2021
DOI: 10.3390/s22010009
|View full text |Cite
|
Sign up to set email alerts
|

Multi-Layer Attack Graph Analysis in the 5G Edge Network Using a Dynamic Hexagonal Fuzzy Method

Abstract: Overall, 5G networks are expected to become the backbone of many critical IT applications. With 5G, new tech advancements and innovation are expected; 5G currently operates on software-defined networking. This enables 5G to implement network slicing to meet the unique requirements of every application. As a result, 5G is more flexible and scalable than 4G LTE and previous generations. To avoid the growing risks of hacking, 5G cybersecurity needs some significant improvements. Some security concerns involve the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0
1

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 22 publications
(8 citation statements)
references
References 45 publications
0
5
0
1
Order By: Relevance
“…The utilization relationship is constructed according to the utilization conditions and the predicted utilization consequences. The vulnerability utilization relationship is shown in Equation (19).…”
Section: Experimental Processmentioning
confidence: 99%
See 1 more Smart Citation
“…The utilization relationship is constructed according to the utilization conditions and the predicted utilization consequences. The vulnerability utilization relationship is shown in Equation (19).…”
Section: Experimental Processmentioning
confidence: 99%
“…To enhance the relevance between vulnerability assessment and network systems, many studies have conducted network vulnerability analysis based on attack graphs. They realized the association analysis of key vulnerabilities in network systems by studying attack graph construction techniques [13,14], node analysis techniques [15][16][17] and attack path analysis [18,19]. However, the attack graph does not have the ability of quantitative analysis.…”
Section: Introductionmentioning
confidence: 99%
“…A thorough study on the use of SDN to protect networks and recommend the use of SDN as a system for security [ 41 ]. The study lists a range of distinct problems and alternatives suggested to account for network risks in the literature.…”
Section: Background and Related Workmentioning
confidence: 99%
“…Moreover, new techniques for implementing attack graphs were conducted in the last two years. For instance, [18] investigates 5G network vulnerability assessment and provides a dynamic method that combines the Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS) with hexagonal fuzzy numbers to accurately analyze 5G network vulnerabilities.…”
Section: Related Workmentioning
confidence: 99%