The thesis aims to study attacks on O-CLOUD architecture, in order to know what an attacker can perform or obtain. 5G improves the performance in comparison with the previous generation networks in several aspects. For instance it is possible to slice the bandwidth and reserve each segment for a specific service. Resources can be scaled in base of the number of requests, the amount of traffic or also deleted. This dynamic topology of the network is possible thanks to the virtualization, which introduce new possibilities but also new attack surfaces. In this thesis we study the weakness introduced by the virtualization, such as a non perfect isolation of the components or the features of the hypervisor to manage virtualized elements. The topic is faced not only with an assessment approach but also in a practical way in which the results are quantitatively measured.

The thesis aims to study attacks on O-CLOUD architecture, in order to know what an attacker can perform or obtain. 5G improves the performance in comparison with the previous generation networks in several aspects. For instance it is possible to slice the bandwidth and reserve each segment for a specific service. Resources can be scaled in base of the number of requests, the amount of traffic or also deleted. This dynamic topology of the network is possible thanks to the virtualization, which introduce new possibilities but also new attack surfaces. In this thesis we study the weakness introduced by the virtualization, such as a non perfect isolation of the components or the features of the hypervisor to manage virtualized elements. The topic is faced not only with an assessment approach but also in a practical way in which the results are quantitatively measured.

Weaknesses of virtualization in 5G networks: attacks to O-CLOUD infrastructure

CORRADIN, FEDERICO
2022/2023

Abstract

The thesis aims to study attacks on O-CLOUD architecture, in order to know what an attacker can perform or obtain. 5G improves the performance in comparison with the previous generation networks in several aspects. For instance it is possible to slice the bandwidth and reserve each segment for a specific service. Resources can be scaled in base of the number of requests, the amount of traffic or also deleted. This dynamic topology of the network is possible thanks to the virtualization, which introduce new possibilities but also new attack surfaces. In this thesis we study the weakness introduced by the virtualization, such as a non perfect isolation of the components or the features of the hypervisor to manage virtualized elements. The topic is faced not only with an assessment approach but also in a practical way in which the results are quantitatively measured.
2022
Weaknesses of virtualization in 5G networks: attacks to O-CLOUD infrastructure
The thesis aims to study attacks on O-CLOUD architecture, in order to know what an attacker can perform or obtain. 5G improves the performance in comparison with the previous generation networks in several aspects. For instance it is possible to slice the bandwidth and reserve each segment for a specific service. Resources can be scaled in base of the number of requests, the amount of traffic or also deleted. This dynamic topology of the network is possible thanks to the virtualization, which introduce new possibilities but also new attack surfaces. In this thesis we study the weakness introduced by the virtualization, such as a non perfect isolation of the components or the features of the hypervisor to manage virtualized elements. The topic is faced not only with an assessment approach but also in a practical way in which the results are quantitatively measured.
5G
False Resource Adver
Kubernetes
O-CLOUD
Open RAN
File in questo prodotto:
File Dimensione Formato  
Corradin_Federico.pdf

accesso riservato

Dimensione 1.22 MB
Formato Adobe PDF
1.22 MB Adobe PDF

The text of this website © Università degli studi di Padova. Full Text are published under a non-exclusive license. Metadata are under a CC0 License

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.12608/61279