Abstract:
The paper concerns the possibility of conducting attacks on the 5G Core Network. The concept of attacks involving modification of control packets of the PFCP protocol were presented, along with their implementations. In the subsequent part, the possibilities of detecting such threats were discussed