Development of a method for automated 5G and beyond network slices penetration testing

Roman Odarchenko, Maksim Iavich, Alla Pinchuk

Abstract


The subject of this article is penetration testing methodologies for 5G networks and beyond. The aim of this paper is to develop a methodology and software for automated penetration testing of the network infrastructure of next-generation cellular networks with a layered architecture. The tasks to be solved are as follows: 1) to analyze existing penetration testing methods of 5G and beyond networks and research in this area; 2) to develop a new method for automated 5G and beyond network slices penetration testing; 3) to design and implement the methodology in the form of software for virtualize environments; 4) to develop a 5G test network architecture based on open-source solutions and methodology of experiments conducting; 5) to test and validate the solution effectiveness in detecting vulnerabilities and simulating realistic attack scenarios in the 5G test network environment. The following results were obtained: 1) the new method for automated 5G and beyond network slices penetration testing was developed, leveraging Genetic Algorithms to optimize attack strategies; 2) a software tool for automating penetration testing was implemented, enabling efficient detection of critical and high-severity vulnerabilities and simulating attacks in a complex 5G network environment; 3) a test network architecture was created for experimentation, enabling a controlled evaluation of the methodology; 4) the experimental results demonstrated the effectiveness and operability of the proposed method. Conclusions. The primary contribution of this research is the development of a methodology, which is implemented in software, to enhance and automate the penetration testing process. The results prove the operability and effectiveness of the proposed solutions, demonstrating improved vulnerability detection, optimized attack strategy generation, and a higher success rate of penetration tests in a complex network environment.

Keywords


5G and beyond; penetration testing; automate penetration testing; automated testing framework; 5G security

Full Text:

PDF

References


6G: Hype versus reality. STL Partners, 2022. Available at: https://stlpartners.com/research/6g-hype-versus-reality/. (accessed 11.10.2024)

Hussain, M. A., Begum, A. U., Syed, Z., & Al-Ansari, D. M. S. Dynamic slicing optimization in 5G networks using a recursive LSTM mechanism with grey wolf optimization. Journal of Theoretical and Applied Information Technology, 2024, vol. 102, iss. 2, pp. 569-583.

What is network slicing for 5G and beyond-networks. Available at: https://telcomatraining.com/what-is-network-slicing-for-5g-and-beyond-networks (accessed 11.10.2024).

Hermosilla, A., Gallego-Madrid, J., Martinez-Julia, P., Ortiz, J., Kafle, V. P., & Skarmeta, A. Advancing 5G Network Applications Lifecycle Security: An ML-Driven Approach. CMES-Computer Modeling in Engineering & Sciences, 2024, vol. 141, iss. 2, pp. 1447-1471.

Kholidy, H. A., Karam, A., Reed, J. H., & Elazzazi, Y. An Experimental 5G Testbed for Secure Network Slicing Evaluation. 2022 IEEE Future Networks World Forum (FNWF), Montreal, QC, Canada, 2022, pp. 131-138. DOI: 10.1109/FNWF55208.2022.00032.

Kumar, P., & Sharma, R. Attack path discovery in dynamic network environments for automated penetration testing over 5G networks. In Networks Attack Detection on 5G Networks using Data Mining Techniques, CRC Press, 2024, pp. 143-163.

Benzaid, C., Taleb, T., & Song, J. AI-based Autonomic & Scalable Security Management Architecture for Secure Network Slicing in B5G. IEEE Network, 2022, pp. 1–9. DOI: 10.1109/mnet.104.2100495.

Cunha, V. A., & et al., 5 Growth: Secure and Reliable Network Slicing for Verticals. 2021 Joint European Conference on Networks and Communications & 6G Summit (EuCNC/6G Summit), Porto, Portugal, 2021, pp. 347-352. DOI: 10.1109/EuCNC/6GSummit51104.2021.9482536.

El Rajab, M., Yang, L., & Shami, A. Zero-touch networks: Towards next-generation network automation. Computer Networks, 2024, vol. 243, article no. 110294. DOI: 10.1016/j.comnet.2024.110294.

Liyanage, M., Pham, Q. V., Dev, K., Bhattacharya, S., Maddikunta, P. K. R., Gadekallu, T. R., & Yenduri, G. A survey on Zero touch network and Service Management (ZSM) for 5G and beyond networks. Journal of Network and Computer Applications, 2022, vol. 203, article no. 103362. DOI: 10.1016/j.jnca.2022.103362.

Lekidis, A. Towards 5G Advanced network slice assurance through isolation mechanisms. In Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024, article no. 136, pp. 1-7. DOI: 10.1145/3664476.3669923.

Chouman, A., Manias, D. M., & Shami, A. A Modular, End-to-End Next-Generation Network Testbed: Towards a Fully Automated Network Management Platform. arXiv preprint, 2024, arXiv:2403.15376.

Saad, S. B. Security architectures for network slice management for 5G and beyond. Doctoral dissertation, Sorbonne Université, 2023. 132 p.

Alwis, C. D., Porambage, P., Dev, K., Gadekallu, T. R., & Liyanage, M. A Survey on Network Slicing Security: Attacks, Challenges, Solutions and Research Directions. IEEE Communications Surveys & Tutorials, 2023, vol. 1. DOI: 10.1109/comst.2023.3312349.

Iavich, M., & Odarchenko, R. Automated Penetration Testing in 5G Networks. In: Nechyporuk, M., Pavlikov, V., Krytskyi, D. (eds) Integrated Computer Technologies in Mechanical Engineering - 2023. ICTM 2023. Lecture Notes in Networks and Systems, vol. 996. Springer, Cham, 2024. DOI: 10.1007/978-3-031-60549-9_33

Ou, X., Govindavajhala, S., & Appel, A. W. MulVAL: A logic-based network security analyzer. In USENIX security symposium, 2005, vol. 8, pp. 113-128.

Tayouri, D., Baum, N., Shabtai, A., & Puzis, R. A Survey of MulVAL Extensions and Their Attack Scenarios Coverage, 2022. DOI: 10.48550/arXiv.2208.05750.




DOI: https://doi.org/10.32620/reks.2025.1.17

Refbacks

  • There are currently no refbacks.