Development of a method for automated 5G and beyond network slices penetration testing
The subject of this article is penetration testing methodologies for 5G networks and beyond. The aim of this paper is to develop a methodology and software for automated penetration testing of the network infrastructure of next-generation cellular networks with a layered architecture. The tasks to b...
Saved in:
| Published in | Radìoelektronnì ì komp'ûternì sistemi (Online) Vol. 2025; no. 1; pp. 248 - 263 |
|---|---|
| Main Authors | , , |
| Format | Journal Article |
| Language | English |
| Published |
National Aerospace University «Kharkiv Aviation Institute
20.02.2025
|
| Subjects | |
| Online Access | Get full text |
| ISSN | 1814-4225 2663-2012 2663-2012 |
| DOI | 10.32620/reks.2025.1.17 |
Cover
| Abstract | The subject of this article is penetration testing methodologies for 5G networks and beyond. The aim of this paper is to develop a methodology and software for automated penetration testing of the network infrastructure of next-generation cellular networks with a layered architecture. The tasks to be solved are as follows: 1) to analyze existing penetration testing methods of 5G and beyond networks and research in this area; 2) to develop a new method for automated 5G and beyond network slices penetration testing; 3) to design and implement the methodology in the form of software for virtualize environments; 4) to develop a 5G test network architecture based on open-source solutions and methodology of experiments conducting; 5) to test and validate the solution effectiveness in detecting vulnerabilities and simulating realistic attack scenarios in the 5G test network environment. The following results were obtained: 1) the new method for automated 5G and beyond network slices penetration testing was developed, leveraging Genetic Algorithms to optimize attack strategies; 2) a software tool for automating penetration testing was implemented, enabling efficient detection of critical and high-severity vulnerabilities and simulating attacks in a complex 5G network environment; 3) a test network architecture was created for experimentation, enabling a controlled evaluation of the methodology; 4) the experimental results demonstrated the effectiveness and operability of the proposed method. Conclusions. The primary contribution of this research is the development of a methodology, which is implemented in software, to enhance and automate the penetration testing process. The results prove the operability and effectiveness of the proposed solutions, demonstrating improved vulnerability detection, optimized attack strategy generation, and a higher success rate of penetration tests in a complex network environment. |
|---|---|
| AbstractList | The subject of this article is penetration testing methodologies for 5G networks and beyond. The aim of this paper is to develop a methodology and software for automated penetration testing of the network infrastructure of next-generation cellular networks with a layered architecture. The tasks to be solved are as follows: 1) to analyze existing penetration testing methods of 5G and beyond networks and research in this area; 2) to develop a new method for automated 5G and beyond network slices penetration testing; 3) to design and implement the methodology in the form of software for virtualize environments; 4) to develop a 5G test network architecture based on open-source solutions and methodology of experiments conducting; 5) to test and validate the solution effectiveness in detecting vulnerabilities and simulating realistic attack scenarios in the 5G test network environment. The following results were obtained: 1) the new method for automated 5G and beyond network slices penetration testing was developed, leveraging Genetic Algorithms to optimize attack strategies; 2) a software tool for automating penetration testing was implemented, enabling efficient detection of critical and high-severity vulnerabilities and simulating attacks in a complex 5G network environment; 3) a test network architecture was created for experimentation, enabling a controlled evaluation of the methodology; 4) the experimental results demonstrated the effectiveness and operability of the proposed method. Conclusions. The primary contribution of this research is the development of a methodology, which is implemented in software, to enhance and automate the penetration testing process. The results prove the operability and effectiveness of the proposed solutions, demonstrating improved vulnerability detection, optimized attack strategy generation, and a higher success rate of penetration tests in a complex network environment. |
| Author | Iavich, Maksim Pinchuk, Alla Odarchenko, Roman |
| Author_xml | – sequence: 1 givenname: Roman orcidid: 0000-0002-7130-1375 surname: Odarchenko fullname: Odarchenko, Roman – sequence: 2 givenname: Maksim orcidid: 0000-0002-3109-7971 surname: Iavich fullname: Iavich, Maksim – sequence: 3 givenname: Alla orcidid: 0000-0003-3567-0445 surname: Pinchuk fullname: Pinchuk, Alla |
| BookMark | eNqFkL1OwzAURi1UJMrPzOoXSPF14jgdUYGCVIkFWK0b-xrSpnFlu1R9ewpFrEyf9EnnDOecjYYwEGPXICalrKW4ibRKEymkmsAE9Akby7ouCylAjtgYGqiKSkp1xq5SWgohZKMV6GbM3u7ok_qwWdOQefAc-ZryR3Dch8hxm8MaMzmu5hwHx1vah8MMlHchrnjqO0uJb-hwRMxdGHimlLvh_ZKdeuwTXf3uBXt9uH-ZPRaL5_nT7HZRWAlTXUjfto2saq9a0NOpkq2yzlELJdXaltAKbGzpvXeVJbAKUVYglG9cg177qrxgT0evC7g0m9itMe5NwM78HCG-G4y5sz0ZUQN4Dx6UmlaaZIO2KjWWtSdbk3YHlzi6tsMG9zvs-z8hCPOT2XxnNt-ZDRjQB-TmiNgYUork_yW-ADXog40 |
| ContentType | Journal Article |
| DBID | AAYXX CITATION ADTOC UNPAY DOA |
| DOI | 10.32620/reks.2025.1.17 |
| DatabaseName | CrossRef Unpaywall for CDI: Periodical Content Unpaywall DOAJ Directory of Open Access Journals |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | CrossRef |
| Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: UNPAY name: Unpaywall url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/ sourceTypes: Open Access Repository |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISSN | 2663-2012 |
| EndPage | 263 |
| ExternalDocumentID | oai_doaj_org_article_0611ff1f155947e28ac437a36fec6e7d 10.32620/reks.2025.1.17 10_32620_reks_2025_1_17 |
| GroupedDBID | 9MQ AAYXX ALMA_UNASSIGNED_HOLDINGS CITATION GROUPED_DOAJ ADTOC UNPAY |
| ID | FETCH-LOGICAL-c2197-2fbb8246f5b179952b5cddeb13e67c31b0a8c3fffd4ce1c5aa24105f8d8af7f43 |
| IEDL.DBID | DOA |
| ISSN | 1814-4225 2663-2012 |
| IngestDate | Fri Oct 03 12:52:46 EDT 2025 Mon Sep 15 10:20:14 EDT 2025 Tue Jul 01 05:17:12 EDT 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 1 |
| Language | English |
| License | cc-by-nc |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c2197-2fbb8246f5b179952b5cddeb13e67c31b0a8c3fffd4ce1c5aa24105f8d8af7f43 |
| ORCID | 0000-0002-7130-1375 0000-0003-3567-0445 0000-0002-3109-7971 |
| OpenAccessLink | https://doaj.org/article/0611ff1f155947e28ac437a36fec6e7d |
| PageCount | 16 |
| ParticipantIDs | doaj_primary_oai_doaj_org_article_0611ff1f155947e28ac437a36fec6e7d unpaywall_primary_10_32620_reks_2025_1_17 crossref_primary_10_32620_reks_2025_1_17 |
| ProviderPackageCode | CITATION AAYXX |
| PublicationCentury | 2000 |
| PublicationDate | 2025-02-20 |
| PublicationDateYYYYMMDD | 2025-02-20 |
| PublicationDate_xml | – month: 02 year: 2025 text: 2025-02-20 day: 20 |
| PublicationDecade | 2020 |
| PublicationTitle | Radìoelektronnì ì komp'ûternì sistemi (Online) |
| PublicationYear | 2025 |
| Publisher | National Aerospace University «Kharkiv Aviation Institute |
| Publisher_xml | – name: National Aerospace University «Kharkiv Aviation Institute |
| SSID | ssj0002875178 ssib044757823 ssib052605930 ssib038076033 |
| Score | 2.2930305 |
| Snippet | The subject of this article is penetration testing methodologies for 5G networks and beyond. The aim of this paper is to develop a methodology and software for... |
| SourceID | doaj unpaywall crossref |
| SourceType | Open Website Open Access Repository Index Database |
| StartPage | 248 |
| SubjectTerms | 5g and beyond 5g security.s automate penetration testing automated testing framework penetration testing |
| SummonAdditionalLinks | – databaseName: Unpaywall dbid: UNPAY link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LT8MwDLZgHGAH3ojxUg4c4NCyNG3THQdiTBwQB4bgVMVpwmGom1AnBL8ep-1QQUjAraqiOrJT-7NifwY4Vhij4NySBVB6IQUBD5NAe1zEwnSNJIdYFsjexMNReP0QPdQkSa4XpnF_LxxX-tmLGTtW7SDyuc_lIizFEYHuFiyNbm77jy6dSnhIQsrxqhRtBEnlQUXi89MXvsSfkqa_DcuzfKreXtXzcyO2DNZgON9VVVIy9mcF-vr9G2HjH7a9Dqs1vmT96kBswILJN6HdYB3cgvtGoRCbWKZYNUaaEX5lalZMCMSajEVXTOUZw7LFheVVuTgjWEqehU3JRdaEu6xwRB350zaMBpd3F0OvHq_gaXJT0gssklnC2EZY0sIFGGlydsiFiaUWHLsq0cJam4XacB0pFbiaUJtkibLShmIHWvkkN7vAMOMGkbKhjPfcCOue1RYD7CW0WkipOnAyV3o6rVg0Uso-SlWlTlWpU1XKUy47cO6M8rnM0V-XL0i9af03pQRCuLXcujvVUJogUToUUonYGh0bmXXg9NOkvwnc-8fafVhxz2VLe_cAWsXLzBwSKCnwqD6QH9qG288 priority: 102 providerName: Unpaywall |
| Title | Development of a method for automated 5G and beyond network slices penetration testing |
| URI | https://doi.org/10.32620/reks.2025.1.17 https://doaj.org/article/0611ff1f155947e28ac437a36fec6e7d |
| UnpaywallVersion | publishedVersion |
| Volume | 2025 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAON databaseName: DOAJ Directory of Open Access Journals customDbUrl: eissn: 2663-2012 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0002875178 issn: 2663-2012 databaseCode: DOA dateStart: 20170101 isFulltext: true titleUrlDefault: https://www.doaj.org/ providerName: Directory of Open Access Journals – providerCode: PRVHPJ databaseName: ROAD: Directory of Open Access Scholarly Resources customDbUrl: eissn: 2663-2012 dateEnd: 99991231 omitProxy: true ssIdentifier: ssib044757823 issn: 1814-4225 databaseCode: M~E dateStart: 20030101 isFulltext: true titleUrlDefault: https://road.issn.org providerName: ISSN International Centre |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV09T8MwELVQGaAD4lOUj8oDAwxp4zi2k7EgSsVQMVBUpsh2bCSo0qpKhfj3nJ20ZOvCmMiKk3end-f4_A6hG6m4ooRYsIASQQxBIFBJpANCOTWhEUCIvkB2zEeT-HnKpo1WX64mrJIHroDrQ7wh1hLrts9iYaJE6pgKSbk1mhuRO_YNk7SxmAJPcirqvLE_51TtIBRurpnL4tc9AD_9LybBiKdtiHgxvHPEKh0g6gTb-0vz5aS9I9YjPd_a7C-EeaX_NtpbFQv58y1ns0Z4Gh6igzqvxIPqe47QjimOUbuhNniC3hoFQnhuscRV-2gMeSuWq3IOyavJMXvCssix8kdbcFGViWNIR4FR8AKosRbaxaUT6Cg-TtFk-Pj6MArqtgqBBnoSQWQVmCPmlikvBxcppoHkFKGGC02JCmWiqbU2j7UhmkkZuVpQm-SJtMLG9Ay1inlhzhFWOTFKwSooJ6lrXZ1abVWk0gRGUyFkB92ukcoWlXpGBqsOD2rmQM0cqBnJiOige4fkZpiTvfY3wBmy2hmybc7QQXcbO2yb8OI_JrxE--6B_ox7eIVa5XJlriFLKVXXO2QX7U7GL4P3X3ST4Ek |
| linkProvider | Directory of Open Access Journals |
| linkToUnpaywall | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LT8MwDLZgHGAH3ojxUg4c4NCyNG3THQdiTBwQB4bgVMVpwmGom1AnBL8ep-1QQUjAraqiOrJT-7NifwY4Vhij4NySBVB6IQUBD5NAe1zEwnSNJIdYFsjexMNReP0QPdQkSa4XpnF_LxxX-tmLGTtW7SDyuc_lIizFEYHuFiyNbm77jy6dSnhIQsrxqhRtBEnlQUXi89MXvsSfkqa_DcuzfKreXtXzcyO2DNZgON9VVVIy9mcF-vr9G2HjH7a9Dqs1vmT96kBswILJN6HdYB3cgvtGoRCbWKZYNUaaEX5lalZMCMSajEVXTOUZw7LFheVVuTgjWEqehU3JRdaEu6xwRB350zaMBpd3F0OvHq_gaXJT0gssklnC2EZY0sIFGGlydsiFiaUWHLsq0cJam4XacB0pFbiaUJtkibLShmIHWvkkN7vAMOMGkbKhjPfcCOue1RYD7CW0WkipOnAyV3o6rVg0Uso-SlWlTlWpU1XKUy47cO6M8rnM0V-XL0i9af03pQRCuLXcujvVUJogUToUUonYGh0bmXXg9NOkvwnc-8fafVhxz2VLe_cAWsXLzBwSKCnwqD6QH9qG288 |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Development+of+a+method+for+automated+5G+and+beyond+network+slices+penetration+testing&rft.jtitle=Rad%C3%ACoelektronn%C3%AC+%C3%AC+komp%27%C3%BBtern%C3%AC+sistemi+%28Online%29&rft.au=Roman+Odarchenko&rft.au=Maksim+Iavich&rft.au=Alla+Pinchuk&rft.date=2025-02-20&rft.pub=National+Aerospace+University+%C2%ABKharkiv+Aviation+Institute&rft.issn=1814-4225&rft.eissn=2663-2012&rft.volume=2025&rft.issue=1&rft.spage=248&rft.epage=263&rft_id=info:doi/10.32620%2Freks.2025.1.17&rft.externalDBID=DOA&rft.externalDocID=oai_doaj_org_article_0611ff1f155947e28ac437a36fec6e7d |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1814-4225&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1814-4225&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1814-4225&client=summon |