Machine Learning Assisted Security Analysis of 5G-Network-Connected Systems

08/07/2021
by   Tanujay Saha, et al.
0

The core network architecture of telecommunication systems has undergone a paradigm shift in the fifth-generation (5G)networks. 5G networks have transitioned to software-defined infrastructures, thereby reducing their dependence on hardware-based network functions. New technologies, like network function virtualization and software-defined networking, have been incorporated in the 5G core network (5GCN) architecture to enable this transition. This has resulted in significant improvements in efficiency, performance, and robustness of the networks. However, this has also made the core network more vulnerable, as software systems are generally easier to compromise than hardware systems. In this article, we present a comprehensive security analysis framework for the 5GCN. The novelty of this approach lies in the creation and analysis of attack graphs of the software-defined and virtualized 5GCN through machine learning. This analysis points to 119 novel possible exploits in the 5GCN. We demonstrate that these possible exploits of 5GCN vulnerabilities generate five novel attacks on the 5G Authentication and Key Agreement protocol. We combine the attacks at the network, protocol, and the application layers to generate complex attack vectors. In a case study, we use these attack vectors to find four novel security loopholes in WhatsApp running on a 5G network.

READ FULL TEXT

page 3

page 4

page 17

research
05/25/2022

The security of the Coordicide: the implementation and analysis of possible attack vectors

The goal of the thesis is to study and perform an analysis of the possib...
research
01/07/2021

SHARKS: Smart Hacking Approaches for RisK Scanning in Internet-of-Things and Cyber-Physical Systems based on Machine Learning

Cyber-physical systems (CPS) and Internet-of-Things (IoT) devices are in...
research
06/19/2018

Trust Anchors in Software Defined Networks

Advances in software virtualization and network processing lead to incre...
research
05/17/2020

Attack-aware Security Function Chain Reordering

Attack-awareness recognizes self-awareness for security systems regardin...
research
03/07/2022

Towards Flexible Anonymous Networks

Anonymous Communication designs such as Tor build their security upon di...
research
12/10/2018

Crossfire Attack Detection using Deep Learning in Software Defined ITS Networks

Recent developments in intelligent transport systems (ITS) based on smar...
research
12/02/2021

A Grounded Theory Based Approach to Characterize Software Attack Surfaces

The notion of Attack Surface refers to the critical points on the bounda...

Please sign up or login with your details

Forgot password? Click here to reset