Mitre att&ck: State of the art and way forward

B Al-Sada, A Sadighian, G Oligeri - ACM Computing Surveys, 2024 - dl.acm.org
MITRE ATT&CK is a comprehensive framework of adversary tactics, techniques, and
procedures based on real-world observations. It has been used as a foundation for threat …

5G core network control plane: Network security challenges and solution requirements

R Patil, Z Tian, M Gurusamy, J McCloud - Computer Communications, 2024 - Elsevier
The control plane of the 5G Core Network (5GCN) is essential for ensuring reliable and high-
performance 5G communication. It provides critical network services such as authentication …

Sok: The mitre att&ck framework in research and practice

S Roy, E Panaousis, C Noakes, A Laszka… - arxiv preprint arxiv …, 2023 - arxiv.org
The MITRE ATT&CK framework, a comprehensive knowledge base of adversary tactics and
techniques, has been widely adopted by the cybersecurity industry as well as by academic …

An empirical evaluation of the effectiveness of attack graphs and MITRE ATT&CK matrices in aiding cyber attack perception amongst decision-makers

AM Pirca, HS Lallie - Computers & Security, 2023 - Elsevier
Decision-makers struggle to understand cyber-security reports, sometimes leading to
inadequate cyber-attack responses. Attack modelling techniques (AMTs) can aid cyber …

Empowering 5G SBA security: Time series transformer for HTTP/2 anomaly detection

N Wehbe, HA Alameddine, M Pourzandi, C Assi - Computers & Security, 2025 - Elsevier
Fifth Generation (5G) networks adopt the security-by-design principle to provide highly
secure and robust services. 5G Core (5GC) uses the Hypertext Transfer Protocol version 2 …

Towards Securing the 6G Transition: A Comprehensive Empirical Method to Analyze Threats in O-RAN Environments

F Klement, W Liu… - IEEE Journal on Selected …, 2023 - ieeexplore.ieee.org
In this paper, we present a new methodology that enables the MITRE ATT&CK framework to
objectively assess specific threats in 6G Radio Access Networks (RANs). This helps address …

Analysis and Characterization of Cyber Threats Leveraging the MITRE ATT&CK Database

B Al-Sada, A Sadighian, G Oligeri - IEEE Access, 2023 - ieeexplore.ieee.org
MITRE ATT&CK is a comprehensive knowledge-base of adversary tactics, techniques, and
procedures (TTP) based on real-world attack scenarios. It has been used in different sectors …

Zero Trust and Advanced Persistent Threats: Who Will Win the War?

B Karabacak, T Whittaker - International conference on cyber …, 2022 - books.google.com
Advanced Persistent Threats (APTs) are state-sponsored actors who break into computer
networks for political or industrial espionage. Because of the nature of cyberspace and ever …

OPTIMA-DEM: An Optimized Threat Behavior Prediction Method using DEMATEL-ISM

Y Jiang, Y Ren, Z Wang, Y Tang, S Lu… - 2023 IEEE 12th …, 2023 - ieeexplore.ieee.org
With the continuous development of information technology, the methods of network attacks
have been constantly evolving. Advanced Persistent Threat (APT) attacks are are very …

5GShield: HTTP/2 Anomaly Detection in 5G Service-Based Architecture

N Wehbe, HA Alameddine… - 2023 IFIP Networking …, 2023 - ieeexplore.ieee.org
Fifth Generation (5G) core network leverages the application-layer Hypertext Transfer
Protocol version 2 (HTTP/2) to enable the communication between the Network Functions …