Skip to main content

Machine Learning Assisted Security Analysis of 5G-Network-Connected Systems

Author(s): Saha, Tanujay; Aaraj, Najwa; Jha, Niraj K

Download
To refer to this page use: http://arks.princeton.edu/ark:/88435/pr1gh9b88f
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSaha, Tanujay-
dc.contributor.authorAaraj, Najwa-
dc.contributor.authorJha, Niraj K-
dc.date.accessioned2023-12-24T15:18:15Z-
dc.date.available2023-12-24T15:18:15Z-
dc.date.issued2022-02-02en_US
dc.identifier.citationSaha, Tanujay, Aaraj, Najwa, Jha, Niraj K. (2022). Machine Learning Assisted Security Analysis of 5G-Network-Connected Systems. IEEE Transactions on Emerging Topics in Computing, 10 (4), 2006 - 2024. doi:10.1109/tetc.2022.3147192en_US
dc.identifier.urihttp://arks.princeton.edu/ark:/88435/pr1gh9b88f-
dc.description.abstractThe core network architecture of telecommunication systems has undergone a paradigm shift in the fifth-generation (5G) networks. 5G networks have transitioned to software-defined infrastructures, thereby reducing their dependence on hardware-based network functions. New technologies, like network function virtualization and software-defined networking, have been incorporated in the 5G core network (5GCN) architecture to enable this transition. This has resulted in significant improvements in efficiency, performance, and robustness of the networks. However, this has also made the core network more vulnerable, as software systems are generally easier to compromise than hardware systems. In this article, we present a comprehensive security analysis framework for the 5GCN. The novelty of this approach lies in the creation and analysis of attack graphs of the software-defined and virtualized 5GCN through machine learning. This analysis points to 119 novel possible exploits in the 5GCN. We demonstrate that these possible exploits of 5GCN vulnerabilities generate five novel attacks on the 5G Authentication and Key Agreement protocol. We combine the attacks at the network, protocol, and the application layers to generate complex attack vectors. In a case study, we use these attack vectors to find four novel security loopholes in WhatsApp running on a 5G network.en_US
dc.format.extent2006 - 2024en_US
dc.language.isoen_USen_US
dc.relation.ispartofIEEE Transactions on Emerging Topics in Computingen_US
dc.rightsAuthor's manuscripten_US
dc.titleMachine Learning Assisted Security Analysis of 5G-Network-Connected Systemsen_US
dc.typeJournal Articleen_US
dc.identifier.doidoi:10.1109/tetc.2022.3147192-
dc.identifier.eissn2168-6750-
pu.type.symplectichttp://www.symplectic.co.uk/publications/atom-terms/1.0/journal-articleen_US

Files in This Item:
File Description SizeFormat 
Machine_Learning_Assisted_Security_Analy.pdf1.49 MBAdobe PDFView/Download


Items in OAR@Princeton are protected by copyright, with all rights reserved, unless otherwise indicated.