dc.contributor.author | Santos, Bernardo | |
dc.contributor.author | Barriga, Luis | |
dc.contributor.author | Dzogovic, Bruno | |
dc.contributor.author | Hassan, Ismail | |
dc.contributor.author | Feng, Boning | |
dc.contributor.author | Jacot, Niels | |
dc.contributor.author | Do, Thuan Van | |
dc.contributor.author | Do, van Thanh | |
dc.date.accessioned | 2023-02-23T10:37:46Z | |
dc.date.available | 2023-02-23T10:37:46Z | |
dc.date.created | 2022-07-21T09:51:50Z | |
dc.date.issued | 2022 | |
dc.identifier.isbn | 9781665467490 | |
dc.identifier.isbn | 978-1-6654-6750-6 | |
dc.identifier.issn | 2376-6506 | |
dc.identifier.issn | 2376-6492 | |
dc.identifier.uri | https://hdl.handle.net/11250/3053562 | |
dc.description.abstract | The new fifth generation (5G) mobile cellular network brings enhanced mobile broadband, massive machine type communication (e.g. IoT), critical machine type communication and fixed wireless access and will accommodate new services and applications such as augmented reality, and seamless streaming to all. 5G will boost security with encrypted data, segmented networks (network slices), enhanced privacy, and user authentication, but the 5G success may also attract attackers to look for vulnerabilities, exploits or eavesdropping. The increase in connected devices creates more targets, and larger attack surfaces, hence attacks on vital connected systems could become more chaotic and consequential. The MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) framework attempts to provide a comprehensive overview of the methods (Techniques) by which an attacker can achieve various operational objectives (Tactics). However, some techniques may not be included in the MITRE ATT&CK matrices. This paper proposes to enhance the ATT&CK framework with Adversarial Tactics and Techniques catered for the mobile network infrastructure – CONCORDIA Mobile Threat Modeling Framework (CMTMF). | en_US |
dc.language.iso | eng | en_US |
dc.publisher | Institute of Electrical and Electronics Engineers (IEEE) | en_US |
dc.relation.ispartof | 2022 International Wireless Communications and Mobile Computing (IWCMC) | |
dc.relation.ispartofseries | International Wireless Communications and Mobile Computing Conference, IWCMC;2022 International Wireless Communications and Mobile Computing (IWCMC) | |
dc.title | Threat Modelling for 5G networks | en_US |
dc.type | Conference object | en_US |
dc.description.version | acceptedVersion | en_US |
cristin.ispublished | true | |
cristin.fulltext | postprint | |
dc.identifier.doi | https://doi.org/10.1109/IWCMC55113.2022.9825149 | |
dc.identifier.cristin | 2038984 | |
dc.source.journal | International Wireless Communications and Mobile Computing Conference, IWCMC | en_US |
dc.source.volume | 18 | en_US |
dc.source.issue | 18 | en_US |
dc.source.pagenumber | 6 | en_US |