Skip to main content

5G Security Function and Its Testing Environment

  • Conference paper
  • First Online:
Information Technology for Education, Science, and Technics (ITEST 2022)

Abstract

The data that is sent through wireless networks is quickly increasing and depends upon many factors. The most important among them is the tremendous growth in multimedia applications on mobile devices, which includes among other use cases, streaming music and video data, two-way video conferencing and social networking. The telecommunications industry is currently undergoing significant changes in order to transition to 5G networks, which will better serve existing and emerging use cases. In 2020, the world consumed approximately three trillion minutes of Internet video per month, which is equivalent to five million years of video or one million video minutes per second. This underscores the need to upgrade from 4G to 5G in order to meet customer demands for better quality of service and enhanced data transmission security to ensure stable and secure communication. The deployment of 5G services will require novel storage and processing technologies to support new networking models and efficient service deployment. However, once these technologies are in place, new problems will arise for cybersecurity of 5G systems and their functionality. 5G security is being assessed by researchers who have found that it still presents some security risks. These concerns arise from various reasons, including recent discoveries of vulnerabilities in 5G security systems. Attackers have been able to inject malicious code into the system and execute undesirable actions through attacks such as MNmap, MiTM, and Battery drain. To provide the highest levels of cybersecurity, new architectures for 5G and beyond networks should include novel AI/ML based algorithms. This paper examines the existing vulnerabilities of the 5G ecosystem and proposes a new cybersecurity function that considers machine learning algorithms. The function integrates Firewall, Intrusion Detection, and Intrusion Protection systems into an existing 5G architecture. The paper focuses on the Intrusion Detection System (IDS) and its methodology for identifying attacks such as MNmap, MiTM, and Battery drain. It also provides pseudo code for the algorithmic core and evaluates the efficiency of this approach. A test laboratory is created using a server and fifty raspberry pi hardware systems to simulate attacks on the server. The paper suggests an improvement strategy that will be implemented in future versions of the system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Osseiran, A., et al.: Scenarios for 5G mobile and wireless communications: the vision of the METIS project. IEEE Commun. Mag. 52(5), 26–35 (2014). https://doi.org/10.1109/MCOM.2014.6815890

    Article  Google Scholar 

  2. Holma, H., Toskala, A.: LTE for 5G: evolution or revolution? IEEE Commun. Mag. 54(2), 104–110 (2016). https://doi.org/10.1109/MCOM.2016.7402275

    Article  Google Scholar 

  3. Di Felice, M., Piro, G., Grieco, L.A.: 5G networks: opportunities and challenges for smart cities. IEEE Commun. Mag. 55(3), 32–37 (2017). https://doi.org/10.1109/MCOM.2017.1600924

    Article  Google Scholar 

  4. Rost, P., et al.: Network slicing to enable scalability and flexibility in 5G mobile networks. IEEE Commun. Mag. 55(5), 72–79 (2017). https://doi.org/10.1109/MCOM.2017.1600935

    Article  Google Scholar 

  5. Qureshi, H.N., Manalastas, M., Ijaz, A., Imran, A., Liu, Y., Al Kalaa, M.O.: Communication requirements in 5G-enabled healthcare applications: review and considerations. Healthcare 10, 293 (2022). https://doi.org/10.3390/healthcare10020293

  6. Choudhury, P., Sahoo, M., Mohapatra, S.K., Das, S.K.: A comprehensive review on security threats and solutions in 5G networks. IEEE Netw. 35(1), 72–81 (2021). https://doi.org/10.1109/MNET.011.2000213

    Article  Google Scholar 

  7. Qadir, J., Ahmed, S.H., Abbas, H.: 5G security challenges and opportunities: a review. IEEE Access 8, 188684–188703 (2020). https://doi.org/10.1109/ACCESS.2020.3033864

    Article  Google Scholar 

  8. Bocu, R., Iavich, M., Tabirca, S.: A real-time intrusion detection system for software defined 5G networks. In: Barolli, L., Woungang, I., Enokido, T. (eds.) AINA 2021. LNNS, vol. 227, pp. 436–446. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-75078-7_44

    Chapter  Google Scholar 

  9. Iavich, M., Gnatyuk, S., Odarchenko, R., Bocu, R., Simonov, S.: The novel system of attacks detection in 5G. In: Barolli, L., Woungang, I., Enokido, T. (eds.) AINA 2021. LNNS, vol. 226, pp. 580–591. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-75075-6_47

    Chapter  Google Scholar 

  10. Saha, T., Aaraj, N., Jha, N.K.: Machine learning assisted security analysis of 5G-network-connected systems. IEEE Trans. Emerging Topics Comput. 10(4), 2006–2024 (2022). https://doi.org/10.1109/TETC.2022.3147192

  11. Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.A.: A detailed analysis of the KDD CUP 99 data set. In: 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, pp. 1–6 (2009).https://doi.org/10.1109/CISDA.2009.5356528

  12. Su, T., Sun, H., Zhu, J., Wang, S., Li, Y.: BAT: deep learning methods on network intrusion detection using NSL-KDD dataset. IEEE Access 8, 29575–29585 (2020). https://doi.org/10.1109/ACCESS.2020.2972627

    Article  Google Scholar 

  13. Meena, G., Choudhary, R.R.: A review paper on IDS classification using KDD 99 and NSL KDD dataset in WEKA. In: 2017 International Conference on Computer, Communications and Electronics (Comptelix), Jaipur, India, pp. 553–558 (2017). https://doi.org/10.1109/COMPTELIX.2017.8004032

  14. Singh, R., Bhattacharyya, D.K.: Intrusion detection system: a comprehensive review. J. Netw. Comput. Appl. 36(1), 16–24 (2013). https://doi.org/10.1016/j.jnca.2012.09.005

    Article  Google Scholar 

  15. Oshima, S., Nakashima, T., Sueyoshi, T.: Early DoS/DDoS detection method using short-term statistics. In: 2010 International Conference on Complex, Intelligent and Software Intensive Systems, pp. 168–173 (2010). https://doi.org/10.1109/CISIS.2010.53

  16. Danik, Y., Hryschuk, R., Gnatyuk, S.: Synergistic effects of information and cybernetic interaction in civil aviation. Aviation 20(3), 137–144 (2016)

    Article  Google Scholar 

  17. Liu, G., Chen, H., Wu, X., Wang, L.: A deep learning-based DDoS attack detection approach in software-defined networking. IEEE Access 9, 40156–40164 (2021). https://doi.org/10.1109/ACCESS.2021.3062849

    Article  Google Scholar 

  18. Ahmad, M., Javaid, M., Malik, A.N., Imran, W.A., Khan, Z.A.: DDoS attack detection and mitigation using machine learning: a systematic review. HCIS 11(1), 1–24 (2021). https://doi.org/10.1186/s13673-021-00263-8

    Article  Google Scholar 

  19. Zafeiropoulos, A., Nikaein, N., Tsolkas, D., Papaefstathiou, I.: A machine learning approach to the detection and mitigation of DDoS attacks in 5G networks. Sensors 21(3), 937–961 (2021). https://doi.org/10.3390/s21030937

    Article  Google Scholar 

  20. Bhatia, K.M.S., Sharma, H., Kumar, M.: A machine learning-based approach for detection and mitigation of DDoS attacks in cloud computing. J. Netw. Syst. Manage. 29(2), 480–511 (2021). https://doi.org/10.1007/s10922-020-09574-7

    Article  Google Scholar 

  21. Li, Y., Zheng, S., Feng, Y., Guan, C.: A review of machine learning techniques for DDoS detection and mitigation. J. Comput. Sci. Technol. 36(3), 475–497 (2021). https://doi.org/10.1007/s11390-020-0219-1

    Article  Google Scholar 

  22. Krishnan, M.R.K., Chandrasekar, P.R.: A machine learning-based DDoS attack detection and mitigation system for fog-enabled 5G networks. IEEE Internet Things J. 8(7), 5639–5650 (2021). https://doi.org/10.1109/JIOT.2021.3073771

    Article  Google Scholar 

  23. Zhang, M., Zhou, C., Lu, Y., Zheng, W., Qiu, S.: A novel DDoS attack detection method based on dynamic time warping and fuzzy clustering. IEEE Access 9, 15097–15106 (2021). https://doi.org/10.1109/ACCESS.2021.3055941

    Article  Google Scholar 

Download references

Acknowledgement

This work was supported by Shota Rustaveli National Foundation of Georgia (SRNSFG) [NFR-22-14060].

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Giorgi Iashvili .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Iavich, M., Gnatyuk, S., Iashvili, G., Odarchenko, R., Simonov, S. (2023). 5G Security Function and Its Testing Environment. In: Faure, E., Danchenko, O., Bondarenko, M., Tryus, Y., Bazilo, C., Zaspa, G. (eds) Information Technology for Education, Science, and Technics. ITEST 2022. Lecture Notes on Data Engineering and Communications Technologies, vol 178. Springer, Cham. https://doi.org/10.1007/978-3-031-35467-0_39

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-35467-0_39

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-35466-3

  • Online ISBN: 978-3-031-35467-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics