Abstract
The security landscape of the telecommunications networks is changing very rapidly. Advanced Persistent Threats are evolving and will be used widely by attackers. As IoT is now advancing to a large scale business and 5G is maturing to commercial networks, the efficient and effective detection and analysis of vulnerabilities will be a significant issue. In this paper, we introduce 5G network slicing and propose a model where user device testing can be isolated to a dedicated test network slice. By this concept, even very advanced malware in a user device can be detected and analysed.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
GSMA Intelligence: Understanding 5G: Perspectives on Future Technological Advancements in Mobile, December 2014. http://www.gsma.com/network2020/wp-content/uploads/2015/01/Understanding-5G-Perspectives-on-future-technological-advancements-in-mobile.pdf
Yan, Z., Kantola, R., Zhang, L., Ma, Y.: Unwanted traffic detection and control based on trust management. In: Alsmadi, Izzat M., Karabatis, G., AlEroud, A. (eds.) Information Fusion for Cyber-Security Analytics. SCI, vol. 691, pp. 77–109. Springer, Cham (2017). doi:10.1007/978-3-319-44257-0_4
Laibinis, L., Troubitsyna, E., Pereverzeva, I., Oliver, I., Holtmanns, S.: A formal approach to identifying security vulnerabilities in telecommunication networks. In: Ogata, K., Lawford, M., Liu, S. (eds.) ICFEM 2016. LNCS, vol. 10009, pp. 141–158. Springer, Cham (2016). doi:10.1007/978-3-319-47846-3_10
FireEye iSight Intelligence: APT28: At the Center of the Storm, Special Report 2016. http://www.fireeye.com/reports.html
WeLiveSecurity: How do you know if your smartphone has been compromised?, December 2015. http://www.welivesecurity.com/2015/12/16/know-smartphone-compromised/
Krebs on Security: Hacked Cameras, DVRs Powered Today’s Massive Internet Outage, October 2016. https://krebsonsecurity.com/2016/10/hacked-cameras-dvrs-powered-todays-massive-internet-outage/
Symantec: An Internet of Things Reference Architecture, February 2017. https://www.symantec.com/content/dam/symantec/docs/white-papers/iot-security-reference-architecture-en.pdf
Open Web Application Security Project: IoT Security Guidance, February 2017. https://www.owasp.org/index.php/IoT_Security_Guidance
U.S. Department of Homeland Security: Strategic Principles for Securing the Internet of Things (IoT), November 2016. https://www.dhs.gov/securingtheIoT
3GPP TR 23.799 V14.0.0, December 2016. http://www.3gpp.org/ftp/Specs/archive/23_series/23.799/
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Isotalo, L. (2017). 5G Slicing as a Tool to Test User Equipment Against Advanced Persistent Threats. In: Yan, Z., Molva, R., Mazurczyk, W., Kantola, R. (eds) Network and System Security. NSS 2017. Lecture Notes in Computer Science(), vol 10394. Springer, Cham. https://doi.org/10.1007/978-3-319-64701-2_46
Download citation
DOI: https://doi.org/10.1007/978-3-319-64701-2_46
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-64700-5
Online ISBN: 978-3-319-64701-2
eBook Packages: Computer ScienceComputer Science (R0)