Full Program
Summary:
The complexity and dynamic nature of beyond 5G (B5G) networks introduce challenges within the realm of cybersecurity particularly in detecting and mitigating novel threats. This paper presents a comprehensive experimental environment for generating and detecting attacks within 5G and B5G networks. Thus our setup integrates the Attack Generation Engine (AGE) and an AI-augmented Intrusion Detection System (IDS) deployed on the Centre for Research and Technology Hellas (CERTH) 5G testbed. The attack generator is designed to emulate realistic threat scenarios targeting the Radio Access Network (RAN) and core components including Denial of Service (DoS) attacks on gNodeBs Non-Access Stratum (NAS) message tampering and User Plane Function (UPF) exploitation. Using the generated traffic we construct a labelled dataset representative of real world 5G attack patterns. We then evaluate multiple AI-based IDS models including LSTMs Graph Neural Networks (GNNs) and Transformer-based architectures to determine their effectiveness in detecting these threats. The evaluation ofAuthor(s):
George Lazaridis
Centre for Research and Technology Hellas
Greece
Amalia Damianou
Centre for Research and Technology Hellas
Greece
Antonios Lalas
Centre for Research and Technology Hellas
Greece
Periklis Chatzimisios
International Hellenic University
Greece
Konstantinos Votis
Centre for Research and Technology Hellas
Greece
Dimitrios Tzovaras
Centre for Research and Technology Hellas
Greece