Analyzing the container security threat on the 5G Core Network

被引:0
|
作者
Song, Jihyeon [1 ]
Park, Kyungmin [2 ]
Park, Cheolhee [2 ]
Kim, Jonghyun [2 ]
Kim, Ikkyun [2 ]
机构
[1] Univ Sci & Technol, Dept Informat & Commun Engn Informat Secur Engn, Daejeon, South Korea
[2] Elect & Telecommun Res Inst, Cyber Secur Res Div, Daejeon, South Korea
来源
2024 SILICON VALLEY CYBERSECURITY CONFERENCE, SVCC 2024 | 2024年
关键词
5G/6G; Container; CGroup; Security;
D O I
10.1109/SVCC61185.2024.10637370
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
5G aims to provide faster speeds, very low latency, and higher reliability, reliability, and availability. The 5G Core network based on a service-based architecture includes a containerized network function. In order for such a containerized network function to be used in a network system, it must be secure from security threats while ensuring Quality of Service in network services using a container, but many studies have demonstrated that Denial-of-Service, privilege Escalation, and Container Escape attacks are possible in a container environment through incorrect environmental configuration, vulnerabilities in resource isolation technology, or bypass technology. This means that such an attack can be valid in a network environment in which containers are deployed, and if an attack is successful, it can cause serious damage the entire 5G network. Therefore, this paper introduces the Container security threat and points out that it may be valid for containerized network functions in 5G Core, and we intend to conduct research that can mitigate these security threats in the future.
引用
收藏
页数:3
相关论文
共 50 条
  • [1] 5G Network and Security
    Jinsong, Ma
    Yamin, Mohammad
    PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM-2020), 2019, : 249 - 254
  • [2] Security Threat Analysis of the 5G ESSENCE Platform
    Ioannis P. Chochliouros
    Anastasia S. Spiliopoulou
    Alexandros Kostopoulos
    Michail-Alexandros Kourtis
    Pavlos I. Lazaridis
    Zaharias D. Zaharis
    Neeli R. Prasad
    Wireless Personal Communications, 2021, 120 : 2409 - 2426
  • [3] 5G Security Threat Landscape, AI and Blockchain
    Alanazi, Mohammad N.
    WIRELESS PERSONAL COMMUNICATIONS, 2023, 133 (03) : 1467 - 1482
  • [4] 5G Security Threat Landscape, AI and Blockchain
    Mohammad N. Alanazi
    Wireless Personal Communications, 2023, 133 : 1467 - 1482
  • [5] Security Threat Analysis of the 5G ESSENCE Platform
    Chochliouros, Ioannis P.
    Spiliopoulou, Anastasia S.
    Kostopoulos, Alexandros
    Kourtis, Michail-Alexandros
    Lazaridis, Pavlos I.
    Zaharis, Zaharias D.
    Prasad, Neeli R.
    WIRELESS PERSONAL COMMUNICATIONS, 2021, 120 (03) : 2409 - 2426
  • [6] A Systematic Analysis of 5G Networks With a Focus on 5G Core Security
    Tang, Qiang
    Ermis, Orhan
    Nguyen, Cu D.
    De Oliveira, Alexandre
    Hirtzig, Alain
    IEEE ACCESS, 2022, 10 : 18298 - 18319
  • [7] 5G Network Slicing: A Security Overview
    Olimid, Ruxandra F.
    Nencioni, Gianfranco
    IEEE ACCESS, 2020, 8 : 99999 - 100009
  • [8] Security in 5G Network Slices: Concerns and Opportunities
    Singh, Virendra Pratap
    Singh, Mahendra Pratap
    Hegde, Saumya
    Gupta, Maanak
    IEEE ACCESS, 2024, 12 : 52727 - 52743
  • [9] Session Management for Security Systems in 5G Standalone Network
    Park, Seongmin
    Kwon, Sungmoon
    Park, Youngkwon
    Kim, Dowon
    You, Ilsun
    IEEE ACCESS, 2022, 10 : 73421 - 73436
  • [10] Towards 5G Security
    Horn, Guenther
    Schneider, Peter
    2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 1165 - 1170