Degree Name
MS (Master of Science)
Program
Information Systems
Date of Award
5-2025
Committee Chair or Co-Chairs
Mohammad Khan
Committee Members
Biju Bajracharya, Chelsie Dubay, Matthew Harrison, Chandler Scott
Abstract
Network slicing provides fundamental support for the enhanced features of 5G. Network slicing enablers, such as software-defined networking and network function virtualization facilitate the separation of the physical distributed infrastructures and the functions that create isolated slices. With this framework, the network slice is no longer under the control of a single entity. Multiple infrastructure providers share responsibility for the slice. The 5G architecture derives from multiple services, distributed over great distances, and managed by multiple parties. Each enabler and provider adds vulnerability to network slicing. We examine the interweaving of these enablers to identify vulnerabilities, discuss potential mitigation, and address gaps in existing research related to the merging of these diverse enablers. Our approach incorporates a novel cyber kill chain model, taking the perspective of a threat actor and examining the stages the actor employs. Through this insight, we identify mitigation strategies that existing research overlooks.
Document Type
Thesis - embargo
Recommended Citation
Breeden, John, "5G Network Slice Vulnerabilities and Exploit Chaining through Enablers" (2025). Electronic Theses and Dissertations. Paper 4496. https://dc.etsu.edu/etd/4496
Copyright
Copyright by the authors.