to facilitate a connection 66 to the core node 24. The connection 66 may be direct or it may pass through a core network 14 of the communication system 10.
In the embodiment shown, the hardware 58 of the network node 16 further includes processing circuitry 68. The processing circuitry 68 may include a processor 70 and a memory 72. In particular, in addition to or instead of a processor, such as a central processing unit, and memory, the processing circuitry 68 may comprise integrated circuitry for processing and/or control, e.g., one or more processors and/or processor cores and/or FPGAs (Field Programmable Gate Array) and/or ASICs (Application Specific Integrated Circuitry) adapted to execute instructions. The processor 70 may be configured to access (e.g., write to and/or read from) the memory 72, which may comprise any kind of volatile and/or nonvolatile memory, e.g., cache and/or buffer memory and/or RAM (Random Access Memory) and/or ROM (Read-Only Memory) and/or optical memory and/or EPROM (Erasable Programmable Read-Only Memory).
Thus, the network node 16 further has software 74 stored internally in, for example, memory 72, or stored in external memory (e.g., database, storage array, network storage device, etc.) accessible by the network node 16 via an external connection. The software 74 may be executable by the processing circuitry 68. The processing circuitry 68 may be configured to control any of the methods and/or processes described herein and/or to cause such methods, and/or processes to be performed, e.g., by network node 16. Processor 70 corresponds to one or more processors 70 for performing network node 16 functions described herein. The memory 72 is configured to store data, programmatic software code and/or other information described herein. In some embodiments, the software 74 may include instructions that, when executed by the processor 70 and/or processing circuitry 68, causes the processor 70 and/or processing circuitry 68 to perform the processes described herein with respect to network node 16. For example, processing circuitry 68 of the network node 16 may include VSA unit 32 configured to monitoring communications associated with one or more wireless devices 22, as described herein.
The communication system 10 further includes orchestrator node 15 already referred to. The orchestrator node 15 may have hardware 76 that may include communication interface 78 configured to set up and maintain a communication connection 66 with one or more nodes entities in system 10 such as with network node 16, core node 24 in the core network 14, etc.
The hardware 76 of the orchestrator node 15 further includes processing circuitry 80. The processing circuitry 80 may include a processor 82 and memory 84. In particular, in addition to or instead of a processor, such as a central processing unit, and memory, the processing circuitry 80 may comprise integrated circuitry for processing and/or control, e.g., one or more processors and/or processor cores and/or FPGAs (Field Programmable Gate Array) and/or ASICs (Application Specific Integrated Circuitry) adapted to execute instructions. The processor 82 may be configured to access (e.g., write to and/or read from) memory 84, which may comprise any kind of volatile and/or nonvolatile memory, e.g., cache and/or buffer memory and/or RAM (Random Access Memory) and/or ROM (Read-Only Memory) and/or optical memory and/or EPROM (Erasable Programmable Read-Only Memory).
Thus, the orchestrator node 15 may further comprise software 86, which is stored in, for example, memory 84 at the orchestrator node 15, or stored in external memory (e.g., database, storage array, network storage device, etc.) accessible by the orchestrator node 15. The software 86 may be executable by the processing circuitry 80.
The processing circuitry 80 may be configured to control any of the methods and/or processes described herein and/or to cause such methods, and/or processes to be performed, e.g., by orchestrator node 15. The processor 82 corresponds to one or more processors 82 for performing orchestrator node 15 functions described herein. The orchestrator node 15 includes memory 84 that is configured to store data, programmatic software code and/or other information described herein. In some embodiments, the software 86 may include instructions that, when executed by the processor 82 and/or processing circuitry 80, causes the processor 82 and/or processing circuitry 80 to perform the processes described herein with respect to orchestrator node 15. For example, the processing circuitry 80 of the orchestrator node 15 may include an orchestrator unit 31 configured to perform one or more orchestrator node 15 functions as described herein such as with respect to monitoring/investigating communications associated with one or more wireless devices 22. In another example, the processing circuitry 80 of the orchestrator node 15 may include a VSA 32 configured to perform one or more orchestrator node 15 functions as described herein such as with respect to monitoring/investigating communications associated with one or more wireless devices 22.
The communication system 10 further includes the WD 22 already referred to. The WD 22 may have hardware 88 that may include a radio interface 90 configured to set up and maintain a wireless connection 64 with a network node 16 serving a coverage area 18 in which the WD 22 is currently located. The radio interface 90 may be formed as or may include, for example, one or more RF transmitters, one or more RF receivers, and/or one or more RF transceivers.
The hardware 88 of the WD 22 further includes processing circuitry 92. The processing circuitry 92 may include a processor 94 and memory 96. In particular, in addition to or instead of a processor, such as a central processing unit, and memory, the processing circuitry 92 may comprise integrated circuitry for processing and/or control, e.g., one or more processors and/or processor cores and/or FPGAs (Field Programmable Gate Array) and/or ASICs (Application Specific Integrated Circuitry) adapted to execute instructions. The processor 94 may be configured to access (e.g., write to and/or read from) memory 96, which may comprise any kind of volatile and/or nonvolatile memory, e.g., cache and/or buffer memory and/or RAM (Random Access Memory) and/or ROM (Read-Only Memory) and/or optical memory and/or EPROM (Erasable Programmable Read-Only Memory).
Thus, the WD 22 may further comprise software 98, which is stored in, for example, memory 96 at the WD 22, or stored in external memory (e.g., database, storage array, network storage device, etc.) accessible by the WD 22. The software 98 may be executable by the processing circuitry 92. The software 98 may include a client application 100. The client application 100 may be operable to provide a service to a human or non-human user via the WD 22. The client application 100 may interact with the user to generate the user data that it provides.
The processing circuitry 92 may be configured to control any of the methods and/or processes described herein and/or to cause such methods, and/or processes to be performed, e.g., by WD 22. The processor 94 corresponds to one or more processors 94 for performing WD 22 functions described herein. The WD 22 includes memory 96 that is configured to store data, programmatic software code and/or other information described herein. In some embodiments, the software 98 and/or the client application 100 may include instructions that, when executed by the processor 94 and/or processing circuitry 92, causes the processor 94 and/or processing circuitry 92 to perform the processes described herein with respect to WD 22.
In some embodiments, the inner workings of the network node 16, orchestrator node 15, WD 22, and core node 24 may be as shown in
Although
Each level may correspond a Orchestrator node 15 is configured to, in response to the indication of the first plurality of wireless devices 22, configure (Block S102) a second VSA 32 to monitor communications associated with each of the first plurality of wireless devices 22, as described herein. Orchestrator node 15 is configured to receive (Block S104), from the second VSA 32, an indication of a first subset of the first plurality of wireless device 22s, each wireless device 22 of the first subset of the first plurality of wireless devices 22 meeting a second criteria associated with a second level of monitoring of bi-directional network communication, as described herein. Orchestrator node 15 is configured to determine (Block S106) to modify a granularity of wireless device 22 monitoring of bi-directional network communications based at least on the indication of the first subset of the first plurality of wireless devices 22, as described herein.
According to some embodiments, the first VSA 32 is configured in a first node and the second VSA 32 is configured in a second node different from the first node. According to some embodiments, the processing circuitry 80 is further configured to, in response to the indication of the first plurality of wireless devices 22, configure a plurality of VSAs 32 to monitor communications associated with each of the first plurality of wireless devices 22, the plurality of VSAs 32 including the second VSA 32, where each of the plurality of VSAs 32 is associated with a same logical level of granularity of wireless device 22 monitoring of bi-directional network communications. According to some embodiments, the plurality of VSAs 32 are positioned at a plurality of physical locations within a network based at least on a number of the first plurality of wireless devices 22.
According to some embodiments, the plurality of VSAs 32 correspond to the second VSA 32 and at least one clone of the second VSA 32. According to some embodiments, plurality of VSAs 32 are configured to inspect the bi-directional network communications at a protocol level different from a protocol level used by the first VSA 32. According to some embodiments, the first node is one of: a first type of logical node, in a core network 14, that is different from a second type of logical node, in the core network 14, associated with the second node, part of the core network 14 while the second node is part of an access network, and in a first type of physical node, in the access network, that is different from a second type of physical node, in the access network, associated with the second node.
According to some embodiments, the processing circuitry 80 is configured to determine a location within a network to configure the second VSA 32 where the determined location configured to provide the second VSA 32 access to bi-directional network communications of the first plurality of wireless devices 22 for the monitoring of the first plurality of wireless devices 22, and the determined location is based at least on a number the first plurality of wireless devices 22. According to some embodiments, the processing circuitry 80 is further configured to cause at least a portion of the bi-direction network communication of the first plurality of wireless devices 22 to be steered toward the second VSA 32. According to some embodiments, the processing circuitry 80 is further configured to receive, from a third VSA 32, an indication of a second subset of the first subset of the plurality of wireless devices 22, each wireless device 22 of the second subset meeting a third criteria associated with a third level of monitoring of bi-directional network communications.
According to some embodiments, the processing circuitry 80 is further configured to configure a third VSA 32 to monitor communications associated with the first subset of the first plurality of wireless devices 22, the first subset of the first plurality of wireless devices 22 including only a first wireless device 22. According to some embodiments, the processing circuitry 80 is further configured to: receive monitoring data, from the third VSA 32, associated with the first wireless device 22, and determine the first wireless device 22 is associated with at least one network attack. According to some embodiments, the processing circuitry 80 is further configured to configure the first VSA 32 in response to at least one network behavior of the first wireless device 22.
According to some embodiments, the processing circuitry 80 is further configured to: determine the first wireless device 22 has participated in a handover process from a first access node to a second access node, and cause the third VSA 32 to move from the first access node to the second access node to continue monitoring the first wireless device 22. According to some embodiments, the modified granularity of wireless device 22 monitoring corresponds to the third VSA 32 being configured to provide a higher granularity of wireless device 22 monitoring than a granularity of wireless device 22 monitoring associated with the second VSA 32. According to some embodiments, the modified granularity corresponds to increasing granularity at least in part by decreasing a number of wireless devices 22 to be monitored.
According to some embodiments, the first VSA 32 is configured in a first node that is different from a second node providing the second VSA. According to some embodiments, the first node is one of: a first type of logical node, in a core network 14, that is different from a second type of logical node, in the core network 14, associated with the second node; part of the core network 14 while the second node is part of an access network, and in a first type of physical node, in the access network, that is different from a second type of physical node, in the access network, associated with the second node. According to some embodiments, the first VSA 32 is configured to inspect the bi-direction network communications at a protocol level different from a protocol level used by the second VSA 32.
According to some embodiments, the second level of monitoring is associated with a higher granularity of wireless device 22 monitoring than a granularity of wireless device 22 monitoring associated with the first level of monitoring. According to some embodiments, the higher granularity corresponds to a decreased number of wireless devices 22 to be monitored compared to a number of wireless device 22 to be monitored according to the first level of monitoring. According to some embodiments, at least a portion of the bi-directional network communications of the first plurality of wireless devices 22 corresponds to communications that are steered to the first VSA 32.
Having described the general process flow of arrangements of the disclosure and having provided examples of hardware and software arrangements for implementing the processes and functions of the disclosure, the sections below provide details and examples of arrangements for monitoring/investigating communications associated with one or more wireless devices.
Some embodiments provide an orchestrator node 15 that manages one or more VSAs 32 for monitoring/investigating one or more wireless devices 22.
In the following, 5G Not Stand Alone (NSA) and/or 5G Stand Alone (SA) terminology may be used. Note that in NSA, the packet data network gateway (P-GW) is used to connect the operator's network to the Internet, while in SA, there may not be such a designated unique user plane function (UPF) to connect to outside the operator's network. Therefore, when using P-GW in NSA in an example, it may be replaced with a UPF connecting directly to the Internet (DC) in an SA example. Note that the same could be applicable in an enterprise setting including a Central office, Regional/Brunch office, and individual workers/users from home. This approach is applicable to any kind of network topology where this hierarchical tree like topology exists.
One or more embodiments described herein, are directed to security issues that may occur in the user plane of a network.
In one or more embodiments, each VSA 32 covers a maximum number (or predefined number) of wireless devices 22 where these wireless devices 22 may be referred to as covered wireless devices 22. Among those covered wireless devices 22, after a time t, the VSA determines that some of the covered wireless devices 22 may be malicious wireless devices 22 (e.g., exhibit behavior meeting a behavior/first criterion). These wireless devices 22 that are determined or tagged as malicious wireless devices 22 are referred to as suspect wireless devices 22.
One or more embodiments include and/or are associated with the following:
In one or more embodiments, orchestrator node 15 receives the network topology from network functions virtualization orchestra (NFVO)/management and orchestration (MANO) and wireless device 22 location from 5G core or evolved packet core (EPC), in order to be able to find one or more optimal VSA position(s) to cover all wireless devices 22 at one or more levels.
Orchestrator node 15 determines (Block S126) a new location to create VSA_L_(i−1)-A (i.e., VSA 32a) based at least on the location of the suspected wireless devices 22. Orchestrator node 15 transmits (Block S128) a create request/comment to NFV MANO 102, e.g., create (VSA_L(i−1), location, UEs Lj) where the “location” corresponds to the new location determined by orchestrator node 15. NFV MANO 102 causes (Block S130) VSA_L(i−1)-A to be created, e.g., Instantiate VSA_L(i−L)-A. NFV MANO 102 is configured to steer (Block S132) traffic for suspected wireless devices Lj to VSA_L(i−1)-A. Orchestrator node 15 instructs (Block S134) VSA_Li to remove the suspected wireless devices Lj from under investigation in VSA_Li.
Hence, in one or more embodiments, orchestrator node 15 determines to cause a new VSA 32 to be created to monitor a group of suspected wireless devices 22, and also determines the location of the new VSA 32.
Hence, in one or more embodiments, orchestrator node 15 dynamically instructs a VSA to pick up monitoring of wireless devices 22 that has moved to a new location.
Therefore, one or more embodiments describe initiating new virtual instances of security appliances (VSAs 32) at different locations in the network, based on one or more of: a gradual approach to refine VSA 32 investigation based on the results from the previous level, exchanging the list of suspected wireless devices 22 between the higher and lower levels, and at each level increasing the granularity of the security investigation, and a triggering condition (e.g., criteria) to initiate new VSAs 32 to refine the investigation from a high level to lower levels at each level, as described herein. The triggering condition (e.g., triggering criteria) may be based on the number of suspected wireless devices 22, the location of one or more of the suspected wireless devices 22 in the network or geographical locations for wireless device 2. Those VSAs 32 being assigned to investigate the suspected wireless devices 22 from previous level of investigation.
Further, one or more embodiments described herein provide one or more of the following advantages:
As will be appreciated by one of skill in the art, the concepts described herein may be embodied as a method, data processing system, computer program product and/or computer storage media storing an executable computer program. Accordingly, the concepts described herein may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects all generally referred to herein as a “circuit” or “module.” Any process, step, action and/or functionality described herein may be performed by, and/or associated to, a corresponding module, which may be implemented in software and/or firmware and/or hardware. Furthermore, the disclosure may take the form of a computer program product on a tangible computer usable storage medium having computer program code embodied in the medium that can be executed by a computer. Any suitable tangible computer readable medium may be utilized including hard disks, CD-ROMs, electronic storage devices, optical storage devices, or magnetic storage devices.
Some embodiments are described herein with reference to flowchart illustrations and/or block diagrams of methods, systems and computer program products. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer (to thereby create a special purpose computer), special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer readable memory or storage medium that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer readable memory produce an article of manufacture including instruction means which implement the function/act specified in the flowchart and/or block diagram block or blocks.
The computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
It is to be understood that the functions/acts noted in the blocks may occur out of the order noted in the operational illustrations. For example, two blocks shown in succession may in fact be executed substantially concurrently or the blocks may sometimes be executed in the reverse order, depending upon the functionality/acts involved. Although some of the diagrams include arrows on communication paths to show a primary direction of communication, it is to be understood that communication may occur in the opposite direction to the depicted arrows.
Computer program code for carrying out operations of the concepts described herein may be written in an object oriented programming language such as Python, Java® or C++. However, the computer program code for carrying out operations of the disclosure may also be written in conventional procedural programming languages, such as the “C” programming language. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer. In the latter scenario, the remote computer may be connected to the user's computer through a local area network (LAN) or a wide area network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet Service Provider).
Many different embodiments have been disclosed herein, in connection with the above description and the drawings. It will be understood that it would be unduly repetitious and obfuscating to literally describe and illustrate every combination and subcombination of these embodiments. Accordingly, all embodiments can be combined in any way and/or combination, and the present specification, including the drawings, shall be construed to constitute a complete written description of all combinations and subcombinations of the embodiments described herein, and of the manner and process of making and using them, and shall support claims to any such combination or subcombination.
It will be appreciated by persons skilled in the art that the embodiments described herein are not limited to what has been particularly shown and described herein above. In addition, unless mention was made above to the contrary, it should be noted that all of the accompanying drawings are not to scale. A variety of modifications and variations are possible in light of the above teachings without departing from the scope of the following claims.
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/IB2022/051129 | 2/8/2022 | WO |