A Runtime Anomaly Detector via Service Communication Proxy for 5G Mobile Networks

Yin Chi Li, Ping Tsan Liu, Yi An Tai, Che Hung Liu, Man Hsin Chen, Chi Yu Li, Guan Hua Tu

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

With the growing popularity of the 5G mobile network, its security is becoming important. Although the newly introduced 5G security mechanisms have addressed many legacy security issues, there may be still vulnerabilities in the 5G network due to newly deployed components and used technologies. To detect security threats, we develop a runtime anomaly detector (RAD) platform, designated as 5G-RAD, to cooperate with the operational 5G core network via the service communication proxy (SCP). It validates the core network operation in terms of state machine and message content by analyzing control-plane messages. We demonstrate its effectiveness by building a 5G mobile network architecture with SCP based on the open-source free5GC and UERANSIM. The 5G-RAD is tested with three attacks, including DoS, authentication bypass, and invalid message injection; it can successfully detect them at run time.

Original languageEnglish
Title of host publicationIEEE INFOCOM 2023 - Conference on Computer Communications Workshops, INFOCOM WKSHPS 2023
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781665494274
DOIs
StatePublished - 2023
Event2023 IEEE INFOCOM Conference on Computer Communications Workshops, INFOCOM WKSHPS 2023 - Hoboken, United States
Duration: 20 May 2023 → …

Publication series

NameIEEE INFOCOM 2023 - Conference on Computer Communications Workshops, INFOCOM WKSHPS 2023

Conference

Conference2023 IEEE INFOCOM Conference on Computer Communications Workshops, INFOCOM WKSHPS 2023
Country/TerritoryUnited States
CityHoboken
Period20/05/23 → …

Keywords

  • 5G
  • anomaly detection
  • mobile network
  • security

Fingerprint

Dive into the research topics of 'A Runtime Anomaly Detector via Service Communication Proxy for 5G Mobile Networks'. Together they form a unique fingerprint.

Cite this