Journal of Computer Engineering: Progress, Application and Technology
Vol 1 No 02 (2022): November 2022

5G Mobile Private Security Analysis Based on Cloud Computing

Yolanda Sari, Michelle Octavia (Unknown)



Article Info

Publish Date
07 Nov 2022

Abstract

As time passes by, the increasing demands from 4G technology services to 5G technology are getting bigger. In line with the development of 5G, there are several open sources such as Free5gc, Open5gs which already provide core 5G network services so that they can help create and simulate private 5G networks. By using free5gc open source, it still needs more attention from the security side, especially from common attacks such as DDoS. Then the attack scenario is carried out from the inner network side, namely from the UE with the TCP SYN Flood and Ping of Death attack methods. The results of the attack contained comparisons for CPU and memory usage parameters. Then the TCP SYN Flood attack had an impact on the core network function components, namely Access and Mobility Management (AMF), which in 5G services experienced errors or crashes after receiving large packets. Thus, users cannot use the service because if an error occurs in the core network function (AMF), then the connection to gNB and the UE will also be lost

Copyrights © 2022






Journal Info

Abbrev

cepat

Publisher

Subject

Computer Science & IT

Description

CEPAT is a peer-reviewed journal that is published quarterly (every three months) in February, May, August and November. CEPAT is published by the Department of Computer Engineering, School of Electrical Engineering, Telkom University, and was first published in May 2022. CEPAT aims to encourage ...