{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,15]],"date-time":"2025-08-15T01:39:04Z","timestamp":1755221944968,"version":"3.43.0"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032006233","type":"print"},{"value":"9783032006240","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-032-00624-0_7","type":"book-chapter","created":{"date-parts":[[2025,8,9]],"date-time":"2025-08-09T11:42:31Z","timestamp":1754739751000},"page":"141-162","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Mitigation of\u00a0PFCP Attacks in\u00a05G Networks: Dynamic Defense Through Moving Target Defense and\u00a0Honeynets"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-5017-1114","authenticated-orcid":false,"given":"Aitor","family":"Landa-Arrue","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5532-004X","authenticated-orcid":false,"given":"Jasone","family":"Astorga","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0387-9167","authenticated-orcid":false,"given":"I\u00f1aki","family":"Garitano","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5836-4198","authenticated-orcid":false,"given":"Aitor","family":"Urbieta","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,8,10]]},"reference":[{"key":"7_CR1","doi-asserted-by":"publisher","unstructured":"Abdelhay, Z., Bello, Y., Refaey, A.: Toward zero-trust 6gc: a software defined perimeter approach with dynamic moving target defense mechanism. IEEE Wireless Commun. 31, 74\u201380 (2024). https:\/\/doi.org\/10.1109\/MWC.001.2300358","DOI":"10.1109\/MWC.001.2300358"},{"key":"7_CR2","doi-asserted-by":"publisher","unstructured":"Alani, M.M.: HoneyTwin: securing smart cities with machine learning-enabled SDN edge and cloud-based honeypots. J. Parallel Distributed Comput. 188, 104866 (2024). https:\/\/doi.org\/10.1016\/J.JPDC.2024.104866","DOI":"10.1016\/J.JPDC.2024.104866"},{"key":"7_CR3","doi-asserted-by":"publisher","unstructured":"Alavizadeh, H., Kim, D.S., Jang-Jaccard, J.: Model-based evaluation of combinations of Shuffle and Diversity MTD techniques on the cloud. Future Generation Comput. Syst. 111, 507\u2013522 (2020). https:\/\/doi.org\/10.1016\/J.FUTURE.2019.10.009","DOI":"10.1016\/J.FUTURE.2019.10.009"},{"key":"7_CR4","doi-asserted-by":"publisher","unstructured":"Amponis, G., et al.: Threatening the 5G core via PFCP DoS attacks: the case of blocking UAV communications. Eurasip J. Wireless Commun. Netw. 2022(1), 1\u201327 (2022). https:\/\/doi.org\/10.1186\/S13638-022-02204-5\/FIGURES\/6","DOI":"10.1186\/S13638-022-02204-5\/FIGURES\/6"},{"key":"7_CR5","doi-asserted-by":"publisher","unstructured":"Amponis, G., et al.: 5G Core PFCP intrusion detection dataset. In: International Conference on Modern Circuits and Systems Technologies, MOCAST 2023 - Proceedings (2023). https:\/\/doi.org\/10.1109\/MOCAST57943.2023.10176693","DOI":"10.1109\/MOCAST57943.2023.10176693"},{"key":"7_CR6","doi-asserted-by":"publisher","unstructured":"Andrade, D.P., Akkaya, K., Perez-Pons, A., Uluagac, S., Sahin, A.: Ddos attack detection and mitigation in 5g networks using p4 and sdn. In: IEEE Conference on Local Computer Networks (LCN) pp.\u00a01\u20139 (Sep 2024). https:\/\/doi.org\/10.1109\/LCN60385.2024.10639648","DOI":"10.1109\/LCN60385.2024.10639648"},{"key":"7_CR7","doi-asserted-by":"publisher","unstructured":"Barakabitze, A.A., Ahmad, A., Mijumbi, R., Hines, A.: 5G network slicing using SDN and NFV: a survey of taxonomy, architectures and future challenges. Comput. Netw. 167 (2 2020). https:\/\/doi.org\/10.1016\/j.comnet.2019.106984","DOI":"10.1016\/j.comnet.2019.106984"},{"key":"7_CR8","doi-asserted-by":"publisher","unstructured":"Batalla, J.M., et al.: Security Risk Assessment for 5G Networks: National Perspective. IEEE Wireless Commun. 27(4), 16\u201322 (2020). https:\/\/doi.org\/10.1109\/MWC.001.1900524","DOI":"10.1109\/MWC.001.1900524"},{"key":"7_CR9","doi-asserted-by":"publisher","unstructured":"Dantas\u00a0Silva, F.S., Neto, E.P., Nunes, R.S., Souza, C.H., Neto, A.J., Pascoal, T.: Securing software-defined networks through adaptive moving target defense capabilities. J. Netw. Syst. Manag. 31(3), 1\u201328 (2023). https:\/\/doi.org\/10.1007\/S10922-023-09746-Z\/TABLES\/2","DOI":"10.1007\/S10922-023-09746-Z\/TABLES\/2"},{"key":"7_CR10","doi-asserted-by":"publisher","unstructured":"Dolente, F., Garroppo, R.G., Pagano, M.: A vulnerability assessment of open-source implementations of fifth-generation core network functions. Future Internet 2024, vol. 16(1), p. 1 (Dec 2023). https:\/\/doi.org\/10.3390\/FI16010001","DOI":"10.3390\/FI16010001"},{"key":"7_CR11","doi-asserted-by":"publisher","unstructured":"Eleftherakis, S., Otim, T., Santaromita, G., Zayas, A.D., Giustiniano, D., Kourtellis, N.: Demystifying privacy in 5g stand alone networks. In: ACM MobiCom 2024 - Proceedings of the 30th International Conference on Mobile Computing and Networking, pp. 1330\u20131345 (5 2024). https:\/\/doi.org\/10.1145\/3636534.3690696, \/doi\/pdf\/10.1145\/3636534.3690696?download=true","DOI":"10.1145\/3636534.3690696"},{"key":"7_CR12","doi-asserted-by":"publisher","unstructured":"Escolar, A.M., Wang, Q., Calero, J.M.A.: Enhancing honeynet-based protection with network slicing for massive Pre-6G IoT smart cities deployments. J. Netw. Comput. Appli. 229, 103918 (2024). https:\/\/doi.org\/10.1016\/J.JNCA.2024.103918","DOI":"10.1016\/J.JNCA.2024.103918"},{"key":"7_CR13","unstructured":"ETSI: TS 123 501 - V15.3.0 - 5G; System Architecture for the 5G System (3GPP TS 23.501 version 15.3.0 Release 15). Tech. rep., ETSI (2018). https:\/\/portal.etsi.org\/TB\/ETSIDeliverableStatus.aspx"},{"key":"7_CR14","unstructured":"ETSI: TS 123 502 - V17.12.0 - 5G; Procedures for the 5G System (5GS) (3GPP TS 23.502 version 17.12.0 Release 17). Tech. rep., ETSI (2024). https:\/\/portal.etsi.org\/TB\/ETSIDeliverableStatus.aspx"},{"key":"7_CR15","doi-asserted-by":"publisher","unstructured":"Ferrag, M.A., Maglaras, L., Argyriou, A., Kosmanos, D., Janicke, H.: Security for 4G and 5G cellular networks: a survey of existing authentication and privacy-preserving schemes. J. Netw. Comput. Appli. 101, 55\u201382 (2018). https:\/\/doi.org\/10.1016\/J.JNCA.2017.10.017","DOI":"10.1016\/J.JNCA.2017.10.017"},{"key":"7_CR16","doi-asserted-by":"publisher","unstructured":"Gao, S., Lin, R., Fu, Y., Li, H., Cao, J.: Security threats, requirements and recommendations on creating 5G network slicing system: a survey. Electronics13(10), 1860 (2024). https:\/\/doi.org\/10.3390\/ELECTRONICS13101860","DOI":"10.3390\/ELECTRONICS13101860"},{"key":"7_CR17","doi-asserted-by":"publisher","unstructured":"Javadpour, A., Ja\u2019fari, F., Taleb, T., Shojafar, M., Benza\u00efd, C.: A comprehensive survey on cyber deception techniques to improve honeypot performance. Comput. Sec. 140, 103792 (2024). https:\/\/doi.org\/10.1016\/J.COSE.2024.103792","DOI":"10.1016\/J.COSE.2024.103792"},{"key":"7_CR18","doi-asserted-by":"publisher","unstructured":"Karakoc, B., F\u00fcrste, N., Rupprecht, D., Kohls, K.: Never let me down again: bidding-down attacks and mitigations in 5G and 4G. In: WiSec - Proceedings of ACM Conference on Security and Privacy in Wireless and Mobile Networks, pp. 97\u2013108 (May 2023). https:\/\/doi.org\/10.1145\/3558482.3581774","DOI":"10.1145\/3558482.3581774"},{"key":"7_CR19","doi-asserted-by":"publisher","unstructured":"Kim, H.: 5g core network security issues and attack classification from network protocol perspective. J. Internet Serv. Inform. Sec. 10, 1\u201315 (2020). https:\/\/doi.org\/10.22667\/JISIS.2020.05.31.001","DOI":"10.22667\/JISIS.2020.05.31.001"},{"key":"7_CR20","doi-asserted-by":"publisher","unstructured":"Liyanage, M., et al.: A survey on zero touch network and service management (ZSM) for 5G and beyond networks. J. Netw. Comput. Appli. 203, 103362 (2022). https:\/\/doi.org\/10.1016\/J.JNCA.2022.103362","DOI":"10.1016\/J.JNCA.2022.103362"},{"key":"7_CR21","unstructured":"Lopez, P.B., Nespoli, P., Perez, M.G.: Cyber deception reactive: Tcp stealth redirection to on-demand honeypots (2024). https:\/\/arxiv.org\/abs\/2402.09191"},{"key":"7_CR22","unstructured":"L\u00f3pez, P.B., P\u00e9rez, M.G., Nespoli, P.: Cyber deception: state of the art, trends and open challenges (2024). https:\/\/arxiv.org\/abs\/2409.07194"},{"key":"7_CR23","doi-asserted-by":"publisher","first-page":"73421","DOI":"10.1109\/ACCESS.2022.3187053","volume":"10","author":"S Park","year":"2022","unstructured":"Park, S., Kwon, S., Park, Y., Kim, D., You, I.: Session management for security systems in 5G standalone network. IEEE Access 10, 73421\u201373436 (2022). https:\/\/doi.org\/10.1109\/ACCESS.2022.3187053","journal-title":"IEEE Access"},{"key":"7_CR24","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2024.3353177","author":"R Pell","year":"2024","unstructured":"Pell, R., Moschoyainnis, S., Shojafar, M.: LSTM based anomaly detection of PFCP signaling attacks in 5G networks. IEEE Consumer Electr. Mag. (2024). https:\/\/doi.org\/10.1109\/MCE.2024.3353177","journal-title":"IEEE Consumer Electr. Mag."},{"key":"7_CR25","unstructured":"Pell, R., Moschoyiannis, S., Panaousis, E., Heartfield, R.: Towards dynamic threat modelling in 5g core networks based on mitre att &ck (2021). https:\/\/arxiv.org\/abs\/2108.11206"},{"key":"7_CR26","doi-asserted-by":"publisher","unstructured":"Qin, X., Jiang, F., Cen, M., Doss, R.: Hybrid cyber defense strategies using Honey-X: a survey. Comput. Netw. 230, 109776 (2023). https:\/\/doi.org\/10.1016\/J.COMNET.2023.109776","DOI":"10.1016\/J.COMNET.2023.109776"},{"key":"7_CR27","doi-asserted-by":"publisher","unstructured":"Radoglou-Grammatikis, P., et al.: 5GCIDS: An Intrusion Detection System for 5G Core with AI and Explainability Mechanisms. In: 2023 IEEE Globecom Workshops, GC Wkshps 2023 pp. 353\u2013358 (2023). https:\/\/doi.org\/10.1109\/GCWKSHPS58843.2023.10464667","DOI":"10.1109\/GCWKSHPS58843.2023.10464667"},{"key":"7_CR28","doi-asserted-by":"publisher","unstructured":"Ramezanpour, K., Jagannath, J., Jagannath, A.: Security and privacy vulnerabilities of 5G\/6G and WiFi 6: survey and research directions from a coexistence perspective. Comput. Netw. 221, 109515 (2023). https:\/\/doi.org\/10.1016\/J.COMNET.2022.109515","DOI":"10.1016\/J.COMNET.2022.109515"},{"key":"7_CR29","doi-asserted-by":"publisher","unstructured":"Scalise, P., Boeding, M., Hempel, M., Sharif, H., Delloiacovo, J., Reed, J.: A systematic survey on 5g and 6g security considerations, challenges, trends, and research areas. Future Internet 16, 67 (2024). https:\/\/doi.org\/10.3390\/FI16030067","DOI":"10.3390\/FI16030067"},{"key":"7_CR30","doi-asserted-by":"publisher","unstructured":"Sheikhi, S., Kostakos, P.: Advancing Security in 5G Core Networks Through Unsupervised Federated Time Series Modeling. 7a6cf2d6-c1ed-404a-8f83-806e8c2abcd8 pp. 492\u2013497 (Sep 2024). https:\/\/doi.org\/10.1109\/CSR61664.2024.10679491","DOI":"10.1109\/CSR61664.2024.10679491"},{"key":"7_CR31","doi-asserted-by":"publisher","unstructured":"Soussi, W., Christopoulou, M., Gur, G., Stiller, B.: MERLINS - moving target defense enhanced with Deep-RL for NFV in-depth security. In: 2023 IEEE Conference on Network Function Virtualization and Software Defined Networks, NFV-SDN 2023 - Proceedings, pp. 65\u201371 (2023). https:\/\/doi.org\/10.1109\/NFV-SDN59219.2023.10329594","DOI":"10.1109\/NFV-SDN59219.2023.10329594"},{"key":"7_CR32","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2023.100544","volume":"48","author":"J Tan","year":"2023","unstructured":"Tan, J., et al.: A survey: when moving target defense meets game theory. Comput. Sci. Rev. 48, 100544 (2023). https:\/\/doi.org\/10.1016\/j.cosrev.2023.100544","journal-title":"Comput. Sci. Rev."}],"container-title":["Lecture Notes in Computer Science","Availability, Reliability and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-00624-0_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,9]],"date-time":"2025-08-09T11:42:34Z","timestamp":1754739754000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-00624-0_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783032006233","9783032006240"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-00624-0_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"10 August 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors have no competing interests to declare that\u00a0are relevant to the content of this article.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"ARES","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Availability, Reliability and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ghent","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Belgium","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 August 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 August 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ares-12025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2025.ares-conference.eu","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}