Show simple item record

dc.contributor.authorSantos, Bernardo
dc.contributor.authorBarriga, Luis
dc.contributor.authorDzogovic, Bruno
dc.contributor.authorHassan, Ismail
dc.contributor.authorFeng, Boning
dc.contributor.authorJacot, Niels
dc.contributor.authorDo, Thuan Van
dc.contributor.authorDo, van Thanh
dc.date.accessioned2023-02-23T10:37:46Z
dc.date.available2023-02-23T10:37:46Z
dc.date.created2022-07-21T09:51:50Z
dc.date.issued2022
dc.identifier.isbn9781665467490
dc.identifier.isbn978-1-6654-6750-6
dc.identifier.issn2376-6506
dc.identifier.issn2376-6492
dc.identifier.urihttps://hdl.handle.net/11250/3053562
dc.description.abstractThe new fifth generation (5G) mobile cellular network brings enhanced mobile broadband, massive machine type communication (e.g. IoT), critical machine type communication and fixed wireless access and will accommodate new services and applications such as augmented reality, and seamless streaming to all. 5G will boost security with encrypted data, segmented networks (network slices), enhanced privacy, and user authentication, but the 5G success may also attract attackers to look for vulnerabilities, exploits or eavesdropping. The increase in connected devices creates more targets, and larger attack surfaces, hence attacks on vital connected systems could become more chaotic and consequential. The MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) framework attempts to provide a comprehensive overview of the methods (Techniques) by which an attacker can achieve various operational objectives (Tactics). However, some techniques may not be included in the MITRE ATT&CK matrices. This paper proposes to enhance the ATT&CK framework with Adversarial Tactics and Techniques catered for the mobile network infrastructure – CONCORDIA Mobile Threat Modeling Framework (CMTMF).en_US
dc.language.isoengen_US
dc.publisherInstitute of Electrical and Electronics Engineers (IEEE)en_US
dc.relation.ispartof2022 International Wireless Communications and Mobile Computing (IWCMC)
dc.relation.ispartofseriesInternational Wireless Communications and Mobile Computing Conference, IWCMC;2022 International Wireless Communications and Mobile Computing (IWCMC)
dc.titleThreat Modelling for 5G networksen_US
dc.typeConference objecten_US
dc.description.versionacceptedVersionen_US
cristin.ispublishedtrue
cristin.fulltextpostprint
dc.identifier.doihttps://doi.org/10.1109/IWCMC55113.2022.9825149
dc.identifier.cristin2038984
dc.source.journalInternational Wireless Communications and Mobile Computing Conference, IWCMCen_US
dc.source.volume18en_US
dc.source.issue18en_US
dc.source.pagenumber6en_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record