polito.it
Politecnico di Torino (logo)

Evaluation and Optimization of Automated 5G Vulnerabilities Classification

Pierpaolo Bene

Evaluation and Optimization of Automated 5G Vulnerabilities Classification.

Rel. Nicolò Maunero, Andrea Bernardini, Leonardo Sagratella. Politecnico di Torino, NON SPECIFICATO, 2025

[img] PDF (Tesi_di_laurea) - Tesi
Licenza: Creative Commons Attribution Non-commercial No Derivatives.

Download (3MB)
Abstract:

As 5G networks continue to expand into critical sectors such as healthcare, energy, and transportation, the need for robust security measures is becoming crucial. At the same time, the volume of reported vulnerabilities has grown rapidly in the last few years, increasing from around 25,000 in 2022 to projections of up to 50,000 new CVEs (Common Vulnerabilities and Exposures) in 2025. In this evolving landscape, it is essential to rapidly identify the vulnerabilities that affect the 5G infrastructure. However, traditional methods such as keyword filtering and manual review are slow and error prone, making it increasingly difficult to cope with the continuous influx of newly reported vulnerabilities. To address this problem, the study proposes a methodology to automate the classification of CVEs affecting the 5G infrastructure, making it capable of keeping up with the growing volume of vulnerabilities while preserving reliability. Experiments are conducted on a manually annotated dataset to evaluate the performances of both state-of-the-art open-source LLMs, including Qwen, Gemma, and Llama, and transformer-based models combined with traditional machine learning classifiers such as logistic regression, SVM, and XGBoost. Preliminary evidence shows that SVM achieves strong accuracy while being highly efficient in terms of computational costs. However, the findings suggest that LLM-based approaches generalize better to previously unseen CVEs and also provide explicit reasoning that supports the manual validation process. In particular, lightweight local LLMs (around 4 billion parameters) reach accuracy levels comparable to much larger models, and can be further improved with prompt engineering and fine-tuning, surpassing more resource-intensive models. Notably, the fine-tuned LLMs emerge as the most effective configuration, allowing local execution of the pipeline on limited-resource machines while preserving data privacy, maintaining high accuracy, and offering detailed reasoning that supports manual validation. The proposed approach is directly applicable to real-world security operations, where timely and reliable vulnerability assessment is crucial. Over time, the process could be refined to reduce the need for human validation, and can be easily extended to other critical sectors, broadening its impact beyond the 5G-specific use case.

Relatori: Nicolò Maunero, Andrea Bernardini, Leonardo Sagratella
Anno accademico: 2025/26
Tipo di pubblicazione: Elettronica
Numero di pagine: 86
Soggetti:
Corso di laurea: NON SPECIFICATO
Classe di laurea: Nuovo ordinamento > Laurea magistrale > LM-32 - INGEGNERIA INFORMATICA
Aziende collaboratrici: FONDAZIONE UGO BORDONI
URI: http://webthesis.biblio.polito.it/id/eprint/37644
Modifica (riservato agli operatori) Modifica (riservato agli operatori)