Published May 9, 2024 | Version v1
Conference paper Open

Strategy for Modeling Threats in 5G and B5G Networks

  • 1. UPC
  • 2. ROR icon Universitat Politècnica de Catalunya
  • 3. Universitat Politecnica de Catalunya
  • 4. ROR icon National and Kapodistrian University of Athens
  • 5. ROR icon Technische Universität Braunschweig
  • 6. ROR icon Telefónica (Spain)

Description

The success of the Fifth Generation (5G) cellular network has opened up opportunities for connecting multiple
devices and accommodating different services and applications. However, the architecture of 5G and network functions are susceptible to various cyber-attacks and security risks. Threat modeling facilitates the identification of threats, assessment of potential attacks, and the assessment of applying the mitigation targeting a system. While existing research on 5G threat modeling focuses solely on public network attacks targeting the 5G infrastructure, it is equally important to develop tailored approaches for addressing emerging threats occurring at 5G and B5G infrastructure. Furthermore, current research lacks detailed information on threat vectors, entry points, and network vulnerabilities. To address this gap, this paper proposes a threat
modeling strategy specifically designed for characterizing and modeling threats in 5G and B5G networks. The proposed XML schema provides information on vulnerabilities, entry points, attacks, TTPs, and correlates countermeasures with the MITRE framework. The proposed approach is exemplified via a DNS amplification attack that employs tactics and techniques relevant to telecommunication networks.

Files

Strategy for Modeling threats in 5G and B5G networks pre-print.pdf

Files (732.1 kB)

Additional details

Related works

References
Conference paper: 10.1109/IWCMC55113.2022.9825149 (DOI)

Funding

European Commission
HORSE - Holistic, Omnipresent, Resilient Services for future 6G Wireless and Computing Ecosystems 101096342

Dates

Available
2024-05-09