[HTML][HTML] Generating full-stack 5G security datasets: IP-layer and core network persistent PDU session attacks

G Amponis, P Radoglou-Grammatikis, T Lagkas… - … -International Journal of …, 2023 - Elsevier
With the increasing number of users accessing the Internet over 5G systems, security
concerns have become a major challenge that needs to be addressed. This paper proposes …

DDoS attack detection using unsupervised federated learning for 5G networks and beyond

S Sheikhi, P Kostakos - … & 6G Summit (EuCNC/6G Summit), 2023 - ieeexplore.ieee.org
The rapid expansion of 5G networks, coupled with the emergence of 6G technology, has
highlighted the critical need for robust security measures to protect communication …

Autonomic protection of multi-tenant 5G mobile networks against UDP flooding DDoS attacks

AS Mamolar, P Salvá-García, E Chirivella-Perez… - Journal of Network and …, 2019 - Elsevier
There is a lack of effective security solutions that autonomously, without any human
intervention, detect and mitigate DDoS cyber-attacks. The lack is exacerbated when the …

5G attacks and countermeasures

SA Bjerre, MWK Blomsterberg… - 2022 25th International …, 2022 - ieeexplore.ieee.org
With the arrival of fifth generation of mobile networking technology, 5G, subscribers and IoT
devices can look forward to higher data transfer rates, lower latency, better reli-ability, and …

HTTP/2 Attacks Generation using 5Greplay

FG Caccavale, HN Nguyen, A Cavalli… - Proceedings of the 18th …, 2023 - dl.acm.org
5G networks become increasingly pervasive, ensuring the robustness and integrity of
network functions. The adoption of HTTP/2 in 5G core functions brings notable performance …

VET5G: A Virtual End-to-End Testbed for 5G Network Security Experimentation

Z Wen, HS Pacherkar, G Yan - Proceedings of the 15th Workshop on …, 2022 - dl.acm.org
As 5G networks are gradually rolled out worldwide, it is important to ensure that their
network infrastructures are resilient against malicious attacks. This work presents VET5G, a …

Techniques for securing 5G network services from attacks

V Varadharajan, U Tupakula… - 2021 IEEE 20th …, 2021 - ieeexplore.ieee.org
The 5G network systems are evolving and have complex network infrastructures. There is a
great deal of work in this area focused on meeting the stringent service requirements for the …

An experimental testbed for 5g network security assessment

K Baccar, A Lahmadi - NOMS 2023-2023 IEEE/IFIP Network …, 2023 - ieeexplore.ieee.org
The Fifth Generation (5G) mobile networks are designed to provide a large range of services
with stringent requirements in robustness and security. Thus, it is important to ensure that …

SDN-based GTP-U Traffic Analysis for 5G Networks

D Pineda, R Harrilal-Parchment… - NOMS 2023-2023 …, 2023 - ieeexplore.ieee.org
5G networks denote a revolutionary improvement in wireless communication by introducing
three service grades: Enhanced Mobile Broadband (eMBB), Ultra-Reliable Low Latency …

Leveraging the 5G architecture to mitigate amplification attacks

M Repetto, A Carrega, G Lamanna… - 2021 IEEE 7th …, 2021 - ieeexplore.ieee.org
Volumetric (Distributed) Denial of Service attacks remain one of the major threats for any
organization, capable of saturating most Internet access links through the usage of botnets …