Towards Dynamic Threat Modelling in 5G Core Networks Based on MITRE ATT CK

08/25/2021
by   Robert Pell, et al.
0

This article discusses how the gap between early 5G network threat assessments and an adversarial Tactics, Techniques, Procedures (TTPs) knowledge base for future use in the MITRE ATT&CK threat modelling framework can be bridged. We identify knowledge gaps in the existing framework for key 5G technology enablers such as SDN, NFV, and 5G specific signalling protocols of the core network. We adopt a preemptive approach to identifying adversarial techniques which can be used to launch attacks on the 5G core network (5GCN) and map these to its components. Using relevant 5G threat assessments along with industry reports, we study how the domain specific techniques can be employed by APTs in multi-stage attack scenarios based on historic telecommunication network attacks and motivation of APT groups. We emulate this mapping in a preemptive fashion to facilitate a rigorous cyber risk assessment, support intrusion detection, and design defences based on common APT TTPs in a 5GCN.

READ FULL TEXT

page 3

page 4

page 9

page 10

research
04/29/2020

Automated Retrieval of ATT CK Tactics and Techniques for Cyber Threat Reports

Over the last years, threat intelligence sharing has steadily grown, lea...
research
01/06/2023

Unsupervised attack pattern detection in honeypot data using Bayesian topic modelling

Cyber-systems are under near-constant threat from intrusion attempts. At...
research
08/25/2021

Multi-Stage Threat Modelling and Security Monitoring in 5GCN

The fifth generation of mobile networks (5G) promises a range of new cap...
research
04/29/2020

Big Fish, Little Fish, Critical Infrastructure: An Analysis of Phineas Fisher and the 'Hacktivist' Threat to Critical Infrastructure

The hacktivist threat actor is listed in many risk decision documents. Y...
research
09/06/2023

CVE-driven Attack Technique Prediction with Semantic Information Extraction and a Domain-specific Language Model

This paper addresses a critical challenge in cybersecurity: the gap betw...
research
07/08/2020

Network Modelling of Criminal Collaborations with Dynamic Bayesian Steady Evolutions

The threat status and criminal collaborations of potential terrorists ar...
research
04/14/2023

SoK: The MITRE ATT CK Framework in Research and Practice

The MITRE ATT CK framework, a comprehensive knowledge base of adversar...

Please sign up or login with your details

Forgot password? Click here to reset