5G Core PFCP Intrusion Detection Dataset

The rapid evolution of the 5G environments introduces several benefits, such as faster data transfer speeds, lower latency and energy efficiency. However, this situation brings also critical cybersecurity issues, such as the complex and increased attack surface, privacy concerns and the security of the 5G core network functions. Therefore, it is evident that the role of intrusion detection mechanisms empowered with Artificial Intelligence (AI) models is crucial. Therefore, in this paper, we introduce a labelled security dataset called 5GC PFCP Intrusion Detection Dataset. This dataset includes a set of network flow statistics that can be used by AI detection models to recognise cyberattacks against the Packet Forwarding Control Protocol (PFCP). PFCP is used for the N4 interface between the Session Management Function (SMF) and the User Plane Function (UPF) in the 5G core. In particular, four PFCP attacks are investigated in this paper, including the relevant network traffic data in terms of pcap files and the Transmission Control Protocol (TCP)/Internet Protocol (IP) and application-layer statistics. This dataset is already publicly available in IEEE Dataport and Zenodo.

[1]  Panagiotis I. Radoglou-Grammatikis,et al.  Threatening the 5G core via PFCP DoS attacks: the case of blocking UAV communications , 2022, EURASIP J. Wirel. Commun. Netw..

[2]  Panagiotis I. Radoglou-Grammatikis,et al.  Towards Securing Next-Generation Networks: Attacking 5G Core/RAN Testbed , 2022, 2022 Panhellenic Conference on Electronics & Telecommunications (PACET).

[3]  Orestis Mavropoulos,et al.  SDN-Based Resilient Smart Grid: The SDN-microSENSE Architecture , 2021, Digit..

[4]  Prasanna Chaporkar,et al.  Open5G: A Software-Defined Networking Protocol for 5G Multi-RAT Wireless Networks , 2020, 2020 IEEE Wireless Communications and Networking Conference Workshops (WCNCW).

[5]  Ali A. Ghorbani,et al.  An Evaluation Framework for Intrusion Detection Dataset , 2016, 2016 International Conference on Information Science and Security (ICISS).