E2E Network Slicing for Enhanced Cybersecurity, Orchestration, Automation and Response in 5G/6G: The RIGOUROUS Approach

Abstract

This paper addresses the challenge of cybersecurity in ensuring cybersecurity in complex 5G and future 6G network environments, characterized by multi-domain, multi-tenant architectures and diverse technologies. The RIGOUROUS project proposes a novel network self-protection (NSP) scheme based on End-to-End (E2E) network slicing to address these challenges. The paper details this scheme’s design, prototype, and preliminary results, which leverage a Security Orchestration, Automation, and Response (Security Orchestration, Automation and Response (SOAR)) loop to automate threat detection, mitigation planning, and enforcement. The core components of the SOAR loop, including the Topology Inventory Agent (TIA), Network Security Flow Monitoring (NSFM), Slice Mitigation Planner Service (SMPS), Security Orchestrator (SO), and Slice Manager (SM), are described. Additionally, the solution is centered on NSP based on the Open vSwitch (OVS) platform, for which significant extensions have been undertaken to support Network Slicing capabilities in multi-tenant, multi-domain beyond 5G networks. Preliminary experiments show promising results in terms of overhead introduced in the data plane (on the order of microseconds) and high scalability when deploying up to 2048 network slices. The implementation of the network slicing-based mitigation strategy in the software data path is presented, along with a use case demonstrating its effectiveness in mitigating cyberattacks. The preliminary results highlight, in a scenario with up to 64 infected UEs, a reaction time of 15.28 s in the best-case scenario and 51.52 s in the worst-case scenario. The proposed solution shows potential to enhance the security and resilience of next-generation network infrastructures.

Publication DOI: https://doi.org/10.1007/s10922-025-09999-w
Divisions: College of Engineering & Physical Sciences
College of Engineering & Physical Sciences > School of Computer Science and Digital Technologies
Aston University (General)
Funding Information: This work is funded by the European Commission under Grant Agreements HORIZON-JU-SNS-2022-STREAM-B-01-04/101095933 - RIGOUROUS: secuRe desIGn and deplOyment of trUsthwoRthy cOntinUum computing 6G Services.
Additional Information: Copyright © The Author(S) 2025. This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit https://creativecommons.org/licenses/by/4.0/.
Publication ISSN: 1573-7705
Last Modified: 27 Nov 2025 17:01
Date Deposited: 11 Nov 2025 11:19
Full Text Link:
Related URLs: https://link.sp ... 922-025-09999-w (Publisher URL)
http://www.scop ... tnerID=8YFLogxK (Scopus URL)
PURE Output Type: Article
Published Date: 2025-11-10
Published Online Date: 2025-11-10
Accepted Date: 2025-10-27
Authors: Benlloch-Caballero, Pablo
Matencio Escolar, Antonio
Bernal Bernabe, Jorge
Gomez Skarmeta, Antonio F.
Wang, Qi
Alcaraz Calero, Jose M (ORCID Profile 0000-0002-2654-7595)

Download

[img]

Version: Published Version

License: Creative Commons Attribution


Export / Share Citation


Statistics

Additional statistics for this record