Performance Evaluation and Threat Mitigation in Large-scale 5G Core Deployment
By: Rodrigo Moreira, Larissa F. Rodrigues Moreira, Flávio de Oliveira Silva
Potential Business Impact:
Keeps 5G phone calls working during attacks.
The deployment of large-scale software-based 5G core functions presents significant challenges due to their reliance on optimized and intelligent resource provisioning for their services. Many studies have focused on analyzing the impact of resource allocation for complex deployments using mathematical models, queue theories, or even Artificial Intelligence (AI). This paper elucidates the effects of chaotic workloads, generated by Distributed Denial of Service (DDoS) on different Network Functions (NFs) on User Equipment registration performance. Our findings highlight the necessity of diverse resource profiles to ensure Service-Level Agreement (SLA) compliance in large-scale 5G core deployments. Additionally, our analysis of packet capture approaches demonstrates the potential of kernel-based monitoring for scalable security threat defense. Finally, our empirical evaluation provides insights into the effective deployment of 5G NFs in complex scenarios.
Similar Papers
Optimizing Edge Gaming Slices through an Enhanced User Plane Function and Analytics in Beyond-5G Networks
Distributed, Parallel, and Cluster Computing
Makes mobile games run smoother by understanding players.
Characterizing 5G User Throughput via Uncertainty Modeling and Crowdsourced Measurements
Networking and Internet Architecture
Helps phones get faster internet by finding slow spots.
Adaptive Reallocation of RAN Functions for Resilient 6G Networks
Networking and Internet Architecture
Fixes phone networks when parts break down.