5Ghoul Defensive Detection: Inverted Exploit Signatures for 5G NR Pre-Authentication Attack Monitoring
A complete defensive detection framework for the 5Ghoul family of 5G NR pre-authentication vulnerabilities, comprising an IDS script with inverted exploit signatures for all 12 published CVEs (V5-V16) and the DA1 NAS flooding downgrade attack, Wireshark forensic filters, and constitutional detection constraints following a refuse-rather-than-miss philosophy.
5G NR5Ghoulbaseband securityintrusion detectionconstitutional constraintspre-authentication attacks
Cite
Thomas Perry Jr.. "5Ghoul Defensive Detection: Inverted Exploit Signatures for 5G NR Pre-Authentication Attack Monitoring." Pastoral Tech, 2026-02-20. DOI: 10.5281/zenodo.18707254. Available at: https://doi.org/10.5281/zenodo.18707254
BibTeX
@article{perry20265ghoul,
author = {Perry, Thomas Jr.},
title = {5Ghoul Defensive Detection: Inverted Exploit Signatures for 5G NR Pre-Authentication Attack Monitoring},
year = {2026},
month = {02},
doi = {10.5281/zenodo.18707254},
url = {https://doi.org/10.5281/zenodo.18707254},
publisher = {Zenodo},
license = {CC-BY-4.0}
}