{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,6]],"date-time":"2024-08-06T08:36:25Z","timestamp":1722933385120},"reference-count":54,"publisher":"MDPI AG","issue":"4","license":[{"start":{"date-parts":[[2023,10,26]],"date-time":"2023-10-26T00:00:00Z","timestamp":1698278400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["BDCC"],"abstract":"It is clear that 5G networks have already become integral to our present. However, a significant issue lies in the fact that current 5G communication systems are incapable of fully ensuring the required quality of service and the security of transmitted data, especially in government networks that operate in the context of the Internet of Things, hostilities, hybrid warfare, and cyberwarfare. The use of 5G extends to critical infrastructure operators and special users such as law enforcement, governments, and the military. Adapting modern cellular networks to meet the specific needs of these special users is not only feasible but also necessary. In doing so, these networks must meet additional stringent requirements for reliability, performance, and, most importantly, data security. This scientific paper is dedicated to addressing the challenges associated with ensuring cybersecurity in this context. To effectively improve or ensure a sufficient level of cybersecurity, it is essential to measure the primary indicators of the effectiveness of the security system. At the moment, there are no comprehensive lists of these key indicators that require priority monitoring. Therefore, this article first analyzed the existing similar indicators and presented a list of them, which will make it possible to continuously monitor the state of cybersecurity systems of 5G cellular networks with the aim of using them for groups of special users. Based on this list of cybersecurity KPIs, as a result, this article presents a model to identify and evaluate these indicators. To develop this model, we comprehensively analyzed potential groups of performance indicators, selected the most relevant ones, and introduced a mathematical framework for their quantitative assessment. Furthermore, as part of our research efforts, we proposed enhancements to the core of the 4G\/5G network. These enhancements enable data collection and statistical analysis through specialized sensors and existing servers, contributing to improved cybersecurity within these networks. Thus, the approach proposed in the article opens up an opportunity for continuous monitoring and, accordingly, improving the performance indicators of cybersecurity systems, which in turn makes it possible to use them for the maintenance of critical infrastructure and other users whose service presents increased requirements for cybersecurity systems.<\/jats:p>","DOI":"10.3390\/bdcc7040169","type":"journal-article","created":{"date-parts":[[2023,10,26]],"date-time":"2023-10-26T06:40:07Z","timestamp":1698302407000},"page":"169","source":"Crossref","is-referenced-by-count":4,"title":["Assessment of Security KPIs for 5G Network Slices for Special Groups of Subscribers"],"prefix":"10.3390","volume":"7","author":[{"given":"Roman","family":"Odarchenko","sequence":"first","affiliation":[{"name":"Department of Telecommunication and Radioelectronic Systems, National Aviation University, 03058 Kyiv, Ukraine"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-3109-7971","authenticated-orcid":false,"given":"Maksim","family":"Iavich","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Caucasus University, 0102 Tbilisi, Georgia"}]},{"given":"Giorgi","family":"Iashvili","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Caucasus University, 0102 Tbilisi, Georgia"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-7548-5856","authenticated-orcid":false,"given":"Solomiia","family":"Fedushko","sequence":"additional","affiliation":[{"name":"Department of Social Communication and Information Activity, Lviv Polytechnic National University, 79000 Lviv, Ukraine"},{"name":"Department of Information Systems, Faculty of Management, Comenius University in Bratislava, 820 05 Bratislava, Slovakia"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-5293-4791","authenticated-orcid":false,"given":"Yuriy","family":"Syerov","sequence":"additional","affiliation":[{"name":"Department of Social Communication and Information Activity, Lviv Polytechnic National University, 79000 Lviv, Ukraine"},{"name":"Department of Information Systems, Faculty of Management, Comenius University in Bratislava, 820 05 Bratislava, Slovakia"}]}],"member":"1968","published-online":{"date-parts":[[2023,10,26]]},"reference":[{"key":"ref_1","first-page":"35","article-title":"Applying Clustering to Predict Attackers Trace in Deceptive Ecosystem by Harmonizing Multiple Decoys Interactions Logs","volume":"15","author":"Pateria","year":"2023","journal-title":"Int. J. Inf. Technol. Comput. Sci."},{"key":"ref_2","first-page":"1","article-title":"Methodologies, Requirements and Challenges of Cybersecurity Frameworks: A Review","volume":"13","author":"Khaleefah","year":"2023","journal-title":"Int. J. Wirel. Microw. Technol."},{"key":"ref_3","unstructured":"(2023, July 10). 5G Network Slice Management. Available online: https:\/\/www.3gpp.org\/technologies\/slice-management."},{"key":"ref_4","unstructured":"(2023, September 09). 5G-Trials\u2014From 5G Experiments to Business Validation. Available online: https:\/\/5g-drive.eu\/."},{"key":"ref_5","unstructured":"(2022, June 17). 5G-MoNArch: 5G Mobile Network Architecture for Diverse Services, Use Cases, and Applications in 5G and Beyond. Available online: https:\/\/5g-ppp.eu\/5g-monarch\/."},{"key":"ref_6","unstructured":"Juniper Networks Whitepaper (2021, April 22). Managing 5G Slice Quality of Service End-to-End. Available online: https:\/\/www.juniper.net\/content\/dam\/www\/assets\/flyers\/us\/en\/managing-5g-slice-quality-of-service-end-to-end.pdf."},{"key":"ref_7","unstructured":"Hall\u00e9, C. (2020, November 16). Why Network Slicing Requires Active Monitoring, Passive Monitoring AND True APM. Available online: https:\/\/accedian.com\/blog\/why-network-slicing-requires-active-monitoring-passive-monitoring-and-true-apm\/."},{"key":"ref_8","unstructured":"Emblasoft (2022, December 06). Innovate, Validate, Operate. Available online: https:\/\/emblasoft.com\/."},{"key":"ref_9","unstructured":"(2020, October 19). 5G Network Slicing Self-Management White Paper. Available online: https:\/\/www-file.huawei.com\/-\/media\/corporate\/pdf\/news\/5g-network-slicing-self-management-white-paper.pdf?la=en."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Wichary, T., Mongay Batalla, J., Mavromoustakis, C.X., \u017burek, J., and Mastorakis, G. (2022). Network Slicing Security Controls and Assurance for Verticals. Electronics, 11.","DOI":"10.3390\/electronics11020222"},{"key":"ref_11","first-page":"44","article-title":"Game-Theoretic Resource Allocation Algorithms for Device-to-Device Communications in Fifth Generation Cellular Networks: A Review","volume":"13","author":"Ogidiaka","year":"2021","journal-title":"Int. J. Inf. Eng. Electron. Bus."},{"key":"ref_12","first-page":"13","article-title":"Reinforcement Learning Based Efficient Power Control and Spectrum Utilization for D2D Communication in 5G Network","volume":"15","author":"Mallipudi","year":"2023","journal-title":"Int. J. Comput. Netw. Inf. Secur."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Majeed, A., Alnajim, A.M., Waseem, A., Khaliq, A., Naveed, A., Habib, S., Islam, M., and Khan, S. (2023). Deep Learning-Based Symptomizing Cyber Threats Using Adaptive 5G Shared Slice Security Approaches. Future Internet, 15.","DOI":"10.3390\/fi15060193"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Zahoor, S., Ahmad, I., Othman, M., Mamoon, A., Rehman, A.U., Shafiq, M., and Hamam, H. (2022). Comprehensive Analysis of Network Slicing for the Developing Commercial Needs and Networking Challenges. Sensors, 22.","DOI":"10.3390\/s22176623"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1007\/s10922-023-09728-1","article-title":"Assisted Monitoring and Security Provisioning for 5G Microservices-Based Network Slices with SWEETEN","volume":"31","author":"Wickboldt","year":"2023","journal-title":"J. Netw. Syst. Manag."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"442","DOI":"10.23919\/JCN.2021.000025","article-title":"6G-LEGO: A framework for 6G network slices","volume":"23","author":"Kuklinski","year":"2021","journal-title":"J. Commun. Netw."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Kukli\u0144ski, S., and Tomaszewski, L. (2019, January 24\u201328). Key Performance Indicators for 5G network slicing. Proceedings of the IEEE Conference on Network Softwarization (NetSoft), Paris, France.","DOI":"10.1109\/NETSOFT.2019.8806692"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"145918","DOI":"10.1109\/ACCESS.2020.3014356","article-title":"Block5GIntell: Blockchain for AI-Enabled 5G Networks","volume":"8","author":"Singh","year":"2020","journal-title":"IEEE Access"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"190822","DOI":"10.1109\/ACCESS.2020.3031966","article-title":"Machine Learning Threatens 5G Security","volume":"8","author":"Suomalainen","year":"2020","journal-title":"IEEE Access"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1109\/MWC.2019.1800234","article-title":"An Overview of Network Slicing for 5G","volume":"26","author":"Zhang","year":"2019","journal-title":"IEEE Wirel. Commun."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Koumaras, H., Tsolkas, D., Gardikis, G., Gomez, P.M., Frascolla, V., Triantafyllopoulou, D., Emmelmann, M., Koumaras, V., Osma, M.L.G., and Munaretto, D. (2018, January 17\u201319). 5GENESIS: The Genesis of a flexible 5G Facility. Proceedings of the 2018 IEEE 23rd International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), Barcelona, Spain.","DOI":"10.1109\/CAMAD.2018.8514956"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Doukoglou, T., Gezerlis, V., Trichias, K., Kostopoulos, N., Vrakas, N., Bougioukos, M., and Legouable, R. (2019, January 18\u201321). Vertical Industries Requirements Analysis & Targeted KPIs for Advanced 5G Trials. Proceedings of the 2019 European Conference on Networks and Communications (EuCNC), Valencia, Spain.","DOI":"10.1109\/EuCNC.2019.8801959"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Gupta, M., Legouable, R., Rosello, M.M., Cecchi, M., Alonso, J.R., Lorenzo, M., Kosmatos, E., Boldi, M.R., and Carrozzo, G. (2019, January 20\u201324). The 5G EVE End-to-End 5G Facility for Extensive Trials. Proceedings of the 2019 IEEE International Conference on Communications Workshops (ICC Workshops), Shanghai, China.","DOI":"10.1109\/ICCW.2019.8757139"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1109\/MNET.2018.1800052","article-title":"Satellite Networking Integration in the 5G Ecosystem: Research Trends and Open Challenges","volume":"32","author":"Boero","year":"2018","journal-title":"IEEE Netw."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Banovi\u0107-\u0106urguz, N., and Ili\u0161evi\u0107, D. (2019, January 20\u201324). Mapping of QoS\/QoE in 5G Networks. Proceedings of the 2019 42nd International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), Opatija, Croatia.","DOI":"10.23919\/MIPRO.2019.8757034"},{"key":"ref_26","unstructured":"Christopoulou, M., Xilouris, G., Sarlas, A., Koumaras, H., Kourtis, M.-A., and Anagnostopoulos, T. (2021, January 17\u201321). 5G Experimentation: The Experience of the Athens 5GENESIS Facility. Proceedings of the 2021 IFIP\/IEEE International Symposium on Integrated Network Management (IM), Bordeaux, France."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Saha, N., James, A., Shahriar, N., Boutaba, R., and Saleh, A. (2022, January 25\u201329). Demonstrating Network Slice KPI Monitoring in a 5G Testbed. Proceedings of the NOMS 2022\u20132022 IEEE\/IFIP Network Operations and Management Symposium, Budapest, Hungary.","DOI":"10.1109\/NOMS54207.2022.9789904"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1109\/MNET.001.2100361","article-title":"Practically Deploying Multiple Vertical Services into 5G Networks with Network Slicing","volume":"36","author":"Xie","year":"2022","journal-title":"IEEE Netw."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Lagen, S., Bojovic, B., Koutlia, K., Zhang, X., Wang, P., and Qu, Q. (2023). QoS Management for XR Traffic in 5G NR: A Multi-Layer System View & End-to-End Evaluation. IEEE Commun. Mag., 1\u20137.","DOI":"10.1109\/MCOM.015.2200745"},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Vordonis, D., Giannopoulos, D., Papaioannou, P., Tranoris, C., Denazis, S., Rahav, R., Altman, B., Bosneag, A.-M., Jain, S., and Margolin, U. (2022, January 5\u20138). Monitoring and Evaluation of 5G Key Performance Indicators in Media Vertical Applications. Proceedings of the 2022 IEEE International Mediterranean Conference on Communications and Networking (MeditCom), Athens, Greece.","DOI":"10.1109\/MeditCom55741.2022.9928641"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Bolla, R., Bruschi, R., Davoli, F., Lombardo, C., Pajo, J.F., and Siccardi, B. (2023, January 13\u201315). Machine-Learning-Based 5G Network Function Scaling via Black- and White-Box KPIs. Proceedings of the 21st Mediterranean Communication and Computer Networking Conference (MedComNet), Island of Ponza, Italy.","DOI":"10.1109\/MedComNet58619.2023.10168859"},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Pinto, A., Santaromita, G., Fiandrino, C., Giustiniano, D., and Esposito, F. (2022, January 14\u201316). Characterizing Location Management Function Performance in 5G Core Networks. Proceedings of the IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN), Phoenix, AZ, USA.","DOI":"10.1109\/NFV-SDN56302.2022.9974927"},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Abdellatif, A.A., Mohamed, A., Erbad, A., and Guizani, M. (2022, January 10\u201313). Dynamic Network Slicing and Resource Allocation for 5G-and-Beyond Networks. Proceedings of the 2022 IEEE Wireless Communications and Networking Conference (WCNC), Austin, TX, USA.","DOI":"10.1109\/WCNC51071.2022.9771877"},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Beaubrun, R. (2022, January 5\u20138). Technical Challenges and Categorization of 5G Mobile Services. Proceedings of the 2022 Thirteenth International Conference on Ubiquitous and Future Networks (ICUFN), Barcelona, Spain.","DOI":"10.1109\/ICUFN55119.2022.9829623"},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"168","DOI":"10.1109\/MNET.011.2100116","article-title":"The Open Challenge of Integrating Satellites into (Beyond-) 5G Cellular Networks","volume":"36","author":"Luise","year":"2022","journal-title":"IEEE Netw."},{"key":"ref_36","first-page":"39","article-title":"Threat Modelling and Detection Using Semantic Network for Improving Social Media Safety","volume":"15","author":"Fkih","year":"2023","journal-title":"Int. J. Comput. Netw. Inf. Secur."},{"key":"ref_37","first-page":"52","article-title":"Ontologies as Building Blocks of Cloud Security","volume":"14","author":"Shaikh","year":"2022","journal-title":"Int. J. Inf. Technol. Comput. Sci."},{"key":"ref_38","unstructured":"(2019, November 19). Redefining Security KPIs for 5G Service Providers. Available online: https:\/\/www.helpnetsecurity.com\/2019\/11\/19\/5g-security-kpis\/."},{"key":"ref_39","unstructured":"Help Net Security (2011, July 24). Average Data Breach Cost Has Risen to $3.92 Million. Available online: https:\/\/www.helpnetsecurity.com\/2019\/07\/24\/data-breach-cost\/."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"694","DOI":"10.1016\/j.procs.2021.12.308","article-title":"Models for early web-attacks detection and intruders identification based on fuzzy logic","volume":"198","author":"Avkurova","year":"2022","journal-title":"Procedia Comput. Sci."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1145\/332159.332161","article-title":"An introduction to intrusion detection","volume":"2","author":"Aurobindo","year":"1996","journal-title":"Crossroads"},{"key":"ref_42","unstructured":"Kuypers, M.A., Maillart, T., and Pat\u00e9-Cornell, E. (2016). An Empirical Analysis of Cyber Security Incidents at a Large Organization, Department of Management Science and Engineering, Stanford University, School of Information."},{"key":"ref_43","unstructured":"Doerrfeld, B. (2023, July 07). 5 Mean-Time Reliability Metrics to Follow. 7 July 2022. Available online: https:\/\/devops.com\/5-mean-time-reliability-metrics-to-follow."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1016\/j.trc.2012.12.005","article-title":"Modeling freeway incident response time: A mechanism-based approach","volume":"28","author":"Hou","year":"2013","journal-title":"Transp. Res. Part C Emerg. Technol."},{"key":"ref_45","unstructured":"Oggerino, C. (2001). High Availability Network Fundamentals, Cisco Press."},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Azenkot, S., Rector, K., Ladner, R., and Wobbrock, J. (2012, January 22\u201324). PassChords: Secure multi-touch authentication for blind people. Proceedings of the 14th international ACM SIGACCESS conference on Computers and Accessibility, Boulder, CO, USA.","DOI":"10.1145\/2384916.2384945"},{"key":"ref_47","doi-asserted-by":"crossref","unstructured":"Campos, L.M., Ribeiro, L., Karydis, I., Karagiannis, S., Pedro, D., Martins, J., Marques, C., Armada, A.G., Leal, R.P., and Lopez-Morales, M.J. (2020, January 20\u201322). Reference Scenarios and Key Performance Indicators for 5G Ultra-dense Networks. Proceedings of the 12th International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP), Porto, Portugal.","DOI":"10.1109\/CSNDSP49049.2020.9249513"},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1108\/09685221011079199","article-title":"A survey of intrusion detection and prevention systems","volume":"18","author":"Patel","year":"2010","journal-title":"Inf. Manag. Comput. Secur."},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1016\/j.jnca.2016.01.008","article-title":"A survey on data leakage prevention systems","volume":"62","author":"Alneyadi","year":"2016","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_50","doi-asserted-by":"crossref","unstructured":"Lobato, A.G.P., Lopez, M.A., Sanz, I.J., Cardenas, A.A., Duarte, O.C.M., and Pujolle, G. (2018, January 20\u201324). An adaptive real-time architecture for zero-day threat detection. Proceedings of the IEEE International Conference on Communications (ICC), Kansas City, MO, USA.","DOI":"10.1109\/ICC.2018.8422622"},{"key":"ref_51","first-page":"269","article-title":"The Evolution of Legal Risks Pertaining to Patch Management and Vulnerability Management","volume":"59","author":"Kitchen","year":"2021","journal-title":"Duq. L. Rev."},{"key":"ref_52","doi-asserted-by":"crossref","unstructured":"Susanto, H., and Almunawar, M.N. (2018). Information Security Management Systems: A Novel Framework and Software as a Tool for Compliance with Information Security Standard, CRC Press.","DOI":"10.1201\/9781315232355"},{"key":"ref_53","doi-asserted-by":"crossref","unstructured":"Perez, R., Garcia-Reinoso, J., Zabala, A., Serrano, P., and Banchs, A. (2020, January 15\u201318). A monitoring framework for multi-site 5G platforms. Proceedings of the IEEE European Conference on Networks and Communications (EuCNC), Dubrovnik, Croatia.","DOI":"10.1109\/EuCNC48522.2020.9200914"},{"key":"ref_54","doi-asserted-by":"crossref","unstructured":"Porambage, P., Miche, Y., Kalliola, A., Liyanage, M., and Ylianttila, M. (2019, January 28\u201330). Secure Keying Scheme for Network Slicing in 5G Architecture. Proceedings of the IEEE Conference on Standards for Communications and Networking (CSCN), Granada, Spain.","DOI":"10.1109\/CSCN.2019.8931330"}],"container-title":["Big Data and Cognitive Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2504-2289\/7\/4\/169\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,26]],"date-time":"2023-10-26T09:02:58Z","timestamp":1698310978000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2504-2289\/7\/4\/169"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,26]]},"references-count":54,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2023,12]]}},"alternative-id":["bdcc7040169"],"URL":"https:\/\/doi.org\/10.3390\/bdcc7040169","relation":{},"ISSN":["2504-2289"],"issn-type":[{"value":"2504-2289","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,10,26]]}}}