{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T12:50:48Z","timestamp":1761655848631,"version":"build-2065373602"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","funder":[{"name":"Next Generation EU","award":["F83C22001690001","E83C22004640001"],"award-info":[{"award-number":["F83C22001690001","E83C22004640001"]}]},{"name":"SEcurity and RIghts In the CyberSpace","award":["F83C22001670001"],"award-info":[{"award-number":["F83C22001670001"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,11,4]]},"DOI":"10.1145\/3737895.3768301","type":"proceedings-article","created":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T12:45:42Z","timestamp":1761655542000},"page":"57-64","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["5GMon: Enhancing Visibility and Security in 5G Network Deployments"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1924-8706","authenticated-orcid":false,"given":"Francesco","family":"Mancini","sequence":"first","affiliation":[{"name":"CNIT, Rome, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3607-1524","authenticated-orcid":false,"given":"Angelo","family":"Tulumello","sequence":"additional","affiliation":[{"name":"CNIT, Rome, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1199-0479","authenticated-orcid":false,"given":"Giacomo","family":"Belocchi","sequence":"additional","affiliation":[{"name":"Electronic Engineering, University of Rome Tor Vergata, Rome, RM, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7277-7423","authenticated-orcid":false,"given":"Giuseppe","family":"Bianchi","sequence":"additional","affiliation":[{"name":"Electronic Engineering, University of Rome Tor Vergata, Rome, RM, Italy"}]}],"member":"320","published-online":{"date-parts":[[2025,11,3]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","unstructured":"George Amponis Panagiotis Radoglou-Grammatikis Thomas Lagkas Wissam Mallouli Ana Cavalli Dimitris Klonidis Evangelos Markakis and Panagiotis Sarigiannidis. 2022. Threatening the 5g core via pfcp dos attacks: the case of blocking uav communications. EURASIP Journal on Wireless Communications and Networking. 10.1186\/s13638-022-02204-5","DOI":"10.1186\/s13638-022-02204-5"},{"volume-title":"California consumer privacy act of","year":"2018","key":"e_1_3_2_1_2_1","unstructured":"2018. California consumer privacy act of 2018. Retrieved 2025-07-28 from https:\/\/theccpa.org\/."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2019.2933358"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSR51186.2021.9527976"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MELCON.2014.6820557"},{"key":"e_1_3_2_1_6_1","volume-title":"of","author":"European Parliament and Council of the European Union. 2016. Regulation (EU) 2016\/679 of the European Parliament and of the Council.","year":"2016","unstructured":"European Parliament and Council of the European Union. 2016. Regulation (EU) 2016\/679 of the European Parliament and of the Council. of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46\/EC (General Data Protection Regulation). (May 4, 2016). Retrieved July 28, 2025 from https:\/\/data.europa.eu\/eli\/reg\/2016\/679\/oj."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/W-FiCloud.2016.30"},{"key":"e_1_3_2_1_8_1","volume-title":"Subscriber-aware correlation for 5g networks. https:\/\/www.gigamon.com\/content\/dam\/resource-library\/english\/feature-brief\/fb-5g-correlation.pdf. Accessed","author":"Gigamon Inc. 2022.","year":"2025","unstructured":"Gigamon Inc. 2022. Subscriber-aware correlation for 5g networks. https:\/\/www.gigamon.com\/content\/dam\/resource-library\/english\/feature-brief\/fb-5g-correlation.pdf. Accessed 27 May 2025. (2022)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","unstructured":"Daniel Grzonka Agnieszka Jak\u00f3bik Joanna Ko\u0142odziej and Sabri Pllana. 2018. Using a multi-agent system and artificial intelligence for monitoring and improving the cloud performance and security. Future Generation Computer Systems. 10.1016\/j.future.2017.05.046","DOI":"10.1016\/j.future.2017.05.046"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544216.3544267"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/CINTI53070.2021.9668469"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCES.2017.8275301"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMSNETS.2013.6465540"},{"key":"e_1_3_2_1_14_1","unstructured":"Mark Tedman. 2021. Technical advisory - open5gs stack buffer overflow during pfcp session establishment on upf (cve-2021-41794). https:\/\/www.nccgroup.com\/sg\/research-blog\/technical-advisory-open5gs-stack-buffer-overflow-during-pfcp-session-establishment-on-upf-cve-2021-41794\/. Accessed 27 May 2025. (2021)."},{"key":"e_1_3_2_1_15_1","unstructured":"[SW] NetFlow 1996. url: https:\/\/www.cisco.com\/c\/en\/us\/products\/ios-nx-os-software\/ios-netflow\/index.html."},{"volume-title":"Network Domain Security (NDS)","key":"e_1_3_2_1_16_1","unstructured":"2024. Network Domain Security (NDS); IP network layer security. TS 33.210. Rel. 18. 3GPP."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2968718"},{"key":"e_1_3_2_1_18_1","volume-title":"NMAP Detection Rules version 2.1","author":"SW","year":"2024","unstructured":"[SW exc.], NMAP Detection Rules version 2.1, 2024. url: https:\/\/github.com\/aleksibovellan\/opnsense-suricata-nmaps."},{"volume-title":"d.] Core network software as a service. https:\/\/www.nokia.com\/core-networks\/5g-core\/core-saas\/. Accessed","year":"2025","key":"e_1_3_2_1_19_1","unstructured":"Nokia. [n. d.] Core network software as a service. https:\/\/www.nokia.com\/core-networks\/5g-core\/core-saas\/. Accessed 30 May 2025. ()."},{"volume-title":"N2disk 100 gb\/s packet recorder. https:\/\/www.ntop.org\/products\/packet-capture\/n2disk\/. Accessed","year":"2025","key":"e_1_3_2_1_20_1","unstructured":"ntop. 2023. N2disk 100 gb\/s packet recorder. https:\/\/www.ntop.org\/products\/packet-capture\/n2disk\/. Accessed 27 May 2025. (2023)."},{"key":"e_1_3_2_1_21_1","volume-title":"Aether: Private 4G\/5G Connected Edge Platform for Enterprises. Tech. rep. https:\/\/opennetworking.org\/wp-content\/uploads\/2021\/08\/Aether-Technical-White-Paper-1.pdf.","author":"ONF.","year":"2020","unstructured":"ONF. 2020. Aether: Private 4G\/5G Connected Edge Platform for Enterprises. Tech. rep. https:\/\/opennetworking.org\/wp-content\/uploads\/2021\/08\/Aether-Technical-White-Paper-1.pdf."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3643833.3656129"},{"key":"e_1_3_2_1_23_1","unstructured":"Palo Alto Networks. 2024. Ue ip correlation through pfcp in telco ngfw. https:\/\/docs.paloaltonetworks.com\/pan-os\/11-0\/pan-os-new-features\/mobile-infrastructure-security-features\/user-equipment-ue-to-ip-address-correlation-for-5g-migration. Accessed 27 May 2025. (2024)."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3187053"},{"key":"e_1_3_2_1_25_1","unstructured":"Proofpoint Emerging Threats. [n. d.] ETOpen Ruleset - Emerging Threats Open Source IDS Rules. https:\/\/rules.emergingthreats.net\/open.html. Accessed: 2025-05-29. ()."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2006.275197"},{"key":"e_1_3_2_1_27_1","volume-title":"Proc. International Conference on Software and Data Technologies (ICSOFT","author":"Salazar Zujany","year":"2022","unstructured":"Zujany Salazar, Huu Nghia Nguyen, Wissam Mallouli, Ana R. Cavalli, and Edgardo Montes de Oca. 2022. A formal approach for complex attacks generation based on mutation of 5g network traffic. In Proc. International Conference on Software and Data Technologies (ICSOFT 2022)."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3465481.3470079"},{"key":"e_1_3_2_1_29_1","unstructured":"2024. Security architecture and procedures for 5G System. TS 33.501. Rel. 19. 3GPP."},{"key":"e_1_3_2_1_30_1","unstructured":"[SW] sFlow. url: https:\/\/sflow.org\/."},{"key":"e_1_3_2_1_31_1","unstructured":"[SW] Snort 1998. url: https:\/\/www.snort.org\/ vcs: https:\/\/github.com\/snort3\/snort3."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1282427.1282394"},{"key":"e_1_3_2_1_33_1","unstructured":"[SW] Suricata 2007. url: https:\/\/suricata.io\/ vcs: https:\/\/github.com\/OISF\/suricata."},{"key":"e_1_3_2_1_34_1","unstructured":"[SW] Wazuh 2017. url: https:\/\/wazuh.com\/ vcs: https:\/\/github.com\/wazuh."},{"key":"e_1_3_2_1_35_1","volume-title":"Proc. NDSS","author":"Wen Haohuang","year":"2024","unstructured":"Haohuang Wen, Phillip Porras, Vinod Yegneswaran, Ashish Gehani, and Zhiqiang Lin. 2024. 5g-spector: an o-ran compliant layer-3 cellular attack detection service. In Proc. NDSS 2024."},{"volume-title":"Wireshark display filter reference: ngap. https:\/\/wiki.wireshark.org\/DisplayFilters. Accessed","year":"2025","key":"e_1_3_2_1_36_1","unstructured":"Wireshark. 2024. Wireshark display filter reference: ngap. https:\/\/wiki.wireshark.org\/DisplayFilters. Accessed 27 May 2025. (2024)."}],"event":{"name":"WiNTECH '25: ACM Workshop on Wireless Network Testbeds, Experimental evaluation & Characterization","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"Kerry Hotel, Hong Kong Hong Kong China","acronym":"WiNTECH '25"},"container-title":["Proceedings of the ACM Workshop on Wireless Network Testbeds, Experimental evaluation &amp; Characterization"],"original-title":[],"deposited":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T12:45:57Z","timestamp":1761655557000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3737895.3768301"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,3]]},"references-count":36,"alternative-id":["10.1145\/3737895.3768301","10.1145\/3737895"],"URL":"https:\/\/doi.org\/10.1145\/3737895.3768301","relation":{},"subject":[],"published":{"date-parts":[[2025,11,3]]},"assertion":[{"value":"2025-11-03","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}