Login | Register

Hardening Fifth-Generation (5G) Network Slicing: Protecting User Data and Detecting Quality-of-Service (QoS)-Based Attacks

Title:

Hardening Fifth-Generation (5G) Network Slicing: Protecting User Data and Detecting Quality-of-Service (QoS)-Based Attacks

Alayan, Ahmad (2025) Hardening Fifth-Generation (5G) Network Slicing: Protecting User Data and Detecting Quality-of-Service (QoS)-Based Attacks. Masters thesis, Concordia University.

[thumbnail of Alayan_MASC_F2025.pdf]
Text (application/pdf)
Alayan_MASC_F2025.pdf - Accepted Version
Restricted to Repository staff only until 25 August 2027.
Available under License Spectrum Terms of Access.
15MB

Abstract

Fifth-generation (5G) and beyond networks are driven by the growing number of users and sophisticated services, as industries move toward greater automation. To ensure adequate user experience, specific Quality of Service (QoS) requirements, such as low latency and high reliability, must be defined. Consequently, network slicing has emerged as a key feature of 5G, allowing operators to provide customized logical networks, known as Network Slices (NSs), each tailored to its envisioned services. NSs adopt 5G’s cloud-native Service-Based Architecture (SBA), which relies on common virtualization technologies. Additionally, to maintain QoS guarantees in a Network Slice (NS), the Third Generation Partnership Project has described a QoS model with QoS monitoring and reporting procedures. Despite their advantages, both SBA and QoS monitoring and reporting extend 5G’s attack surface. The former permits the leakage of sensitive User Equipment (UE) data (e.g., location), and the latter can be abused by a UE falsifying trusted measurements over the user plane to generate excessive reporting on the control plane, staging a novel QoS-based Attack (QoSA). In this thesis, we focus on securing 5G network slicing against inter-slice attacks that violate the Service Level Agreements for legitimate UEs served by NSs sharing the affected resources. Thus, we first disclose a prevention technique for protecting 5G against data theft attacks. Then, we introduce our novel attack, QoSA, and evaluate its impact using our testbed. This testbed was built by extending the open-source free5GC code to support standardized 5G QoS monitoring and reporting. Our experiments demonstrated that QoSA can lead to disruptions that affect service delivery. Accordingly, we present QoSA-Officer, an Attention-based Long-Short-Term Memory Autoencoder (Attention LSTM-AE) for detection, trained on QoS-relevant features from our emulations, enabling the distinction between QoSA and native QoS interruptions.

Divisions:Concordia University > Gina Cody School of Engineering and Computer Science > Electrical and Computer Engineering
Item Type:Thesis (Masters)
Authors:Alayan, Ahmad
Institution:Concordia University
Degree Name:M.A. Sc.
Program:Electrical and Computer Engineering
Date:28 May 2025
Thesis Supervisor(s):Assi, Chadi and Alameddine, Hyame
ID Code:995965
Deposited By: Ahmad Alayan
Deposited On:04 Nov 2025 15:54
Last Modified:04 Nov 2025 15:54
All items in Spectrum are protected by copyright, with all rights reserved. The use of items is governed by Spectrum's terms of access.

Repository Staff Only: item control page

Downloads per month over past year

Research related to the current document (at the CORE website)
- Research related to the current document (at the CORE website)
Back to top Back to top