5G Networks are nowadays a widely used technology, rapidly spreading all over the world, due to an effective need of flexibility and scalability of resources and because of the continuous demands of the latter, by the users. This thesis analyses the 5G Core from the security point of view, checking for any kind of vulnerabilities and weaknesses that can be exploited by baleful users. Indeed, it presents first the parsing of each of the available Core singularly; and then the comparison between three open source 5G Core: Open5gs, Free5gs and OpenAirInterface. Looking for similarities, security flaws and everything that can give a reasoning to choose one of these Core with respect to the others. Sure enough, the idea is that, at the end of this analysis we should render an opinion regarding which one of these three is the best in terms of Confidentiality, Integrity and Availability, also providing countermeasures for each of the weaknesses found.

5G Networks are nowadays a widely used technology, rapidly spreading all over the world, due to an effective need of flexibility and scalability of resources and because of the continuous demands of the latter, by the users. This thesis analyses the 5G Core from the security point of view, checking for any kind of vulnerabilities and weaknesses that can be exploited by baleful users. Indeed, it presents first the parsing of each of the available Core singularly; and then the comparison between three open source 5G Core: Open5gs, Free5gs and OpenAirInterface. Looking for similarities, security flaws and everything that can give a reasoning to choose one of these Core with respect to the others. Sure enough, the idea is that, at the end of this analysis we should render an opinion regarding which one of these three is the best in terms of Confidentiality, Integrity and Availability, also providing countermeasures for each of the weaknesses found.

Penetration testing applied to 5G Core Network

GIAMBARTOLOMEI, FILIPPO
2022/2023

Abstract

5G Networks are nowadays a widely used technology, rapidly spreading all over the world, due to an effective need of flexibility and scalability of resources and because of the continuous demands of the latter, by the users. This thesis analyses the 5G Core from the security point of view, checking for any kind of vulnerabilities and weaknesses that can be exploited by baleful users. Indeed, it presents first the parsing of each of the available Core singularly; and then the comparison between three open source 5G Core: Open5gs, Free5gs and OpenAirInterface. Looking for similarities, security flaws and everything that can give a reasoning to choose one of these Core with respect to the others. Sure enough, the idea is that, at the end of this analysis we should render an opinion regarding which one of these three is the best in terms of Confidentiality, Integrity and Availability, also providing countermeasures for each of the weaknesses found.
Campo DC Valore Lingua
dc.collection.id.s 7be57264-b933-4e93-ac2a-7ab4c15f0175 *
dc.collection.name Lauree magistrali *
dc.contributor.author GIAMBARTOLOMEI, FILIPPO -
dc.contributor.supervisor CONTI, MAURO -
dc.date.accessioned 2023-02-28T12:06:50Z -
dc.date.available 2023-02-28T12:06:50Z -
dc.description.abstracteng 5G Networks are nowadays a widely used technology, rapidly spreading all over the world, due to an effective need of flexibility and scalability of resources and because of the continuous demands of the latter, by the users. This thesis analyses the 5G Core from the security point of view, checking for any kind of vulnerabilities and weaknesses that can be exploited by baleful users. Indeed, it presents first the parsing of each of the available Core singularly; and then the comparison between three open source 5G Core: Open5gs, Free5gs and OpenAirInterface. Looking for similarities, security flaws and everything that can give a reasoning to choose one of these Core with respect to the others. Sure enough, the idea is that, at the end of this analysis we should render an opinion regarding which one of these three is the best in terms of Confidentiality, Integrity and Availability, also providing countermeasures for each of the weaknesses found. -
dc.description.abstractita 5G Networks are nowadays a widely used technology, rapidly spreading all over the world, due to an effective need of flexibility and scalability of resources and because of the continuous demands of the latter, by the users. This thesis analyses the 5G Core from the security point of view, checking for any kind of vulnerabilities and weaknesses that can be exploited by baleful users. Indeed, it presents first the parsing of each of the available Core singularly; and then the comparison between three open source 5G Core: Open5gs, Free5gs and OpenAirInterface. Looking for similarities, security flaws and everything that can give a reasoning to choose one of these Core with respect to the others. Sure enough, the idea is that, at the end of this analysis we should render an opinion regarding which one of these three is the best in terms of Confidentiality, Integrity and Availability, also providing countermeasures for each of the weaknesses found. -
dc.description.fulltext open en
dc.identifier.uri https://hdl.handle.net/20.500.12608/43119 -
dc.relation.academicyear 2022 -
dc.relation.course CYBERSECURITY Laurea Magistrale (D.M. 270/2004) -
dc.relation.department Dipartimento di Matematica "Tullio Levi-Civita" - DM -
dc.subject.keyword Penetration testing -
dc.subject.keyword 5G -
dc.subject.keyword DDoS -
dc.title Penetration testing applied to 5G Core Network -
dc.title.eng Penetration testing applied to 5G Core Network -
Appare nelle tipologie: Lauree magistrali
File in questo prodotto:
File Dimensione Formato  
GiambartolomeiFilippo_Pentesting5GCoreNetwork.pdf

accesso aperto

Dimensione 2.8 MB
Formato Adobe PDF
2.8 MB Adobe PDF Visualizza/Apri

The text of this website © Università degli studi di Padova. Full Text are published under a non-exclusive license. Metadata are under a CC0 License

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.12608/43119