Strategy for Modeling Threats in 5G and B5G Networks
Authors/Creators
Description
The success of the Fifth Generation (5G) cellular network has opened up opportunities for connecting multiple
devices and accommodating different services and applications. However, the architecture of 5G and network functions are susceptible to various cyber-attacks and security risks. Threat modeling facilitates the identification of threats, assessment of potential attacks, and the assessment of applying the mitigation targeting a system. While existing research on 5G threat modeling focuses solely on public network attacks targeting the 5G infrastructure, it is equally important to develop tailored approaches for addressing emerging threats occurring at 5G and B5G infrastructure. Furthermore, current research lacks detailed information on threat vectors, entry points, and network vulnerabilities. To address this gap, this paper proposes a threat
modeling strategy specifically designed for characterizing and modeling threats in 5G and B5G networks. The proposed XML schema provides information on vulnerabilities, entry points, attacks, TTPs, and correlates countermeasures with the MITRE framework. The proposed approach is exemplified via a DNS amplification attack that employs tactics and techniques relevant to telecommunication networks.
Files
Strategy for Modeling threats in 5G and B5G networks pre-print.pdf
Files
(732.1 kB)
| Name | Size | Download all |
|---|---|---|
|
md5:007e2e5f3b5705c05eabb99411062225
|
732.1 kB | Preview Download |
Additional details
Identifiers
Related works
- References
- Conference paper: 10.1109/IWCMC55113.2022.9825149 (DOI)
Funding
Dates
- Available
-
2024-05-09