This page is being moved to a new, faster, and mobile-friendly application! Access the enhanced and centralized experience now on MyWorkspace.
ITU's 160 anniversary

Connecting the world and beyond

  •  

ITU-T work programme

[2025-2028] : [SG17] : [Q4/17]

[Declared patent(s)]  - [Associated work]

Work item: XSTR.da-AIcsp
Subject/title: Development and analysis of an AI-Based cybersecurity simulation platform
Status: Under study 
Approval process: Agreement
Type of work item: Technical report
Version: New
Equivalent number: -
Timing: 2026-Q3 (Medium priority)
Liaison: -
Supporting members: China Unicom, China Telecom
Summary: The telecommunications landscape is evolving towards 5G-Advanced and 6G. The inherent cloudification, service-based architecture, and openness of these networks have dramatically expanded the cyber attack surface, leading to more sophisticated and adaptive threats. Traditional signature-based and static security defense mechanisms are proving insufficient. The industry urgently needs to shift towards a paradigm of continuous validation and proactive immunity. In this context, the construction of an integrated cybersecurity simulation platform, combining high-fidelity network emulation, dynamic adversarial simulation, and AI-driven decision-making, has become a critical strategic initiative for enhancing the resilience of telecommunications infrastructure. This Technical Report aims to provide a comprehensive, forward-looking, and actionable guideline for telecommunications operators, equipment manufacturers, service providers, and national regulators. Its purpose is to assist in the planning, construction, operation, and evaluation of an AI-based cybersecurity simulation platform. This Technical Report outlines the platform's functional requirements, technical implementation, a phased deployment roadmap, and an evaluation framework. It clearly identifies its unique role in converging the fields of AI, cybersecurity, and telecommunications simulation to address a critical gap in dynamic, intelligent security validation. By adopting this framework, industry stakeholders can systematically enhance their cyber resilience, laying a solid foundation for a trustworthy digital society.
Comment: -
Reference(s):
  Historic references:
-
Contact(s):
Lizhu SU, Editor
Lei XU, Editor
Baoqi YAN, Editor
Yunyong ZHANG, Editor
ITU-T A.5 justification(s):
Generate A.5 drat TD
-
[Submit new A.5 justification ]
See guidelines for creating & submitting ITU-T A.5 justifications
First registration in the WP: 2025-12-11 10:38:42
Last update: 2025-12-11 18:17:15