{"id":707,"date":"2024-11-01T12:00:52","date_gmt":"2024-11-01T16:00:52","guid":{"rendered":"https:\/\/carleton.ca\/ngn\/?p=707"},"modified":"2024-11-19T18:01:36","modified_gmt":"2024-11-19T23:01:36","slug":"securing-5g-using-slice-isolation","status":"publish","type":"post","link":"https:\/\/carleton.ca\/ngn\/2024\/securing-5g-using-slice-isolation\/","title":{"rendered":"Securing 5G Using Slice Isolation"},"content":{"rendered":"<p><span class=\"TextRun SCXW214852845 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW214852845 BCX8\">We study t<\/span><span class=\"NormalTextRun SCXW214852845 BCX8\">he security of 5G mobile networks and securing 5G using slice isolation. <\/span><span class=\"NormalTextRun SCXW214852845 BCX8\">Following <\/span><span class=\"NormalTextRun SCXW214852845 BCX8\">are <\/span><span class=\"NormalTextRun SCXW214852845 BCX8\">our recent projects on 5G <\/span><span class=\"NormalTextRun SCXW214852845 BCX8\">security:<\/span><span class=\"NormalTextRun SCXW214852845 BCX8\">\u00a0<\/span><\/span><\/p>\n<h2 aria-level=\"2\"><span data-contrast=\"none\">Security Analysis of Critical 5G Interfaces<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">In this work, we investigate the interfaces-specific security recommendations presented by most active Standardization Development Organizations (SDOs), analyze the potential security gaps, characterize threats caused by such gaps, and categorize those threats according to the Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privilege (STRIDE) model. To the best of our knowledge, our work is the first to conduct a 5G security analysis from the perspective of network architecture.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-709\" src=\"https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/5G_Arcitecture-1-scaled.jpg\" alt=\"\" width=\"2560\" height=\"920\" srcset=\"https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/5G_Arcitecture-1-scaled.jpg 2560w, https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/5G_Arcitecture-1-240x86.jpg 240w, https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/5G_Arcitecture-1-400x144.jpg 400w, https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/5G_Arcitecture-1-160x57.jpg 160w, https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/5G_Arcitecture-1-768x276.jpg 768w, https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/5G_Arcitecture-1-1536x552.jpg 1536w, https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/5G_Arcitecture-1-2048x736.jpg 2048w, https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/5G_Arcitecture-1-360x129.jpg 360w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/p>\n<p><span data-contrast=\"auto\">[1] Mahyoub, M., AbdulGhaffar, A., Alalade, E., Ndubisi, E. and Matrawy, A., 2024.<\/span> <a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/10472310\"><b><span data-contrast=\"none\">Security Analysis of Critical 5G Interfaces<\/span><\/b><\/a><span data-contrast=\"auto\">. <\/span><i><span data-contrast=\"auto\">IEEE Communications Surveys &amp; Tutorials.<\/span><\/i><\/p>\n<h2>A STRIDE Threat Model for 5G Core Slicing<\/h2>\n<div class=\"columns\"><div class=\"columns__two\"><p>In this research, we use the STRIDE threat modeling methodology to analyze risks associated with 5G slicing. We focus solely on the advent of network slicing, which is the ability to allocate a virtual \u201cslice\u201d of the network to a client and optimize the features of the slice to the specific needs of the client without impacting other slices. Our threat model is exclusively concerned with identifying threats to 5G slicing and supporting network infrastructure. Threats from previous cellular generations are also included if they are specifically a threat to 5G slicing.<\/p><\/div>\n<div class=\"columns__two\"><img decoding=\"async\" loading=\"lazy\" class=\"size-full wp-image-711 alignright\" src=\"https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/A_STRIDE_Threat_Model_for_5G_Core_Slicing.jpg\" alt=\"\" width=\"2055\" height=\"2335\" srcset=\"https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/A_STRIDE_Threat_Model_for_5G_Core_Slicing.jpg 2055w, https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/A_STRIDE_Threat_Model_for_5G_Core_Slicing-240x273.jpg 240w, https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/A_STRIDE_Threat_Model_for_5G_Core_Slicing-400x455.jpg 400w, https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/A_STRIDE_Threat_Model_for_5G_Core_Slicing-160x182.jpg 160w, https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/A_STRIDE_Threat_Model_for_5G_Core_Slicing-768x873.jpg 768w, https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/A_STRIDE_Threat_Model_for_5G_Core_Slicing-1352x1536.jpg 1352w, https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/A_STRIDE_Threat_Model_for_5G_Core_Slicing-1802x2048.jpg 1802w, https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/A_STRIDE_Threat_Model_for_5G_Core_Slicing-360x409.jpg 360w\" sizes=\"(max-width: 2055px) 100vw, 2055px\" \/><br \/><\/div><\/div>\n<p>[2] Sattar, D., Vasoukolaei, A.H., Crysdale, P. and Matrawy, A., 2021, October. <a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/9604939\/\"><strong>A Stride Threat Model for 5G Core Slicing<\/strong><\/a>. In <em>2021 IEEE 4th 5G World Forum (5GWF)<\/em> (pp. 247-252). IEEE.<\/p>\n<h2>A Security-aware Network Function Sharing Model for 5G Slicing<\/h2>\n<p>Sharing Virtualized Network Functions (VNFs) among different slices in the 5G is a potential strategy to simplify the system implementation and utilize 5G resources efficiently. In this research, we propose a security-aware VNF-sharing model for 5G networks. The proposed optimization model satisfies the service requirements of various slices, enhances slice security by isolating their critical VNFs, and enhances resource utilization of the underlying physical infrastructure. The model tries to systematically decide on sharing a particular VNF based on the novel security constraints that we propose in this work; the maximum traffic allowed to be processed by the VNF and the exposure of the VNF to procedures sourced via untrusted users or access networks. This sharing problem is formalized to allow for procedure-level modeling that satisfies the requirements of slice requests in 5G systems. The model is tested using standard VNFs and procedures of the 5G system rather than generic ones. The numerical results of the model show the benefits and costs of applying the security constraints along with the network performance in terms of different metrics.<\/p>\n<p>[3] Mahyoub, M., AbdulGhaffar, A., Alalade, E. and Matrawy, A., 2023. <a href=\"https:\/\/arxiv.org\/abs\/2303.03492\"><strong>A Security-aware Network Function Sharing Model for 5G Slicing<\/strong><\/a>. <em>arXiv preprint arXiv:2303.03492.<\/em><\/p>\n<h2>On the Impact of Flooding Attacks on 5G Slicing with Different VNF Sharing Configurations<\/h2>\n<p>The key motivation for this work is to study the impact of flooding attacks on the performance of 5G slices with different VNF sharing configurations. We consider two VNF sharing configurations, in the first configuration, the Session Management Function (SMF) and User Plane Function (UPF) are shared among the deployed slices, while the SMF and UPF of the slices are isolated in the second configuration. The performance of these configurations is evaluated using different traffic types under two flooding attack scenarios; a ping flood attack targeting the data plane of the 5G network, and a registration request flood attack directed at the control plane of the 5G network. Our results showed different responses in the control and data planes. In the data plane, isolating VNFs of the slices provides better performance and mitigates the adverse effects of the attacks studied.<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-720\" src=\"https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/configs.jpg\" alt=\"\" width=\"1687\" height=\"783\" srcset=\"https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/configs.jpg 1687w, https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/configs-240x111.jpg 240w, https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/configs-400x186.jpg 400w, https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/configs-160x74.jpg 160w, https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/configs-768x356.jpg 768w, https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/configs-1536x713.jpg 1536w, https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/configs-360x167.jpg 360w\" sizes=\"(max-width: 1687px) 100vw, 1687px\" \/><\/p>\n<p>[4] AbdulGhaffar, A., Mahyoub, M. and Matrawy, A., 2024, May. <a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/10539153\"><strong>On the Impact of Flooding Attacks on 5G Slicing with Different VNF Sharing Configurations<\/strong><\/a>. In <em>2024 20th International Conference on the Design of Reliable Communication Networks (DRCN)<\/em> (pp. 136-142). IEEE.<\/p>\n<h2>A Study of XR Traffic Characteristics Under Flooding Attacks on 5G Slicing<\/h2>\n<p>In this research, we examine the characteristics of Extended Reality (XR) traffic across several 5G slicing configurations in the presence of attacks, including ping flood, User Datagram Protocol (UDP) flood, and registration flood attacks. The primary contribution of our research is the analysis of the impact of these different attacks on the XR traffic using different slice configurations. The results indicate the effects of the different attacks on XR traffic in terms of reducing the traffic throughput (Mbps) and the changes in the XR traffic characteristics in the different slice configurations. Also, the isolation of the Virtual Network Functions (VNFs) in the user plane provides better performance in the presence of these attacks.<\/p>\n<p>[5] Husseinat, A.A., AbdulGhaffar, A. and Matrawy, A., 2024. <a href=\"https:\/\/www.techrxiv.org\/users\/692863\/articles\/1237221-a-study-of-xr-traffic-characteristics-under-flooding-attacks-on-5g-slicing\"><strong>A Study of XR Traffic Characteristics Under Flooding Attacks on 5G Slicing<\/strong><\/a>. <em>Authorea Preprints<\/em>.<\/p>\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>We study the security of 5G mobile networks and securing 5G using slice isolation. Following are our recent projects on 5G security:\u00a0 Security Analysis of Critical 5G Interfaces\u00a0 In this work, we investigate the interfaces-specific security recommendations presented by most active Standardization Development Organizations (SDOs), analyze the potential security gaps, characterize threats caused by such [&hellip;]<\/p>\n","protected":false},"author":9,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","_mi_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[23],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Securing 5G Using Slice Isolation - Next Generation Networks Lab<\/title>\n<meta name=\"description\" content=\"We study the security of 5G mobile networks and securing 5G using slice isolation. Following are our recent projects on 5G security:\u00a0 Security Analysis of\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/carleton.ca\/ngn\/2024\/securing-5g-using-slice-isolation\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ABDULAZIZABDULGHAFF\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/carleton.ca\/ngn\/2024\/securing-5g-using-slice-isolation\/\",\"url\":\"https:\/\/carleton.ca\/ngn\/2024\/securing-5g-using-slice-isolation\/\",\"name\":\"Securing 5G Using Slice Isolation - Next Generation Networks Lab\",\"isPartOf\":{\"@id\":\"https:\/\/carleton.ca\/ngn\/#website\"},\"datePublished\":\"2024-11-01T16:00:52+00:00\",\"dateModified\":\"2024-11-19T23:01:36+00:00\",\"author\":{\"@id\":\"https:\/\/carleton.ca\/ngn\/#\/schema\/person\/e70b895f599c6ffb46c18b917b7239a3\"},\"description\":\"We study the security of 5G mobile networks and securing 5G using slice isolation. Following are our recent projects on 5G security:\u00a0 Security Analysis of\",\"breadcrumb\":{\"@id\":\"https:\/\/carleton.ca\/ngn\/2024\/securing-5g-using-slice-isolation\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/carleton.ca\/ngn\/2024\/securing-5g-using-slice-isolation\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/carleton.ca\/ngn\/2024\/securing-5g-using-slice-isolation\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/carleton.ca\/ngn\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Projects\",\"item\":\"https:\/\/carleton.ca\/ngn\/category\/projects\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Securing 5G Using Slice Isolation\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/carleton.ca\/ngn\/#website\",\"url\":\"https:\/\/carleton.ca\/ngn\/\",\"name\":\"Next Generation Networks Lab\",\"description\":\"Carleton University\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/carleton.ca\/ngn\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/carleton.ca\/ngn\/#\/schema\/person\/e70b895f599c6ffb46c18b917b7239a3\",\"name\":\"ABDULAZIZABDULGHAFF\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/carleton.ca\/ngn\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/51b9d66a11e7b2995a4f394ac9518b1e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/51b9d66a11e7b2995a4f394ac9518b1e?s=96&d=mm&r=g\",\"caption\":\"ABDULAZIZABDULGHAFF\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Securing 5G Using Slice Isolation - Next Generation Networks Lab","description":"We study the security of 5G mobile networks and securing 5G using slice isolation. Following are our recent projects on 5G security:\u00a0 Security Analysis of","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/carleton.ca\/ngn\/2024\/securing-5g-using-slice-isolation\/","twitter_misc":{"Written by":"ABDULAZIZABDULGHAFF","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/carleton.ca\/ngn\/2024\/securing-5g-using-slice-isolation\/","url":"https:\/\/carleton.ca\/ngn\/2024\/securing-5g-using-slice-isolation\/","name":"Securing 5G Using Slice Isolation - Next Generation Networks Lab","isPartOf":{"@id":"https:\/\/carleton.ca\/ngn\/#website"},"datePublished":"2024-11-01T16:00:52+00:00","dateModified":"2024-11-19T23:01:36+00:00","author":{"@id":"https:\/\/carleton.ca\/ngn\/#\/schema\/person\/e70b895f599c6ffb46c18b917b7239a3"},"description":"We study the security of 5G mobile networks and securing 5G using slice isolation. Following are our recent projects on 5G security:\u00a0 Security Analysis of","breadcrumb":{"@id":"https:\/\/carleton.ca\/ngn\/2024\/securing-5g-using-slice-isolation\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/carleton.ca\/ngn\/2024\/securing-5g-using-slice-isolation\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/carleton.ca\/ngn\/2024\/securing-5g-using-slice-isolation\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/carleton.ca\/ngn\/"},{"@type":"ListItem","position":2,"name":"Projects","item":"https:\/\/carleton.ca\/ngn\/category\/projects\/"},{"@type":"ListItem","position":3,"name":"Securing 5G Using Slice Isolation"}]},{"@type":"WebSite","@id":"https:\/\/carleton.ca\/ngn\/#website","url":"https:\/\/carleton.ca\/ngn\/","name":"Next Generation Networks Lab","description":"Carleton University","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/carleton.ca\/ngn\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/carleton.ca\/ngn\/#\/schema\/person\/e70b895f599c6ffb46c18b917b7239a3","name":"ABDULAZIZABDULGHAFF","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/carleton.ca\/ngn\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/51b9d66a11e7b2995a4f394ac9518b1e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/51b9d66a11e7b2995a4f394ac9518b1e?s=96&d=mm&r=g","caption":"ABDULAZIZABDULGHAFF"}}]}},"acf":{"Post Thumbnail Icon":"news-1","Post Thumbnail":{"ID":708,"id":708,"title":"5G_Arcitecture","filename":"5G_Arcitecture.jpg","filesize":66946,"url":"https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/5G_Arcitecture.jpg","link":"https:\/\/carleton.ca\/ngn\/2024\/securing-5g-using-slice-isolation\/5g_arcitecture\/","alt":"","author":"9","description":"","caption":"","name":"5g_arcitecture","status":"inherit","uploaded_to":707,"date":"2024-11-19 22:31:33","modified":"2024-11-19 22:31:33","menu_order":0,"mime_type":"image\/jpeg","type":"image","subtype":"jpeg","icon":"https:\/\/carleton.ca\/ngn\/wp\/wp-includes\/images\/media\/default.png","width":800,"height":287,"sizes":{"thumbnail":"https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/5G_Arcitecture-160x57.jpg","thumbnail-width":160,"thumbnail-height":57,"medium":"https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/5G_Arcitecture-240x86.jpg","medium-width":240,"medium-height":86,"medium_large":"https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/5G_Arcitecture-768x276.jpg","medium_large-width":768,"medium_large-height":276,"large":"https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/5G_Arcitecture-400x144.jpg","large-width":400,"large-height":144,"gallery-thumb":"https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/5G_Arcitecture-300x230.jpg","gallery-thumb-width":300,"gallery-thumb-height":230,"1536x1536":"https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/5G_Arcitecture.jpg","1536x1536-width":800,"1536x1536-height":287,"2048x2048":"https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/5G_Arcitecture.jpg","2048x2048-width":800,"2048x2048-height":287,"banner":"https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/5G_Arcitecture.jpg","banner-width":800,"banner-height":287,"people":"https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/5G_Arcitecture-200x200.jpg","people-width":200,"people-height":200,"post-thumb":"https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/5G_Arcitecture-300x230.jpg","post-thumb-width":300,"post-thumb-height":230,"rotator-image":"https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/5G_Arcitecture.jpg","rotator-image-width":800,"rotator-image-height":287,"video-thumb":"https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/5G_Arcitecture-360x129.jpg","video-thumb-width":360,"video-thumb-height":129}}},"_links":{"self":[{"href":"https:\/\/carleton.ca\/ngn\/wp-json\/wp\/v2\/posts\/707"}],"collection":[{"href":"https:\/\/carleton.ca\/ngn\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/carleton.ca\/ngn\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/carleton.ca\/ngn\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/carleton.ca\/ngn\/wp-json\/wp\/v2\/comments?post=707"}],"version-history":[{"count":3,"href":"https:\/\/carleton.ca\/ngn\/wp-json\/wp\/v2\/posts\/707\/revisions"}],"predecessor-version":[{"id":723,"href":"https:\/\/carleton.ca\/ngn\/wp-json\/wp\/v2\/posts\/707\/revisions\/723"}],"wp:attachment":[{"href":"https:\/\/carleton.ca\/ngn\/wp-json\/wp\/v2\/media?parent=707"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/carleton.ca\/ngn\/wp-json\/wp\/v2\/categories?post=707"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/carleton.ca\/ngn\/wp-json\/wp\/v2\/tags?post=707"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}