The paper presents a comprehensive analysis of the security risks associated with web technologies in the 5G core network. It highlights vulnerabilities in open-source 5G core implementations and provides insights into potential threats and attacks. The study emphasizes the importance of implementing robust security measures to safeguard against malicious activities and ensure the integrity of 5G networks.
The research focuses on utilizing penetration testing tools to evaluate the security posture of three major 5G core implementations: Open5GS, Free5GC, and OpenAirInterface. By leveraging the STRIDE threat modeling approach, the authors identify various attack vectors such as spoofing, tampering, information disclosure, denial of service, elevation of privilege, and more.
Key findings reveal that all tested 5G cores exhibit vulnerabilities to specific attack vectors, emphasizing the need for enhanced security protocols in future network developments. The study underscores the critical role of web-based technologies in shaping the security landscape of 5G networks and calls for proactive measures to mitigate potential risks.
Overall, the research contributes valuable insights into enhancing the security posture of 5G core networks by addressing web-related vulnerabilities through systematic threat modeling and rigorous penetration testing methodologies.
To Another Language
from source content
arxiv.org
Deeper Inquiries