Adversarial Machine Learning Threat Analysis in Open Radio Access Networks

01/16/2022
by   Ron Bitton, et al.
5

The Open Radio Access Network (O-RAN) is a new, open, adaptive, and intelligent RAN architecture. Motivated by the success of artificial intelligence in other domains, O-RAN strives to leverage machine learning (ML) to automatically and efficiently manage network resources in diverse use cases such as traffic steering, quality of experience prediction, and anomaly detection. Unfortunately, ML-based systems are not free of vulnerabilities; specifically, they suffer from a special type of logical vulnerabilities that stem from the inherent limitations of the learning algorithms. To exploit these vulnerabilities, an adversary can utilize an attack technique referred to as adversarial machine learning (AML). These special type of attacks has already been demonstrated in recent researches. In this paper, we present a systematic AML threat analysis for the O-RAN. We start by reviewing relevant ML use cases and analyzing the different ML workflow deployment scenarios in O-RAN. Then, we define the threat model, identifying potential adversaries, enumerating their adversarial capabilities, and analyzing their main goals. Finally, we explore the various AML threats in the O-RAN and review a large number of attacks that can be performed to materialize these threats and demonstrate an AML attack on a traffic steering model.

READ FULL TEXT

page 1

page 2

page 3

page 5

page 7

page 10

research
06/30/2022

Threat Assessment in Machine Learning based Systems

Machine learning is a field of artificial intelligence (AI) that is beco...
research
08/05/2021

Using a Collated Cybersecurity Dataset for Machine Learning and Artificial Intelligence

Artificial Intelligence (AI) and Machine Learning (ML) algorithms can su...
research
12/20/2022

Learned Systems Security

A learned system uses machine learning (ML) internally to improve perfor...
research
11/05/2018

Security for Machine Learning-based Systems: Attacks and Challenges during Training and Inference

The exponential increase in dependencies between the cyber and physical ...
research
08/19/2021

5G System Security Analysis

Fifth generation mobile networks (5G) are currently being deployed by mo...
research
03/07/2020

ATHAFI: Agile Threat Hunting And Forensic Investigation

Attackers rapidly change their attacks to evade detection. Even the most...
research
10/21/2019

Crypto Mining Makes Noise

A new cybersecurity attack (cryptojacking) is emerging, in both the lite...

Please sign up or login with your details

Forgot password? Click here to reset