skip to main content
10.1145/3465481.3470079acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaresConference Proceedingsconference-collections
research-article

5Greplay: a 5G Network Traffic Fuzzer - Application to Attack Injection

Published:17 August 2021Publication History

ABSTRACT

The fifth generation of mobile broadband is more than just an evolution to provide more mobile bandwidth, massive machine-type communications, and ultra-reliable and low-latency communications. It relies on a complex, dynamic and heterogeneous environment that implies addressing numerous testing and security challenges. In this paper we present 5Greplay, an open-source 5G network traffic fuzzer that enables the evaluation of 5G components by replaying and modifying 5G network traffic by creating and injecting network scenarios into a target that can be a 5G core service (e.g., AMF, SMF) or a RAN network (e.g., gNodeB). The tool provides the ability to alter network packets online or offline in both control and data planes in a very flexible manner. The experimental evaluation conducted against open-source based 5G platforms, showed that the target services accept traffic being altered by the tool, and that it can reach up to 9.56 Gbps using only 1 processor core to replay 5G traffic.

References

  1. The 3rd Generation Partnership Project (3GPP). 2020. 3GPP TS 33.117 – Catalogue of general security assurance requirements. https://itectec.com/archive/3gpp-specification-ts-33-117/Google ScholarGoogle Scholar
  2. The 3rd Generation Partnership Project (3GPP). 2021. 3GPP TS 33.512 – 5G Security Assurance Specification (SCAS); Access and Mobility management Function (AMF). https://itectec.com/archive/3gpp-specification-ts-33-512/Google ScholarGoogle Scholar
  3. Ijaz Ahmad, Tanesh Kumar, Madhusanka Liyanage, Jude Okwuibe, Mika Ylianttila, and Andrei Gurtov. 2018. Overview of 5G Security Challenges and Solutions. IEEE Communications Standards Magazine 2, 1 (2018), 36–43. https://doi.org/10.1109/MCOMSTD.2018.1700063Google ScholarGoogle ScholarCross RefCross Ref
  4. David Basin, Jannik Dreier, Lucca Hirschi, Saša Radomirovic, Ralf Sasse, and Vincent Stettler. 2018. A Formal Analysis of 5G Authentication. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (Toronto, Canada) (CCS ’18). Association for Computing Machinery, New York, NY, USA, 1383–1396. https://doi.org/10.1145/3243734.3243846Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. ENISA. 2021. ENISA threat landscape for 5G Networks. https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-5g-networksGoogle ScholarGoogle Scholar
  6. Ericsson. 2018. A guide to 5G network security. Conceptualizing security in mobile communication networks – how does 5G fit in?https://www.ericsson.com/en/security/a-guide-to-5g-network-securityGoogle ScholarGoogle Scholar
  7. ETSI. 2017. ETSI GS NFV-SEC 013. https://www.etsi.org/deliver/etsi_gs/NFV-SEC/001_099/013/03.01.01_60/gs_NFV-SEC013v030101p.pdfGoogle ScholarGoogle Scholar
  8. ETSI. 2018. ETSI TS 138 412. https://www.etsi.org/deliver/etsi_ts/138400_138499/138412/15.00.00_60/ts_138412v150000p.pdfGoogle ScholarGoogle Scholar
  9. ETSI. 2020. ETSI TS 133 512. https://www.etsi.org/deliver/etsi_ts/133500_133599/133512/16.03.00_60/ts_133512v160300p.pdfGoogle ScholarGoogle Scholar
  10. Marco Antonio Sotelo Monge, Andrés Herranz González, Borja Lorenzo Fernández, Diego Maestre Vidal, Guillermo Rius García, and Jorge Maestre Vidal. 2019. Traffic-flow analysis for source-side DDoS recognition on 5G environments. Journal of Network and Computer Applications 136 (2019), 114–131. https://doi.org/10.1016/j.jnca.2019.02.030Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Hajar Moudoud, Lyes Khoukhi, and Soumaya Cherkaoui. 2021. Prediction and Detection of FDIA and DDoS Attacks in 5G Enabled IoT. IEEE Network 35, 2 (2021), 194–201. https://doi.org/10.1109/mnet.011.2000449Google ScholarGoogle ScholarCross RefCross Ref
  12. Markus Ring, Daniel Schlör, Dieter Landes, and Andreas Hotho. 2019. Flow-based network traffic generation using Generative Adversarial Networks. Computers & Security 82(2019), 156–172. https://doi.org/10.1016/j.cose.2018.12.012Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Positive Technologies. 2021. 5g Standalone Core Security Research. https://positive-tech.com/storage/articles/5g-sa-core-security-research/5g-sa-core-security-research.pdfGoogle ScholarGoogle Scholar
  14. Silvio Valenti, Dario Rossi, Alberto Dainotti, Antonio Pescapè, Alessandro Finamore, and Marco Mellia. 2013. Reviewing Traffic Classification. Springer Berlin Heidelberg, Berlin, Heidelberg, 123–147. https://doi.org/10.1007/978-3-642-36784-7_6Google ScholarGoogle Scholar
  15. W.Eric Wong and Aditya P. Mathur. 1995. Reducing the cost of mutation testing: An empirical study. Journal of Systems and Software 31, 3 (1995), 185–196. https://doi.org/10.1016/0164-1212(94)00098-0Google ScholarGoogle ScholarDigital LibraryDigital Library

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    ARES '21: Proceedings of the 16th International Conference on Availability, Reliability and Security
    August 2021
    1447 pages
    ISBN:9781450390514
    DOI:10.1145/3465481

    Copyright © 2021 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 17 August 2021

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited

    Acceptance Rates

    Overall Acceptance Rate228of451submissions,51%

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format .

View HTML Format