RRC Signaling Storm Detection in O-RAN
- URL: http://arxiv.org/abs/2504.15738v1
- Date: Tue, 22 Apr 2025 09:32:11 GMT
- Title: RRC Signaling Storm Detection in O-RAN
- Authors: Dang Kien Nguyen, Rim El Malki, Filippo Rebecchi,
- Abstract summary: Signaling storms caused by abuse of the Radio Resource Control protocol are a critical threat to 5G availability.<n>We develop a threshold-based detection technique that relies on RRC layer features to distinguish between malicious activity and legitimate high network load conditions.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: The Open Radio Access Network (O-RAN) marks a significant shift in the mobile network industry. By transforming a traditionally vertically integrated architecture into an open, data-driven one, O-RAN promises to enhance operational flexibility and drive innovation. In this paper, we harness O-RAN's openness to address one critical threat to 5G availability: signaling storms caused by abuse of the Radio Resource Control (RRC) protocol. Such attacks occur when a flood of RRC messages from one or multiple User Equipments (UEs) deplete resources at a 5G base station (gNB), leading to service degradation. We provide a reference implementation of an RRC signaling storm attack, using the OpenAirInterface (OAI) platform to evaluate its impact on a gNB. We supplement the experimental results with a theoretical model to extend the findings for different load conditions. To mitigate RRC signaling storms, we develop a threshold-based detection technique that relies on RRC layer features to distinguish between malicious activity and legitimate high network load conditions. Leveraging O-RAN capabilities, our detection method is deployed as an external Application (xApp). Performance evaluation shows attacks can be detected within 90ms, providing a mitigation window of 60ms before gNB unavailability, with an overhead of 1.2% and 0% CPU and memory consumption, respectively.
Related papers
- Anti-Tamper Radio meets Reconfigurable Intelligent Surface for System-Level Tamper Detection [5.158378873123946]
We propose and experimentally evaluate an ATR system complemented by an RIS to dynamically reconfigure the wireless propagation environment.<n>We show that this approach can enhance resistance against signal manipulation attacks, reduce bandwidth requirements from severalGHz down to as low as 20 MHz, and improve robustness to environmental disturbances such as internal fan movements.
arXiv Detail & Related papers (2025-03-18T14:18:31Z) - Rydberg Atomic Quantum Receivers for Classical Wireless Communications and Sensing: Their Models and Performance [78.76421728334013]
Rydberg atomic quantum receivers (RAQRs) are an eminent solution for detecting the electric field of radio frequency (RF) signals.<n>We introduce the superheterodyne version of RAQRs to the wireless community by presenting an end-to-end reception scheme.<n>We then develop a corresponding equivalent baseband signal model relying on a realistic reception flow.
arXiv Detail & Related papers (2024-12-07T06:25:54Z) - Enhanced Real-Time Threat Detection in 5G Networks: A Self-Attention RNN Autoencoder Approach for Spectral Intrusion Analysis [8.805162150763847]
This paper presents an enhanced experimental model that integrates a self-attention mechanism with a Recurrent Neural Network (RNN)-based autoencoder.
Our approach is grounded in time-series analysis, processes in-phase and quadrature (I/Q) samples to identify irregularities that could indicate potential jamming attacks.
The model's architecture, augmented with a self-attention layer, extends the capabilities of RNN autoencoders.
arXiv Detail & Related papers (2024-11-05T07:01:15Z) - Lazy Layers to Make Fine-Tuned Diffusion Models More Traceable [70.77600345240867]
A novel arbitrary-in-arbitrary-out (AIAO) strategy makes watermarks resilient to fine-tuning-based removal.
Unlike the existing methods of designing a backdoor for the input/output space of diffusion models, in our method, we propose to embed the backdoor into the feature space of sampled subpaths.
Our empirical studies on the MS-COCO, AFHQ, LSUN, CUB-200, and DreamBooth datasets confirm the robustness of AIAO.
arXiv Detail & Related papers (2024-05-01T12:03:39Z) - Fast and Accurate Cooperative Radio Map Estimation Enabled by GAN [63.90647197249949]
In the 6G era, real-time radio resource monitoring and management are urged to support diverse wireless-empowered applications.
In this paper, we present a cooperative radio map estimation approach enabled by the generative adversarial network (GAN)
arXiv Detail & Related papers (2024-02-05T05:01:28Z) - Unlocking Metasurface Practicality for B5G Networks: AI-assisted RIS
Planning [33.98674736140333]
We present a first-of-its-kind deep reinforcement learning (DRL) solution, dubbed as DRISA, which trains a DRL agent and, in turn, obtains san optimal RIS deployment.
Our benchmarks showcase better coverage, i.e., 10-dB increase in minimum signal-to-noise ratio (SNR) at lower computational time (up to -25 percent) while improving scalability towards denser network deployments.
arXiv Detail & Related papers (2023-10-16T12:14:42Z) - Sparsity-Aware Intelligent Massive Random Access Control in Open RAN: A
Reinforcement Learning Based Approach [61.74489383629319]
Massive random access of devices in the emerging Open Radio Access Network (O-RAN) brings great challenge to the access control and management.
reinforcement-learning (RL)-assisted scheme of closed-loop access control is proposed to preserve sparsity of access requests.
Deep-RL-assisted SAUD is proposed to resolve highly complex environments with continuous and high-dimensional state and action spaces.
arXiv Detail & Related papers (2023-03-05T12:25:49Z) - Artificial Intelligence Empowered Multiple Access for Ultra Reliable and
Low Latency THz Wireless Networks [76.89730672544216]
Terahertz (THz) wireless networks are expected to catalyze the beyond fifth generation (B5G) era.
To satisfy the ultra-reliability and low-latency demands of several B5G applications, novel mobility management approaches are required.
This article presents a holistic MAC layer approach that enables intelligent user association and resource allocation, as well as flexible and adaptive mobility management.
arXiv Detail & Related papers (2022-08-17T03:00:24Z) - A Convolutional Attention Based Deep Network Solution for UAV Network
Attack Recognition over Fading Channels and Interference [3.1230069539161405]
This research offers a deep learning (DL) approach for detecting attacks in UAVs equipped with multiplexing (OFDM) receivers on Clustered Delay Line (CDL) channels.
The prospective algorithm is generalizable regarding attack identification, which does not occur during training.
A deeper investigation into the timing requirements for recognizing attacks show that after training, the minimum time necessary after the attack begins is 100 ms.
arXiv Detail & Related papers (2022-07-16T22:08:12Z) - On Topology Optimization and Routing in Integrated Access and Backhaul
Networks: A Genetic Algorithm-based Approach [70.85399600288737]
We study the problem of topology optimization and routing in IAB networks.
We develop efficient genetic algorithm-based schemes for both IAB node placement and non-IAB backhaul link distribution.
We discuss the main challenges for enabling mesh-based IAB networks.
arXiv Detail & Related papers (2021-02-14T21:52:05Z) - Multi-stage Jamming Attacks Detection using Deep Learning Combined with
Kernelized Support Vector Machine in 5G Cloud Radio Access Networks [17.2528983535773]
This research focuses on deploying a multi-stage machine learning-based intrusion detection (ML-IDS) in 5G C-RAN.
It can detect and classify four types of jamming attacks: constant jamming, random jamming, jamming, and reactive jamming.
The final classification accuracy of attacks is 94.51% with a 7.84% false negative rate.
arXiv Detail & Related papers (2020-04-13T17:21:45Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.