Machine Learning Assisted Security Analysis of 5G-Network-Connected
Systems
- URL: http://arxiv.org/abs/2108.03514v1
- Date: Sat, 7 Aug 2021 20:07:08 GMT
- Title: Machine Learning Assisted Security Analysis of 5G-Network-Connected
Systems
- Authors: Tanujay Saha, Najwa Aaraj, Niraj K. Jha
- Abstract summary: 5G networks have transitioned to software-defined infrastructures.
New technologies, like network function virtualization and software-defined networking, have been incorporated in the 5G core network (5GCN) architecture to enable this transition.
This article presents a comprehensive security analysis framework for the 5GCN.
- Score: 5.918387680589584
- License: http://creativecommons.org/licenses/by-nc-nd/4.0/
- Abstract: The core network architecture of telecommunication systems has undergone a
paradigm shift in the fifth-generation (5G)networks. 5G networks have
transitioned to software-defined infrastructures, thereby reducing their
dependence on hardware-based network functions. New technologies, like network
function virtualization and software-defined networking, have been incorporated
in the 5G core network (5GCN) architecture to enable this transition. This has
resulted in significant improvements in efficiency, performance, and robustness
of the networks. However, this has also made the core network more vulnerable,
as software systems are generally easier to compromise than hardware systems.
In this article, we present a comprehensive security analysis framework for the
5GCN. The novelty of this approach lies in the creation and analysis of attack
graphs of the software-defined and virtualized 5GCN through machine learning.
This analysis points to 119 novel possible exploits in the 5GCN. We demonstrate
that these possible exploits of 5GCN vulnerabilities generate five novel
attacks on the 5G Authentication and Key Agreement protocol. We combine the
attacks at the network, protocol, and the application layers to generate
complex attack vectors. In a case study, we use these attack vectors to find
four novel security loopholes in WhatsApp running on a 5G network.
Related papers
- Advanced Penetration Testing for Enhancing 5G Security [0.0]
This paper reviews penetration testing approaches for identifying security vulnerabilities in 5G networks.
It examines ways adversaries exploit vulnerabilities in 5G networks, covering tactics and strategies targeted at 5G features.
Our research indicates that 5G penetration testing should use a multithreaded approach for addressing current security challenges.
arXiv Detail & Related papers (2024-07-24T13:35:35Z) - Autonomous Adaptive Security Framework for 5G-Enabled IoT [0.8738214980779235]
5G can provide more rapid connection speeds, lower latency, faster downloads, and capability to connect more devices.
5G-enabled IoT networks increase systems vulnerabilities to security threats due to these dynamics.
This task specifies new adaptive strategies of security intelligence with associated scenarios to meet the challenges of 5G-IoT characteristics.
arXiv Detail & Related papers (2024-06-04T13:17:04Z) - Establishing Trust in the Beyond-5G Core Network using Trusted Execution Environments [4.235733335401408]
We review the security implications introduced in B5G networks, and the security mechanisms that are supported by the 5G standard.
We propose a vertical extension of Zero Trust, namely, Zero Trust Execution, to model untrusted execution environments.
We provide an analysis on how to establish trust in Beyond-5G network architectures using Trusted Execution Environments.
arXiv Detail & Related papers (2024-05-20T17:02:18Z) - Penetration Testing of 5G Core Network Web Technologies [53.89039878885825]
We present the first security assessment of the 5G core from a web security perspective.
We use the STRIDE threat modeling approach to define a complete list of possible threat vectors and associated attacks.
Our analysis shows that all these cores are vulnerable to at least two of our identified attack vectors.
arXiv Detail & Related papers (2024-03-04T09:27:11Z) - Dynamics-aware Adversarial Attack of Adaptive Neural Networks [75.50214601278455]
We investigate the dynamics-aware adversarial attack problem of adaptive neural networks.
We propose a Leaded Gradient Method (LGM) and show the significant effects of the lagged gradient.
Our LGM achieves impressive adversarial attack performance compared with the dynamic-unaware attack methods.
arXiv Detail & Related papers (2022-10-15T01:32:08Z) - Towards Supporting Intelligence in 5G/6G Core Networks: NWDAF
Implementation and Initial Analysis [3.5573601621032935]
The work presented in this paper incorporates a functional NWDAF into a 5G network developed using open source software.
The expected limitations of 5G networks are discussed as motivation for the development of 6G networks.
arXiv Detail & Related papers (2022-05-30T14:15:46Z) - Dynamics-aware Adversarial Attack of 3D Sparse Convolution Network [75.1236305913734]
We investigate the dynamics-aware adversarial attack problem in deep neural networks.
Most existing adversarial attack algorithms are designed under a basic assumption -- the network architecture is fixed throughout the attack process.
We propose a Leaded Gradient Method (LGM) and show the significant effects of the lagged gradient.
arXiv Detail & Related papers (2021-12-17T10:53:35Z) - Dynamic Slimmable Network [105.74546828182834]
We develop a dynamic network slimming regime named Dynamic Slimmable Network (DS-Net)
Our DS-Net is empowered with the ability of dynamic inference by the proposed double-headed dynamic gate.
It consistently outperforms its static counterparts as well as state-of-the-art static and dynamic model compression methods.
arXiv Detail & Related papers (2021-03-24T15:25:20Z) - To Talk or to Work: Energy Efficient Federated Learning over Mobile
Devices via the Weight Quantization and 5G Transmission Co-Design [49.95746344960136]
Federated learning (FL) is a new paradigm for large-scale learning tasks across mobile devices.
It is not clear how to establish an effective wireless network architecture to support FL over mobile devices.
We develop a wireless transmission and weight quantization co-design for energy efficient FL over heterogeneous 5G mobile devices.
arXiv Detail & Related papers (2020-12-21T01:13:44Z) - Towards Self-learning Edge Intelligence in 6G [143.1821636135413]
Edge intelligence, also called edge-native artificial intelligence (AI), is an emerging technological framework focusing on seamless integration of AI, communication networks, and mobile edge computing.
In this article, we identify the key requirements and challenges of edge-native AI in 6G.
arXiv Detail & Related papers (2020-10-01T02:16:40Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.