Skip to main content

5G Slicing as a Tool to Test User Equipment Against Advanced Persistent Threats

  • Conference paper
  • First Online:
Network and System Security (NSS 2017)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10394))

Included in the following conference series:

Abstract

The security landscape of the telecommunications networks is changing very rapidly. Advanced Persistent Threats are evolving and will be used widely by attackers. As IoT is now advancing to a large scale business and 5G is maturing to commercial networks, the efficient and effective detection and analysis of vulnerabilities will be a significant issue. In this paper, we introduce 5G network slicing and propose a model where user device testing can be isolated to a dedicated test network slice. By this concept, even very advanced malware in a user device can be detected and analysed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. GSMA Intelligence: Understanding 5G: Perspectives on Future Technological Advancements in Mobile, December 2014. http://www.gsma.com/network2020/wp-content/uploads/2015/01/Understanding-5G-Perspectives-on-future-technological-advancements-in-mobile.pdf

  2. Yan, Z., Kantola, R., Zhang, L., Ma, Y.: Unwanted traffic detection and control based on trust management. In: Alsmadi, Izzat M., Karabatis, G., AlEroud, A. (eds.) Information Fusion for Cyber-Security Analytics. SCI, vol. 691, pp. 77–109. Springer, Cham (2017). doi:10.1007/978-3-319-44257-0_4

    Chapter  Google Scholar 

  3. Laibinis, L., Troubitsyna, E., Pereverzeva, I., Oliver, I., Holtmanns, S.: A formal approach to identifying security vulnerabilities in telecommunication networks. In: Ogata, K., Lawford, M., Liu, S. (eds.) ICFEM 2016. LNCS, vol. 10009, pp. 141–158. Springer, Cham (2016). doi:10.1007/978-3-319-47846-3_10

    Chapter  Google Scholar 

  4. FireEye iSight Intelligence: APT28: At the Center of the Storm, Special Report 2016. http://www.fireeye.com/reports.html

  5. WeLiveSecurity: How do you know if your smartphone has been compromised?, December 2015. http://www.welivesecurity.com/2015/12/16/know-smartphone-compromised/

  6. Krebs on Security: Hacked Cameras, DVRs Powered Today’s Massive Internet Outage, October 2016. https://krebsonsecurity.com/2016/10/hacked-cameras-dvrs-powered-todays-massive-internet-outage/

  7. Symantec: An Internet of Things Reference Architecture, February 2017. https://www.symantec.com/content/dam/symantec/docs/white-papers/iot-security-reference-architecture-en.pdf

  8. Open Web Application Security Project: IoT Security Guidance, February 2017. https://www.owasp.org/index.php/IoT_Security_Guidance

  9. U.S. Department of Homeland Security: Strategic Principles for Securing the Internet of Things (IoT), November 2016. https://www.dhs.gov/securingtheIoT

  10. 3GPP TR 23.799 V14.0.0, December 2016. http://www.3gpp.org/ftp/Specs/archive/23_series/23.799/

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lauri Isotalo .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Isotalo, L. (2017). 5G Slicing as a Tool to Test User Equipment Against Advanced Persistent Threats. In: Yan, Z., Molva, R., Mazurczyk, W., Kantola, R. (eds) Network and System Security. NSS 2017. Lecture Notes in Computer Science(), vol 10394. Springer, Cham. https://doi.org/10.1007/978-3-319-64701-2_46

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-64701-2_46

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-64700-5

  • Online ISBN: 978-3-319-64701-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics