An AI-Enabled Framework to Defend Ingenious MDT-based Attacks on the
Emerging Zero Touch Cellular Networks
- URL: http://arxiv.org/abs/2308.02923v1
- Date: Sat, 5 Aug 2023 17:21:09 GMT
- Title: An AI-Enabled Framework to Defend Ingenious MDT-based Attacks on the
Emerging Zero Touch Cellular Networks
- Authors: Aneeqa Ijaz, Waseem Raza, Hasan Farooq, Marvin Manalastas, Ali Imran
- Abstract summary: Minimization of Drive Test (MDT) reports are used to generate inferences about network state and performance.
In this paper, we investigate an impactful, first of its kind adversarial attack that can be launched by exploiting the malicious MDT reports.
We propose a novel Malicious MDT Reports Identification framework (MRIF) as a countermeasure to detect and eliminate the malicious MDT reports.
- Score: 3.9068553220522415
- License: http://creativecommons.org/licenses/by-nc-nd/4.0/
- Abstract: Deep automation provided by self-organizing network (SON) features and their
emerging variants such as zero touch automation solutions is a key enabler for
increasingly dense wireless networks and pervasive Internet of Things (IoT). To
realize their objectives, most automation functionalities rely on the
Minimization of Drive Test (MDT) reports. The MDT reports are used to generate
inferences about network state and performance, thus dynamically change network
parameters accordingly. However, the collection of MDT reports from commodity
user devices, particularly low cost IoT devices, make them a vulnerable entry
point to launch an adversarial attack on emerging deeply automated wireless
networks. This adds a new dimension to the security threats in the IoT and
cellular networks. Existing literature on IoT, SON, or zero touch automation
does not address this important problem. In this paper, we investigate an
impactful, first of its kind adversarial attack that can be launched by
exploiting the malicious MDT reports from the compromised user equipment (UE).
We highlight the detrimental repercussions of this attack on the performance of
common network automation functions. We also propose a novel Malicious MDT
Reports Identification framework (MRIF) as a countermeasure to detect and
eliminate the malicious MDT reports using Machine Learning and verify it
through a use-case. Thus, the defense mechanism can provide the resilience and
robustness for zero touch automation SON engines against the adversarial MDT
attacks
Related papers
- MASKDROID: Robust Android Malware Detection with Masked Graph Representations [56.09270390096083]
We propose MASKDROID, a powerful detector with a strong discriminative ability to identify malware.
We introduce a masking mechanism into the Graph Neural Network based framework, forcing MASKDROID to recover the whole input graph.
This strategy enables the model to understand the malicious semantics and learn more stable representations, enhancing its robustness against adversarial attacks.
arXiv Detail & Related papers (2024-09-29T07:22:47Z) - FedMADE: Robust Federated Learning for Intrusion Detection in IoT Networks Using a Dynamic Aggregation Method [7.842334649864372]
Internet of Things (IoT) devices across multiple sectors has escalated serious network security concerns.
Traditional Machine Learning (ML)-based Intrusion Detection Systems (IDSs) for cyber-attack classification require data transmission from IoT devices to a centralized server for traffic analysis, raising severe privacy concerns.
We introduce FedMADE, a novel dynamic aggregation method, which clusters devices by their traffic patterns and aggregates local models based on their contributions towards overall performance.
arXiv Detail & Related papers (2024-08-13T18:42:34Z) - MTDSense: AI-Based Fingerprinting of Moving Target Defense Techniques in Software-Defined Networking [10.55674383602625]
Moving target defenses (MTD) are proactive security techniques that enhance network security by confusing the attacker and limiting their attack window.
We propose a novel approach named MTDSense, which can determine when the MTD has been triggered using the footprints the MTD operation leaves in the network traffic.
An attacker can use this information to maximize their attack window and tailor their attacks, which has been shown to significantly reduce the effectiveness of MTD.
arXiv Detail & Related papers (2024-08-07T13:26:00Z) - MediHunt: A Network Forensics Framework for Medical IoT Devices [5.120567378386615]
This paper focuses on the vulnerabilities present in the Message Queuing Telemetry and Transport (MQTT) protocol.
The memory-constrained MIoT devices enforce a limitation on storing all data logs that are required for comprehensive network.
This paper solves the data log availability challenge by detecting the attack in realtime and storing the corresponding logs for further analysis with the proposed network framework: MediHunt.
arXiv Detail & Related papers (2023-12-07T07:19:56Z) - Detecting Anomalous Microflows in IoT Volumetric Attacks via Dynamic
Monitoring of MUD Activity [1.294952045574009]
Anomaly-based detection methods are promising in finding new attacks.
There are certain practical challenges like false-positive alarms, hard to explain, and difficult to scale cost-effectively.
In this paper, we use SDN to enforce and monitor the expected behaviors of each IoT device.
arXiv Detail & Related papers (2023-04-11T05:17:51Z) - Is Semantic Communications Secure? A Tale of Multi-Domain Adversarial
Attacks [70.51799606279883]
We introduce test-time adversarial attacks on deep neural networks (DNNs) for semantic communications.
We show that it is possible to change the semantics of the transferred information even when the reconstruction loss remains low.
arXiv Detail & Related papers (2022-12-20T17:13:22Z) - Intrusion Detection in Internet of Things using Convolutional Neural
Networks [4.718295605140562]
We propose a novel solution to the intrusion attacks against IoT devices using CNNs.
The data is encoded as the convolutional operations to capture the patterns from the sensors data along time.
The experimental results show significant improvement in both true positive rate and false positive rate compared to the baseline using LSTM.
arXiv Detail & Related papers (2022-11-18T07:27:07Z) - Automating Privilege Escalation with Deep Reinforcement Learning [71.87228372303453]
In this work, we exemplify the potential threat of malicious actors using deep reinforcement learning to train automated agents.
We present an agent that uses a state-of-the-art reinforcement learning algorithm to perform local privilege escalation.
Our agent is usable for generating realistic attack sensor data for training and evaluating intrusion detection systems.
arXiv Detail & Related papers (2021-10-04T12:20:46Z) - TANTRA: Timing-Based Adversarial Network Traffic Reshaping Attack [46.79557381882643]
We present TANTRA, a novel end-to-end Timing-based Adversarial Network Traffic Reshaping Attack.
Our evasion attack utilizes a long short-term memory (LSTM) deep neural network (DNN) which is trained to learn the time differences between the target network's benign packets.
TANTRA achieves an average success rate of 99.99% in network intrusion detection system evasion.
arXiv Detail & Related papers (2021-03-10T19:03:38Z) - Adversarial Attacks on Deep Learning Based Power Allocation in a Massive
MIMO Network [62.77129284830945]
We show that adversarial attacks can break DL-based power allocation in the downlink of a massive multiple-input-multiple-output (maMIMO) network.
We benchmark the performance of these attacks and show that with a small perturbation in the input of the neural network (NN), the white-box attacks can result in infeasible solutions up to 86%.
arXiv Detail & Related papers (2021-01-28T16:18:19Z) - IoT Device Identification Using Deep Learning [43.0717346071013]
The growing use of IoT devices in organizations has increased the number of attack vectors available to attackers.
The widely adopted bring your own device (BYOD) policy which allows an employee to bring any IoT device into the workplace and attach it to an organization's network also increases the risk of attacks.
In this study, we applied deep learning on network traffic to automatically identify IoT devices connected to the network.
arXiv Detail & Related papers (2020-02-25T12:24:49Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.