Analyzing the container security threat on the 5G Core Network

被引:0
|
作者
Song, Jihyeon [1 ]
Park, Kyungmin [2 ]
Park, Cheolhee [2 ]
Kim, Jonghyun [2 ]
Kim, Ikkyun [2 ]
机构
[1] Univ Sci & Technol, Dept Informat & Commun Engn Informat Secur Engn, Daejeon, South Korea
[2] Elect & Telecommun Res Inst, Cyber Secur Res Div, Daejeon, South Korea
来源
2024 SILICON VALLEY CYBERSECURITY CONFERENCE, SVCC 2024 | 2024年
关键词
5G/6G; Container; CGroup; Security;
D O I
10.1109/SVCC61185.2024.10637370
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
5G aims to provide faster speeds, very low latency, and higher reliability, reliability, and availability. The 5G Core network based on a service-based architecture includes a containerized network function. In order for such a containerized network function to be used in a network system, it must be secure from security threats while ensuring Quality of Service in network services using a container, but many studies have demonstrated that Denial-of-Service, privilege Escalation, and Container Escape attacks are possible in a container environment through incorrect environmental configuration, vulnerabilities in resource isolation technology, or bypass technology. This means that such an attack can be valid in a network environment in which containers are deployed, and if an attack is successful, it can cause serious damage the entire 5G network. Therefore, this paper introduces the Container security threat and points out that it may be valid for containerized network functions in 5G Core, and we intend to conduct research that can mitigate these security threats in the future.
引用
收藏
页数:3
相关论文
共 50 条
  • [21] On the scalability of 5G Core network: the AMF case
    Alawe, Imad
    Hadjadj-Aoul, Yassine
    Ksentini, Adlen
    Bertin, Philippe
    Darche, Davy
    2018 15TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2018,
  • [22] Traffic monitoring system for 5G core network
    Kim, Eungha
    Choi, Young-il
    2019 ELEVENTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS (ICUFN 2019), 2019, : 671 - 673
  • [23] CoNTe: A Core Network Temporal Blockchain for 5G
    Platt, Steven
    Sanabria-Russo, Luis
    Oliver, Miquel
    SENSORS, 2020, 20 (18) : 1 - 21
  • [24] 5G Service Based Core Network Design
    Xia, Lei
    Zhao, Ming
    Tian, Zhigang
    2019 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE WORKSHOP (WCNCW), 2019,
  • [25] How to Create a Network Slice? - A 5G Core Network Perspective
    Lee, Wangbong
    Na, Taeheum
    Kim, Jeongyun
    2019 21ST INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT): ICT FOR 4TH INDUSTRIAL REVOLUTION, 2019, : 616 - 619
  • [26] Security Vulnerabilities in Handover Authentication Mechanism of 5G Network
    Gupta, Shubham
    Parne, Balu L.
    Chaudhari, Narendra S.
    2018 FIRST INTERNATIONAL CONFERENCE ON SECURE CYBER COMPUTING AND COMMUNICATIONS (ICSCCC 2018), 2018, : 369 - 374
  • [27] Study on Security of 5G and Satellite Converged Communication Network
    YAN Xincheng
    TENG Huiyun
    PING Li
    JIANG Zhihong
    ZHOU Na
    ZTE Communications, 2021, 19 (04) : 79 - 89
  • [28] Session Management for Security Systems in 5G Standalone Network
    Park, Seongmin
    Kwon, Sungmoon
    Park, Youngkwon
    Kim, Dowon
    You, Ilsun
    IEEE ACCESS, 2022, 10 : 73421 - 73436
  • [29] Research on 5G Mobile Communication Network Security Technology
    Zhan, Weishu
    Tao, Zhen
    2020 3RD INTERNATIONAL CONFERENCE ON COMPUTER INFORMATION SCIENCE AND APPLICATION TECHNOLOGY (CISAT) 2020, 2020, 1634
  • [30] Security Issues in Ultra Dense Network for 5G Scenario
    Chopra, Garima
    Jha, Rakesh Kumar
    Jain, Sanjeev
    2018 10TH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS & NETWORKS (COMSNETS), 2018, : 510 - 512