Early warning model of cyber threats in 5G networks using Markov processes





Cyber threat, 5G networks, Markov processes, Vulnerability detection and remediation


Security of telecommunication networks, in which the transmission channel can be used by many users simultaneously, is a particularly important problem. In wireless metropolitan networks, this problem is compounded by the fact that the communication channel is publicly available. In other words, information transmitted in such networks can be easily intercepted by intruders. This can lead to theft of personal data, financial losses, or even to a breach of security of critical infrastructure.

Information security can be compromised by failures that affect the availability, integrity, or confidentiality of information. These failures can be caused by vulnerabilities, namely, defects in software or hardware that can be exploited by attackers to gain unauthorized access to information. Information security is one of the components of 5G networks reliability. The main security threat to such systems is vulnerabilities, primarily of software components. Despite the fact that information about vulnerabilities of software products is publicly available, there is not enough data to quantify the security of these products using a single general criterion. It is also impossible to predict how well they will be protected from attacks in the future. One of the main problems of choosing the most secure 5G configuration is the difficulty in quantifying the level of information security. In addition, it is difficult to choose adequate evaluation indicators that take into account all the factors affecting successful network penetration and the amount of potential damage.

The search for vulnerabilities in software components is an urgent and resource-intensive task that has recently been taken up by large companies and research centers. Analysis of vulnerability detection and remediation processes shows that they can be described by a mass service system with an infinite queue length.

A model for early warning of cyber threats in 5G networks using Markov processes has been developed. Using simulation modeling in the Matlab environment, a time diagram of the arrival of requests for vulnerability detection was obtained. The change in the probabilities of states was also obtained. Thus, knowing the intensity of the flows, it is possible to model and predict the processes of the arrival of requests for vulnerability detection in real time.


Nick McKeown. Openflow: enabling innovation in campus networks/ Nick McKeown, Tom Anderson, Hari Balakrishnan, Guru Parulkar, Larry Peterson, Jennifer Rexford, Scott Shenker, Jonathan Turner // ACM SIGCOMM Computer Communication Review, 38[2]. 2008. Р. 69–74.

OpenFlow Switch Specification Ver 1.5.1, 2016 [accessed January 11, 2016]. https://www.opennetworking.org/images/stories/downloads/sdnresources/ onf-specifications/openflow/openflow-switch-v1.5.1.pdf.

Партика Т.Л., Попов І.І. Інформаційна безпека : навч. посіб. для студентів закладів середньой професійної освіти. Москва : ФОРУМ: ІНФРА-М, 2002. 368с.

Лукацький А. Інформаційна безпека 2015 // Іт-безпека. Стандарти. Засоби захисту. Заходи. 2013. № 12. С.64–69.

Ложковський А.Г. Теорія масового обслуговування в телекомунікаціях : підручник. Одеса : ОНАС ім. А. С. Попова, 2012. 112 с. ISBN 978-966-7595-43-3.

Ложковський А.Г. Моделювання багатоканальної системи обслуговування з організацією черги / А.Г. Ложковський, Н.С. Салманов, О.В.Вербанов // Східно-європейський журнал передових технологій. 2007. №3/6(27). С.72–76.

Muliar B., Koliadenko Y., Moskalets M., Loshakov V. and Ageyev D. Interaction Model and Phase States at Frequency Resource Allocation in a Grouping of Radio-Electronic Equipment of 5G Mobile Communication Network // 2022 IEEE 9th International Conference on Problems of Infocommunications, Science and Technology (PIC S&T), Kharkiv, Ukraine, 2022, pp. 495–501, doi: 10.1109/PICST57299.2022.10238581.

Koliadenko Y., Moskalets M., Badieiev V., Savchenko R. (2023). Method Radio Resource Allocation in Cognitive Radio Network // Dovgyi, S., Trofymchuk, O., Ustimenko, V., Globa, L. (eds) Information and Communication Technologies and Sustainable Development. ICT&SD 2022. Lecture Notes in Networks and Systems, vol 809. Springer, Cham. Pp. 102-115 https://doi.org/10.1007/978-3-031-46880-3_7



How to Cite

Kolyadenko, Y., & Badeyev, V. (2024). Early warning model of cyber threats in 5G networks using Markov processes. Radiotekhnika, 1(216), 87–93. https://doi.org/10.30837/rt.2024.1.216.08