Development of a method for automated 5G and beyond network slices penetration testing
Abstract
Keywords
Full Text:
PDFReferences
6G: Hype versus reality. STL Partners, 2022. Available at: https://stlpartners.com/research/6g-hype-versus-reality/. (accessed 11.10.2024)
Hussain, M. A., Begum, A. U., Syed, Z., & Al-Ansari, D. M. S. Dynamic slicing optimization in 5G networks using a recursive LSTM mechanism with grey wolf optimization. Journal of Theoretical and Applied Information Technology, 2024, vol. 102, iss. 2, pp. 569-583.
What is network slicing for 5G and beyond-networks. Available at: https://telcomatraining.com/what-is-network-slicing-for-5g-and-beyond-networks (accessed 11.10.2024).
Hermosilla, A., Gallego-Madrid, J., Martinez-Julia, P., Ortiz, J., Kafle, V. P., & Skarmeta, A. Advancing 5G Network Applications Lifecycle Security: An ML-Driven Approach. CMES-Computer Modeling in Engineering & Sciences, 2024, vol. 141, iss. 2, pp. 1447-1471.
Kholidy, H. A., Karam, A., Reed, J. H., & Elazzazi, Y. An Experimental 5G Testbed for Secure Network Slicing Evaluation. 2022 IEEE Future Networks World Forum (FNWF), Montreal, QC, Canada, 2022, pp. 131-138. DOI: 10.1109/FNWF55208.2022.00032.
Kumar, P., & Sharma, R. Attack path discovery in dynamic network environments for automated penetration testing over 5G networks. In Networks Attack Detection on 5G Networks using Data Mining Techniques, CRC Press, 2024, pp. 143-163.
Benzaid, C., Taleb, T., & Song, J. AI-based Autonomic & Scalable Security Management Architecture for Secure Network Slicing in B5G. IEEE Network, 2022, pp. 1–9. DOI: 10.1109/mnet.104.2100495.
Cunha, V. A., & et al., 5 Growth: Secure and Reliable Network Slicing for Verticals. 2021 Joint European Conference on Networks and Communications & 6G Summit (EuCNC/6G Summit), Porto, Portugal, 2021, pp. 347-352. DOI: 10.1109/EuCNC/6GSummit51104.2021.9482536.
El Rajab, M., Yang, L., & Shami, A. Zero-touch networks: Towards next-generation network automation. Computer Networks, 2024, vol. 243, article no. 110294. DOI: 10.1016/j.comnet.2024.110294.
Liyanage, M., Pham, Q. V., Dev, K., Bhattacharya, S., Maddikunta, P. K. R., Gadekallu, T. R., & Yenduri, G. A survey on Zero touch network and Service Management (ZSM) for 5G and beyond networks. Journal of Network and Computer Applications, 2022, vol. 203, article no. 103362. DOI: 10.1016/j.jnca.2022.103362.
Lekidis, A. Towards 5G Advanced network slice assurance through isolation mechanisms. In Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024, article no. 136, pp. 1-7. DOI: 10.1145/3664476.3669923.
Chouman, A., Manias, D. M., & Shami, A. A Modular, End-to-End Next-Generation Network Testbed: Towards a Fully Automated Network Management Platform. arXiv preprint, 2024, arXiv:2403.15376.
Saad, S. B. Security architectures for network slice management for 5G and beyond. Doctoral dissertation, Sorbonne Université, 2023. 132 p.
Alwis, C. D., Porambage, P., Dev, K., Gadekallu, T. R., & Liyanage, M. A Survey on Network Slicing Security: Attacks, Challenges, Solutions and Research Directions. IEEE Communications Surveys & Tutorials, 2023, vol. 1. DOI: 10.1109/comst.2023.3312349.
Iavich, M., & Odarchenko, R. Automated Penetration Testing in 5G Networks. In: Nechyporuk, M., Pavlikov, V., Krytskyi, D. (eds) Integrated Computer Technologies in Mechanical Engineering - 2023. ICTM 2023. Lecture Notes in Networks and Systems, vol. 996. Springer, Cham, 2024. DOI: 10.1007/978-3-031-60549-9_33
Ou, X., Govindavajhala, S., & Appel, A. W. MulVAL: A logic-based network security analyzer. In USENIX security symposium, 2005, vol. 8, pp. 113-128.
Tayouri, D., Baum, N., Shabtai, A., & Puzis, R. A Survey of MulVAL Extensions and Their Attack Scenarios Coverage, 2022. DOI: 10.48550/arXiv.2208.05750.
DOI: https://doi.org/10.32620/reks.2025.1.17
Refbacks
- There are currently no refbacks.
