The increasing virtualization of fifth generation (5G) networks expands the attack surface of the user plane, making spoofing a persistent threat to slice integrity and service reliability. This study presents a slice-aware lightweight machine-learning framework for detecting spoofing attacks within 5G network slices. The framework was implemented on a reproducible Open5GS and srsRAN testbed emulating three service classes such as enhanced Mobile Broadband (eMBB), Ultra-Reliable Low-Latency Communication (URLLC), and massive Machine-Type Communication (mMTC) under controlled benign and adversarial traffic. Two efficient classifiers, Logistic Regression and Random Forest, were trained independently for each slice using statistical flow features derived from mirrored user-plane traffic. Slice-aware training improved detection accuracy by up to 5% and achieved F1-scores between 0.93 and 0.96 while maintaining real-time operation on commodity edge hardware. The results demonstrate that aligning security intelligence with slice boundaries enhances detection reliability and preserves operational isolation, enabling practical deployment in 5G network-security environments. Conceptually, the work bridges network-security architecture and adaptive machine learning by showing that isolation-aware intelligence can achieve scalable, privacy-preserving spoofing defense without high computational cost.
翻译:第五代(5G)网络日益增长的虚拟化扩大了用户平面的攻击面,使欺骗攻击成为切片完整性和服务可靠性的持续威胁。本研究提出了一种面向5G网络切片的切片感知轻量级机器学习框架,用于检测欺骗攻击。该框架在可复现的Open5GS与srsRAN测试平台上实现,模拟了增强移动宽带(eMBB)、超可靠低时延通信(URLLC)和海量机器类通信(mMTC)三类服务场景,并在受控的良性流量与对抗流量下进行验证。采用从镜像用户平面流量提取的统计流特征,分别为每个切片独立训练了逻辑回归和随机森林两种高效分类器。切片感知训练将检测准确率最高提升了5%,F1分数达到0.93至0.96,同时在商用边缘硬件上保持实时运行。结果表明,将安全智能与切片边界对齐可提升检测可靠性并维持运行隔离性,为5G网络安全环境的实际部署提供了可行性。从理念层面,本研究通过证明基于隔离感知的智能机制能够以较低计算成本实现可扩展、保护隐私的欺骗防御,从而搭建了网络安全架构与自适应机器学习之间的桥梁。