Loading [MathJax]/extensions/MathZoom.js
Maria Christopoulou - IEEE Xplore Author Profile

Showing 1-9 of 9 results

Filter Results

Show

Results

The programmability of radio access networks was already introduced in the fifth generation of mobile networks by leading the pathway towards the Open RAN. To cater the stringent requirements emerging with the novel services and use cases, Open RAN is becoming integral to 6G as well. The most highlighted characteristics of Open RAN such as disaggregated architecture, cloudification of network func...Show More
The 5th Generation (5G) of cellular networks, developed by the 3rd Generation Partnership Project (3GPP), aims to meet the growing demands for data and communication services. A key component of the 5G architecture is the Network Data Analytics Function (NWDAF), which enhances network performance and detects anomalies by analyzing real-time data. This paper focuses on detecting abnormal user behav...Show More
Moving to a multi-cloud environment and service-based architecture, 5G and future 6G networks require additional defensive mechanisms to protect virtualized network resources. This paper presents MERLINS, a novel architecture generating optimal Moving Target Defense (MTD) policies for proactive and reactive security of network slices. By formally modeling telecommunication networks compliant with ...Show More
Telecommunication networks are shifting to multi-cloud environments. This trend is expected to shape the standardization and implementation of future networks. Thus, the protection of virtualized services has become more critical. One of the promising methods to secure virtual resources in that setting is Moving Target Defense (MTD). This paper presents the Network Topology Fuzzer (TopoFuzzer) mod...Show More
This work presents a Moving Target Defense (MTD) framework for the protection of network slices and virtual resources in a telco cloud environment. The preliminary implementation provides a closed-loop security management of services with proactive MTD operations to reduce the success probability of attacks, and reactive MTD operations, empowered by a tampering detection and a traffic-based anomal...Show More
This paper presents a security management framework driven by Zero-Touch Network and Service Management (ZSM) paradigm and embedded in the High-Level Architecture (HLA) developed in the INSPIRE-5Gplus project. This project work also included design and implementation of different smart 5G security methods and techniques that are essential for achieving security management in future networks. Moreo...Show More
The development of the 5GENESIS portable demonstrator targets a compact 5G physical layout to guarantee portability. Multiple building blocks have been integrated in a modular way to enhance the variety of test cases and experiments that the 5GENESIS portable demonstrator can support. Performance 5G-NSA results are presented in this demo paper.Show More
6G networks will take the digital services offered by 5G to a whole new level with considerably higher bit rates, lower latency, and ultra-re-liability. However, the security of these systems is crucial to fulfill the promise of 6G. A critical element of this requirement is the efficient and pervasive protection of 6G infrastructure and services. In this article, we propose Moving Target Defense (...Show More
5G is the latest wireless standard designed to comply with stringent performance requirements for supporting diverse use cases spanning over different verticals, considered not feasible with previous cellular network technology. In this context, the European Commission has funded multiple research projects aiming at validating 5G Key Performance Indicators (KPIs) over large scale field trials on d...Show More