Skip to main content

Security Function for 5G-Advanced and 6G: Malicious UE Detection in Network Slicing

  • Conference paper
  • First Online:
Information Security Applications (WISA 2024)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 15499))

Included in the following conference series:

  • 10 Accesses

Abstract

Starting with Software Defined Networking (SDN) and Network Functions Virtualization (NFV) technologies, network slicing is emerging as a critical technology in 5G-Advanced and 6G mobile communications to allocate logical networks end-to-end, meeting diverse service requirements. However, the advent of network slicing introduces new security threats, including inter-slice security, intra-slice security, and lifecycle security of network slicing. While recent research has focused on security orchestration technologies using SDN/NFV for network slicing and AI-based attack detection, there remains a gap in research on security by design within the components of 3GPP 5G systems. Therefore, this paper investigates security by design in the 5G-Advanced and 6G architectures. To address these issues, we propose a malicious User Equipment (UE) detection function to identify attacks within the network-slicing environment. We illustrate the interaction between the detection function and other 3GPP 5G system components for network slicing security with its algorithm for detecting malicious UEs in network slices.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. ITU-R M.2160: Framework and overall objectives of the future development of IMT for 2030 and beyond (2023). https://www.itu.int/rec/R-REC-M.2160-0-202311-I/en

  2. ETSI GR NFV-EVE 018 V5.1.1.: Network Functions Virtualisation (NFV) Release 5; Evolution and Ecosystem; Report on Multi-tenancy in NFV (2024)

    Google Scholar 

  3. Wijethilaka, S., Liyanage, M.: The role of security orchestrator in network slicing for future networks. J. Commun. Netw. 25(3), 355–369 (2023)

    Article  MATH  Google Scholar 

  4. Alwis, C.D., Porambage, P., Dev, K., Gadekallu, T.R., Liyanage, M.: A survey on network slicing security: attacks, challenges, solutions and research directions. IEEE Commun. Surv. Tutor. 26(1), 534–570 (2024)

    Article  Google Scholar 

  5. Zharabad, A.J., Yousefi, S., Kunz, T.: Network slicing in virtualized 5G core with VNF sharing. J. Netw. Comput. Appl. 215, 103631 (2023)

    Article  Google Scholar 

  6. Popovski, P., Trillingsgaard, K.F., Simeone, O., Durisi, G.: 5G wireless network slicing for eMBB, URLLC, and mMTC: a communication-theoretic view. IEEE Access 6, 55765–55779 (2018)

    Article  MATH  Google Scholar 

  7. Afolabi, I., Taleb, T., Samdanis, K., Ksentini, A., Flinck, H.: Network slicing and softwarization: a survey on principles, enabling technologies, and solutions. IEEE Commun. Surv. Tutor. 20(3), 2429–2453 (2018)

    Article  Google Scholar 

  8. Lin, X.: An Overview of 5G Advanced Evolution in 3GPP Release 18. IEEE Commun. Stan. Mag. 6(3), 77–83 (2022)

    Article  MATH  Google Scholar 

  9. Ebrahimi, S., Bouali, F., Haas, O.C.L.: Resource management from single-domain 5G to end-to-end 6G network slicing: a survey. IEEE Commun. Surv. Tutor. (2024)

    Google Scholar 

  10. Odida, M.: Network Slicing in Software Defined Networking for 5G (2024)

    Google Scholar 

  11. Singh, P.S., Singh, M.P., Hegde, S., Gupta, M.: Security in 5G network slices: concerns and opportunities. IEEE Access 12, 52727–52743 (2024)

    Article  MATH  Google Scholar 

  12. Martini, B., et al.: Pushing forward security in network slicing by leveraging continuous usage control. IEEE Commun. Mag. 58(7), 65–71 (2020)

    Google Scholar 

  13. Bisht, H., Patra, M., Kumar, S.: Detection and localization of DDoS attack during inter-slice handover in 5G network slicing. In: 2023 IEEE 20th Consumer Communications & Networking Conference (CCNC), pp. 798–803 (2023)

    Google Scholar 

  14. Benzaïd, C., Taleb, T., Sami, A., Hireche, O.: A deep transfer learning-powered ED-oS detection mechanism for 5G and beyond network slicing. In: GLOBECOM 2023 - 2023 IEEE Global Communications Conference, pp. 4747–4753 (2023)

    Google Scholar 

  15. Javadpour, A., Ja’fari, F., Taleb, T., Benzaïd, C.: Reinforcement learning-based slice isolation against DDoS attacks in beyond 5G networks. IEEE Trans. Netw. Serv. Manage. 20(3), 3930–3946 (2023)

    Article  Google Scholar 

  16. Bekkouche, R., Omar, M., Langar, R.: Securing 5G network slices with adaptive machine learning models as-a-service: a novel approach. In: GLOBECOM 2023 - 2023 IEEE Global Communications Conference, pp. 4754–4759 (2023)

    Google Scholar 

Download references

Acknowledgments

This work was supported by Institute of Information & communications Technology Planning & Evaluation (IITP) grant funded by the Korea government (MSIT) (No. RS-2021-II210796, Research on Foundational Technologies for 6G Autonomous Security-by-Design to Guarantee Constant Quality of Security).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jong-Hyouk Lee .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2025 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Park, J., Kim, J., Lee, JH. (2025). Security Function for 5G-Advanced and 6G: Malicious UE Detection in Network Slicing. In: Lee, JH., Emura, K., Lee, S. (eds) Information Security Applications. WISA 2024. Lecture Notes in Computer Science, vol 15499. Springer, Singapore. https://doi.org/10.1007/978-981-96-1624-4_9

Download citation

  • DOI: https://doi.org/10.1007/978-981-96-1624-4_9

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-96-1623-7

  • Online ISBN: 978-981-96-1624-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics