{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T07:05:52Z","timestamp":1760598352247,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,11,19]],"date-time":"2024-11-19T00:00:00Z","timestamp":1731974400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100014438","name":"Business Finland","doi-asserted-by":"publisher","award":["9665\/31\/2022"],"award-info":[{"award-number":["9665\/31\/2022"]}],"id":[{"id":"10.13039\/501100014438","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,11,19]]},"DOI":"10.1145\/3703790.3703815","type":"proceedings-article","created":{"date-parts":[[2025,4,8]],"date-time":"2025-04-08T12:30:00Z","timestamp":1744115400000},"page":"184-187","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Simulation of IIoT-Driven Attack Vectors on 5G Core Networks: Dataset Generation and Machine Learning Based Detection"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-7726-5063","authenticated-orcid":false,"given":"Suranga","family":"Prasad","sequence":"first","affiliation":[{"name":"Centre for Wireless Communications, University of Oulu, Oulu, Finland"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-9003-9581","authenticated-orcid":false,"given":"Pramod","family":"Munaweera","sequence":"additional","affiliation":[{"name":"Centre for Wireless Communications, University of Oulu, Oulu, Finland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4520-6542","authenticated-orcid":false,"given":"Tharaka","family":"Hewa","sequence":"additional","affiliation":[{"name":"Centre for Wireless Communications, University of Oulu, Oulu, Finland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5992-891X","authenticated-orcid":false,"given":"Yushan","family":"Siriwardhana","sequence":"additional","affiliation":[{"name":"Centre for Wireless Communications, University of Oulu, Oulu, Finland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8079-5514","authenticated-orcid":false,"given":"Mika","family":"Ylinattila","sequence":"additional","affiliation":[{"name":"Centre for Wireless Communications, University of Oulu, Oulu, Finland"}]}],"member":"320","published-online":{"date-parts":[[2025,3,31]]},"reference":[{"key":"e_1_3_3_1_2_2","first-page":"1093","volume-title":"26th USENIX security symposium (USENIX Security 17)","author":"Antonakakis Manos","year":"2017","unstructured":"Manos Antonakakis, Tim April, Michael Bailey, Matt Bernhard, Elie Bursztein, Jaime Cochran, Zakir Durumeric, J\u00a0Alex Halderman, Luca Invernizzi, Michalis Kallitsis, et\u00a0al. 2017. Understanding the mirai botnet. In 26th USENIX security symposium (USENIX Security 17). 1093\u20131110."},{"key":"e_1_3_3_1_3_2","volume-title":"Scapy Documentation","author":"Biondi Philippe","year":"2024","unstructured":"Philippe Biondi and the Scapy\u00a0community. 2024. Scapy Documentation. https:\/\/scapy.readthedocs.io\/en\/latest\/ https:\/\/scapy.readthedocs.io\/en\/latest\/."},{"key":"e_1_3_3_1_4_2","unstructured":"Defense\u00a0Use Case. 2016. Analysis of the cyber attack on the Ukrainian power grid. Electricity Information Sharing and Analysis Center (E-ISAC) 388 1-29 (2016) 3."},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"crossref","unstructured":"Sean Collins and Stephen McCombie. 2012. Stuxnet: the emergence of a new cyber weapon and its implications. Journal of Policing Intelligence and Counter Terrorism 7 1 (2012) 80\u201391.","DOI":"10.1080\/18335330.2012.653198"},{"key":"e_1_3_3_1_6_2","unstructured":"Alessandro Di\u00a0Pinto Younes Dragoni and Andrea Carcano. 2018. TRITON: The first ICS cyber attack on safety instrument systems. Proc. Black Hat USA 2018 (2018) 1\u201326."},{"key":"e_1_3_3_1_7_2","unstructured":"International Telecommunication\u00a0Union (ITU). 2024. 5G: Fifth Generation of Mobile Technologies. https:\/\/www.itu.int\/en\/mediacentre\/backgrounders\/Pages\/5G-fifth-generation-of-mobile-technologies.aspx. Accessed: 2024-08-09."},{"key":"e_1_3_3_1_8_2","unstructured":"Hwankuk Kim. 2020. 5G core network security issues and attack classification from network protocol perspective. J. Internet Serv. Inf. Secur. 10 2 (2020) 1\u201315."},{"key":"e_1_3_3_1_9_2","doi-asserted-by":"publisher","unstructured":"Ye-Eun Kim Yea-Sul Kim and Hwankuk Kim. 2022. Effective Feature Selection Methods to Detect IoT DDoS Attack in 5G Core Network. Sensors 22 10 (2022). 10.3390\/s22103819","DOI":"10.3390\/s22103819"},{"key":"e_1_3_3_1_10_2","unstructured":"Grafana Labs. 2024. Grafana: Documentation. https:\/\/grafana.com\/docs\/grafana\/latest\/. Accessed: 2024-08-08."},{"key":"e_1_3_3_1_11_2","doi-asserted-by":"publisher","unstructured":"Jiaqi Li Zhifeng Zhao and Rongpeng Li. 2018. Machine learning-based IDS for software-defined 5G network. IET Networks 7 2 (2018) 53\u201360. 10.1049\/iet-net.2017.0212 arXiv:https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/iet-net.2017.0212","DOI":"10.1049\/iet-net.2017.0212"},{"key":"e_1_3_3_1_12_2","doi-asserted-by":"publisher","unstructured":"Nataliia Neshenko Elias Bou-Harb Jorge Crichigno Georges Kaddoum and Nasir Ghani. 2019. Demystifying IoT Security: An Exhaustive Survey on IoT Vulnerabilities and a First Empirical Look on Internet-Scale IoT Exploitations. IEEE Communications Surveys & Tutorials 21 3 (2019) 2702\u20132733. 10.1109\/COMST.2019.2910750","DOI":"10.1109\/COMST.2019.2910750"},{"key":"e_1_3_3_1_13_2","unstructured":"Open5GS. 2024. Open5GS. https:\/\/open5gs.org\/. Accessed: 2024-08-01."},{"key":"e_1_3_3_1_14_2","unstructured":"OpenAirInterface. 2024. OpenAirInterface - Open-source 5G Platform. https:\/\/github.com\/OPENAIRINTERFACE\/openairinterface5g Accessed: 2024-08-08."},{"key":"e_1_3_3_1_15_2","unstructured":"Prometheus. 2024. Prometheus: Overview. https:\/\/prometheus.io\/docs\/introduction\/overview\/. Accessed: 2024-08-08."},{"key":"e_1_3_3_1_16_2","unstructured":"Rancher Labs. 2023. Rancher: Open-Source Kubernetes Management. https:\/\/rancher.com\/. Accessed: 2024-08-26."},{"key":"e_1_3_3_1_17_2","unstructured":"UERANSIM. 2024. UERANSIM. https:\/\/github.com\/aligungr\/UERANSIM. Accessed: 2024-08-01."},{"key":"e_1_3_3_1_18_2","doi-asserted-by":"publisher","unstructured":"Dan Wang Dong Chen Bin Song Nadra Guizani Xiaoyan Yu and Xiaojiang Du. 2018. From IoT to 5G I-IoT: The Next Generation IoT-Based Intelligent Algorithms and 5G Technologies. IEEE Communications Magazine 56 10 (2018) 114\u2013120. 10.1109\/MCOM.2018.1701310","DOI":"10.1109\/MCOM.2018.1701310"},{"key":"e_1_3_3_1_19_2","doi-asserted-by":"publisher","unstructured":"Meisu Zhong Yongsheng Yang Haiqing Yao Xiuwen Fu Octavia\u00a0A. Dobre and Octavian Postolache. 2019. 5G and IoT: Towards a new era of communications and measurements. IEEE Instrumentation & Measurement Magazine 22 6 (2019) 18\u201326. 10.1109\/MIM.2019.8917899","DOI":"10.1109\/MIM.2019.8917899"}],"event":{"name":"IoT 2024: 14th International Conference on the Internet of Things","acronym":"IoT 2024","location":"Oulu Finland"},"container-title":["Proceedings of the 14th International Conference on the Internet of Things"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3703790.3703815","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3703790.3703815","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:09:42Z","timestamp":1750295382000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3703790.3703815"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,19]]},"references-count":18,"alternative-id":["10.1145\/3703790.3703815","10.1145\/3703790"],"URL":"https:\/\/doi.org\/10.1145\/3703790.3703815","relation":{},"subject":[],"published":{"date-parts":[[2024,11,19]]},"assertion":[{"value":"2025-03-31","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}