5G Networks are nowadays a widely used technology, rapidly spreading all over the world, due to an effective need of flexibility and scalability of resources and because of the continuous demands of the latter, by the users. This thesis analyses the 5G Core from the security point of view, checking for any kind of vulnerabilities and weaknesses that can be exploited by baleful users. Indeed, it presents first the parsing of each of the available Core singularly; and then the comparison between three open source 5G Core: Open5gs, Free5gs and OpenAirInterface. Looking for similarities, security flaws and everything that can give a reasoning to choose one of these Core with respect to the others. Sure enough, the idea is that, at the end of this analysis we should render an opinion regarding which one of these three is the best in terms of Confidentiality, Integrity and Availability, also providing countermeasures for each of the weaknesses found.

5G Networks are nowadays a widely used technology, rapidly spreading all over the world, due to an effective need of flexibility and scalability of resources and because of the continuous demands of the latter, by the users. This thesis analyses the 5G Core from the security point of view, checking for any kind of vulnerabilities and weaknesses that can be exploited by baleful users. Indeed, it presents first the parsing of each of the available Core singularly; and then the comparison between three open source 5G Core: Open5gs, Free5gs and OpenAirInterface. Looking for similarities, security flaws and everything that can give a reasoning to choose one of these Core with respect to the others. Sure enough, the idea is that, at the end of this analysis we should render an opinion regarding which one of these three is the best in terms of Confidentiality, Integrity and Availability, also providing countermeasures for each of the weaknesses found.

Penetration testing applied to 5G Core Network

GIAMBARTOLOMEI, FILIPPO
2022/2023

Abstract

5G Networks are nowadays a widely used technology, rapidly spreading all over the world, due to an effective need of flexibility and scalability of resources and because of the continuous demands of the latter, by the users. This thesis analyses the 5G Core from the security point of view, checking for any kind of vulnerabilities and weaknesses that can be exploited by baleful users. Indeed, it presents first the parsing of each of the available Core singularly; and then the comparison between three open source 5G Core: Open5gs, Free5gs and OpenAirInterface. Looking for similarities, security flaws and everything that can give a reasoning to choose one of these Core with respect to the others. Sure enough, the idea is that, at the end of this analysis we should render an opinion regarding which one of these three is the best in terms of Confidentiality, Integrity and Availability, also providing countermeasures for each of the weaknesses found.
2022
Penetration testing applied to 5G Core Network
5G Networks are nowadays a widely used technology, rapidly spreading all over the world, due to an effective need of flexibility and scalability of resources and because of the continuous demands of the latter, by the users. This thesis analyses the 5G Core from the security point of view, checking for any kind of vulnerabilities and weaknesses that can be exploited by baleful users. Indeed, it presents first the parsing of each of the available Core singularly; and then the comparison between three open source 5G Core: Open5gs, Free5gs and OpenAirInterface. Looking for similarities, security flaws and everything that can give a reasoning to choose one of these Core with respect to the others. Sure enough, the idea is that, at the end of this analysis we should render an opinion regarding which one of these three is the best in terms of Confidentiality, Integrity and Availability, also providing countermeasures for each of the weaknesses found.
Penetration testing
5G
DDoS
File in questo prodotto:
File Dimensione Formato  
GiambartolomeiFilippo_Pentesting5GCoreNetwork.pdf

accesso aperto

Dimensione 2.8 MB
Formato Adobe PDF
2.8 MB Adobe PDF Visualizza/Apri

The text of this website © Università degli studi di Padova. Full Text are published under a non-exclusive license. Metadata are under a CC0 License

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.12608/43119