5G Threat Hunting Scenarios

Avatar for Purnima Murali MOHAN
Purnima Murali MOHAN    
Associate Professor

Read More 

Avatar for Aris Cahyadi RISDIANTO
Aris Cahyadi RISDIANTO    
Senior Professional Officer

Read More 

In collaboration with ITSEC Asia, this project explores 5G threat hunting scenarios aligned with the MITRE FiGHT framework, focusing on detecting Evil Twin attacks and other adversarial tactics across RAN, edge, and core

By leveraging private testbed environments, it supports the development of targeted, standards-driven defence strategies for next-gen telecom networks.

Project Deliverables/Outcomes/Impact:
  1. A. A. Hatem Attieh, L. Y. Xiao Tong, N. J. Kai, L. T. Yi Teck, I. N. Say Mun and P. M. Mohan, “Threat Hunting on5G Future Communication Testbed Using MITRE FiGHT Framework,” TENCON 2024 – 2024 IEEE Region 10Conference (TENCON), Singapore, Singapore, 2024, pp. 1-5, doi: 10.1109/TENCON61640.2024.10903058.
  2. “Validating Evil Twin Attacks in 5G/6G Based on the MITRE FiGHT” – Presented at the 2025 IEEE INFOCOM in May 2025


     

 

A collage documenting a 5G cybersecurity research project titled "Threat Hunting on 5G Future Communication Testbed." It includes a technical poster with MITRE FiGHT framework details, network traffic logs from Wireshark, a physical server rack labeled "Attacker" and "Victim," and a group photo of the project team.