A Layered Approach to Threat Modeling for 5G-Based Systems
نویسندگان
چکیده
The rise of 5G networks promises a wide range cutting-edge services with the aim achieving high performance and reliability. Cutting-edge applications facilitated by architecture make use various enabling technologies, which introduce new emerging security threats attacks. Threat modeling is proactive approach to identify requirements, as well potential vulnerabilities, prioritize remediation methods. In addition, are complex usually divided into separate layers foster understanding management different functionalities. open nature envisages that multiple vendors service providers might be working on network deployment provisioning; it therefore necessary address categorize at each layer distinctly. This paper presents threat model for 5G-based systems. It leverages layered architecture, identifying categories mapping these corresponding layers. also analyzes technologies affected identified along actors, entry points, impact categories. Through development this model, we envisage facilitating further research specific mechanisms protect against them.
منابع مشابه
a new type-ii fuzzy logic based controller for non-linear dynamical systems with application to 3-psp parallel robot
abstract type-ii fuzzy logic has shown its superiority over traditional fuzzy logic when dealing with uncertainty. type-ii fuzzy logic controllers are however newer and more promising approaches that have been recently applied to various fields due to their significant contribution especially when the noise (as an important instance of uncertainty) emerges. during the design of type- i fuz...
15 صفحه اولa new approach to credibility premium for zero-inflated poisson models for panel data
هدف اصلی از این تحقیق به دست آوردن و مقایسه حق بیمه باورمندی در مدل های شمارشی گزارش نشده برای داده های طولی می باشد. در این تحقیق حق بیمه های پبش گویی بر اساس توابع ضرر مربع خطا و نمایی محاسبه شده و با هم مقایسه می شود. تمایل به گرفتن پاداش و جایزه یکی از دلایل مهم برای گزارش ندادن تصادفات می باشد و افراد برای استفاده از تخفیف اغلب از گزارش تصادفات با هزینه پائین خودداری می کنند، در این تحقیق ...
15 صفحه اولa benchmarking approach to optimal asset allocation for insurers and pension funds
uncertainty in the financial market will be driven by underlying brownian motions, while the assets are assumed to be general stochastic processes adapted to the filtration of the brownian motions. the goal of this study is to calculate the accumulated wealth in order to optimize the expected terminal value using a suitable utility function. this thesis introduced the lim-wong’s benchmark fun...
15 صفحه اولA Layered Approach to Insider Threat Detection and Proactive Forensics
An insider threat is a menace to computer security as a result of unauthorized system misuse by users of an organization. A recent study jointly published by the United States Secret Service and Carnegie Mellon University [7] confirms the prevalence of computer crimes perpetrated by insiders across America’s organizations. Insider attacks can be more destructive and costly than attacks from the...
متن کاملCONCEPTUAL MODELING OF STYLES FOR MOBILE SYSTEMS A layered approach based on graph transformation
When designing a mobile application, we have to be aware of the properties and facilities of the target platform. At a conceptual level, this platform can be specified by a style, defining the structures and operations available to applications. In this paper, we use an UML-like meta model for the structural aspect and graph transformation rules over its instances to specify the dynamics of a s...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Electronics
سال: 2022
ISSN: ['2079-9292']
DOI: https://doi.org/10.3390/electronics11121819