SlideShare a Scribd company logo
1 of 13
Download to read offline
1
Network Security Roadmap
Praveen Kumar
F
1 ABSTRACT
Users may already have some perception of provided secu-
rity based on experience with earlier generations. To main-
tain the stability and coherent integration of 5G services, it
is imperative that security and privacy features prevalent in
earlier generations are also present in 5G. However, it is not
sufficient just to provide the same security features as in the
legacy systems due to the new threat model introduced by
the integration of new technologies like SDN, virtualization
and SBA. 5G systems are expected to be more service-
oriented. This suggests there will be an additional emphasis
on security and privacy requirements that spawn from the
new dimension of service-oriented security architecture.
2 INTRODUCTION
The fifth generation network, popularly referred to as
5G, has the potential of enabling multiple vertical indus-
tries [1, 2] like vehicle networks [3, 4], IoT [5, 2], VR/AR [6],
smart cities [7, 8, 9] and smart healthcare [10, 11, 12].
The millimeter wave technology that 5G employs offers
100x lower latency and 100x more bandwidth [13] than
the existing 4G technology. As a result of this, real-time
security requirement is a prime concern for the deployment
of 5G applications. When it comes to networks involving the
Internet of Things (IoT), multiple layers of the stack are vul-
nerable as potential targets of security attacks [14], including
the service and application layer, nodes, platforms, and the
network/transport layer. For example, a unified framework
of vulnerability detection in an IoT system is described in
[9]. The increased speed and bandwidth enabled by 5G
will eventually lead to new threat vectors and increased
sophistication of cyber attacks.
Another growing concern is the acceleration of existing
cyber attacks in the 5G framework. Today’s cyber attacks
have already targeted networks’ security: both at the IP
layer and signalling layer. Thus, simply making legacy
security mechanisms operate faster is not an adequate
measure. The Service Based Architecture (SBA) of the core
5G network provides multiple access points to third-party
service providers, thus expanding the attack surface. Legacy
approaches that depend on disparate security elements will
neither scale nor will be able to adequately prevent suc-
cessful attacks across the SBA of 5G networks [15]. New
encryption schemes and authentication protocols like 5G
AKA [16] are being designed for this purpose. System
designs composed of individually secure subsystems are
not provably secure. 5G radio network deployments in-
clude substantial augmentations of small cells connecting
over insecure networks, edge communications, and edge
nodes communicating with multiple cells concurrently [17].
Moreover, 5G comes with its new authentication protocols
and encryption primitives, which have not received a suffi-
cient amount of cryptanalysts’ scrutiny yet. This evolution
broadens the threat landscape by expanding the number of
intrusion points. With billions of connected devices and crit-
ical enterprise applications relying on 5G networks, network
operators and applications should preemptively defend
against possible security breaches. Some effective measures
for ensuring comprehensive end-to-end (E2E) security in the
5G framework may include:
• Multiple factors of mutual authentication across all
layers of the network including application, control
and data planes [18, 15, 19].
• Cloud-based threat analysis and vulnerability man-
agement, enabled by machine learning(ML) algo-
rithms, can be used across multiple platforms to
provide immediate response to known and unknown
threats in real time [20, 21, 22].
• The explosion in the number of end devices re-
quires real-time quarantining of infected devices us-
ing data-driven approaches.
• Multi-layered encryption of software-defined net-
work (SDN) data planes, enabled by data classifi-
cation is required for confidentiality and integrity
protection.
A primary reason for the necessity of stricter security
measures in emerging networks is the change of the trust
model as depicted in Fig. 1.
Security for 5G should be taken into consideration at
the initial stages of the system design (Security by Design
approach). Augmenting security features at a later stage
is less efficient and often more expensive in the long run.
In long term, security is a driving factor for service and
network evolution.
3 BACKGROUND
We provide a brief background on relevant prior work in
this field.
3.1 5G Network Security
Unlike previous generations of communication, the security
vulnerabilities in the 5G infrastructure are manifold. This is
arXiv:2211.05278v1
[cs.CR]
10
Nov
2022
2
Fig. 1. Evolved trust model in 5G [23]
due to the integration of multiple 5G enabling technologies
that alter the traditional architecture of 4G networks [17, 24].
The enhanced mobile broadband and high reliability come
with the introduction of flexible mobility and networks.
Programmable networks, network function virtualization
(NFV) and network slicing are some of the technologies
that make the 5G dream possible [25, 26]. However, the
integration of these features increase the attack surface.
The SBA of 5G has multiple third-party service providers
sharing resources for efficient functioning of the network.
This makes every entity a potential point of attack, unlike
the existing systems where most services are provided by
the network provider. Hence, 5G security is not just an
extension of the current security measures.
The primary changes in the 5G Core from the existing
4G Evolved Packet Core manifest in the form of NFV,
Multi-access Edge Computing (MEC) [27, 28], Radio Access
Network (RAN) [29] and SDN [30, 31, 32]. NFV decou-
ples software from hardware by replacing various network
functions such as firewalls, load balancers and routers with
virtualized instances. Network slicing enables the imple-
mentation of NFV by allowing multiple logical networks
to run on top of a shared physical resource. This provides
increased flexibility across networks. SDN is a complimen-
tary technology to NFV for achieving a unified network
abstraction to expand data flow control in the form of virtual
switches [33].
4 PROPOSED WORK
There have been preliminary studies on the emerging vul-
nerabilities in the individual components of the 5G net-
work [34, 14, 35, 36, 37]. However, there has not been
a comprehensive analysis of the vulnerabilities emerging
due to integration of these various components yet. We
aim to study such vulnerabilities. There are some attack
classes that can be more effectively defended against in the
5G framework. We wish to study such scenarios as well.
We also aim to study system level (OS and kernel) and
application level vulnerabilities, their correlation to network
vulnerabilities as well as the emergence of new threats using
artificial intelligence methods.
4.1 Pillars of the methodology
Newer technologies integrated in 5G require the formula-
tion of:
• New stream ciphers: As mentioned earlier, the 5G
ecosystem will enable multiple vertical industries
like IoT. This involves the existence of a heteroge-
neous amalgamation of resource-constrained edge
devices. More energy-efficient encryption algorithms
and authentication methods are required for effi-
ciency of these devices. Some good candidates for ef-
ficient 5G radio communications with constrained re-
sources are mentioned in [38, 19]. However, in-depth
cryptanalysis is yet to demonstrate the strength of
such ciphers.
• New security protocols: Due to the change in the
architecture of existing 4G networks, new protocols
have been designed for better attack resistance of
5G radio access networks. Random access procedure
based on tunable puzzles is an example introducing
generalization and improved usability in existing
security puzzles [39, 40].
On another hand, 5G network is composed of many
subsystems functioning together. The security of each of
these subsystems as stand-alone disparate systems is nec-
essary but not sufficient to ensure the security of the overall
system. The study of the security challenges arising due
to the integration of the following subsystems is still in its
infancy. Some of the major 5G security subsystems are:
1) Application layer security: Application layer secu-
rity refers to ways of protecting the application layer
from malicious attacks and the exploit of inherent
software vulnerabilities. Application layer provides
the largest threat surface to the attackers due to
accessibility and the huge diversity and minimal
abstraction from the user. Application layer vul-
nerabilities may lead to performance and stability
degradation, loss of privacy, and the network being
taken down [41]. Application layer threats include
buffer overflows, race conditions, SQL injections
and privilege escalation, amongst others.
2) Edge security: The edge of the network generally
comprises the computing nodes, like smartphones,
sensors, RFID tags and smart controllers. Edge de-
vices often process and store confidential informa-
tion which must be protected. In a smart system like
an autonomous vehicle or an IoT ecosystem [42, 5],
an edge device (namely the microcode, kernel and
operating system layers) are prone to security ex-
3
ploits. It is essential to detect such exploits in real-
time. Edge security poses many different threats, a
major one being a DDoS attack launched by hijacked
edge nodes.
3) Cloud RAN (C-RAN) security: C-RAN is a central-
ized cloud-based radio access network architecture
that has multiple advantages over traditional radio
access networks. C-RAN has been adopted by mul-
tiple operators for the 5G infrastructure [43]. Due
to its widespread integration, C-RAN security has
received a lot of attention recently. The traditional C-
RAN threat vectors include eavesdropping attacks,
impersonation attacks, jamming attacks, primary
user emulation attacks and wireless channel attacks.
Most of these attacks can be evaded using existing
cybersecurity measures but the potential emergence
of novel threat vectors due to its integration to the
disparate new technologies have not been explored
yet [44, 45].
4) SDN security: Traditionally, network components
like routers and switches have the rules for packet
forwarding hard-coded into the devices. This in-
hibits the flexibility of the devices and may lead
to inefficient packet routes. SDN separates the con-
trol plane and the data plane, allowing a soft-
ware defined controller to dynamically determine
the packet forwarding routes. This increases effi-
ciency. Many 5G operators are looking forward to
integrate SDN in the 5G framework. However, the
SDN controllers are stand-alone components which
need to be protected from attackers [46, 47]. Other
security aspects includes establishing trust between
SDN controllers and the data plane (via authen-
tication), creating a robust policy framework and
conducting forensic tests to detect and remediate
a compromised controller. Various attacks include
DoS attacks on the controller and the data planes,
topology poisoning attacks and man-in-the-middle
(MiTM) attacks. These attacks are described in detail
in section 4.2.2.
5) Proactive security analysis: The 5G infrastructure
is a service based architecture. Such an architecture
is controlled by smart controllers. Hence, future
updates in 5G will be software updates. Because
of the cyber vulnerabilities of software, we need
a proactive real-time security analyzer to detect
and alleviate the threats before an attacker exploits
it [48, 49].
The dramatic increase in bandwidth in 5G gives rise
to additional attack vectors. Short range, small-cell
antennae physically deployed all across the country
become the new entry-points for attackers, expand-
ing the attack surface. Functionally, these antennae
will use 5G’s Dynamic Spectrum Sharing capability
in which multiple streams of information share the
bandwidth in so-called “slices”—each slice with its
own varying degree of cyber risk. Such dynamic
modes of operation require dynamic cybersecurity
solutions, rather than uniform rigid defences.
6) Hypervisor security: Hypervisors enable the map-
ping of various network functions to underlying
logical instances and hardware in a virtualized
5G network. A hypervisor can create and execute
multiple guest operating systems and performs the
necessary resource allocation for those systems. This
makes the hypervisor a potential point of entry to
multiple networks. Hypervisors are susceptible to
DoS attacks on virtual machines (VMs), VM hop-
ping attacks and network slice attacks via host op-
erating systems. Some common hypervisor vulner-
abilities include software bugs and network attacks
like network intrusion and DoS attacks.
7) Faster authentication: With the facilitation of multi-
ple vertical industries like autonomous vehicles, IoT
and smart healthcare, the number of edge devices
will face an exponential growth. The number of
virtual machines will also increase due to the inte-
gration of services like SDN and NFV. All these indi-
vidual components need to authenticate themselves
to one another to ensure secure interaction between
them [50, 51]. Faster and reliable authentication
mechanisms and policies are required for effective
operation of the 5G infrastructure.
8) NFV security: NFV utilizes virtualization to allow
multiple networks to run on shared resources. NFV
is an integral part of the 5G ecosystem and se-
curing it is a fundamental concern. While some of
the issues related to NFV security like hypervisor
security and SDN security have been discussed be-
fore, there are certain unique threats to NFV which
must be considered during secure 5G system design
[52, 53, 54, 55]. These vulnerabilities include soft-
ware bugs, insider attacks (like Trojans), outsider
attacks (like malicious third-party operator) and
attacks on shared resources (like cache poisoning
attacks) [56].
An advantage of NFV is that it allows the virtual-
ization of network security functions like intrusion
detection systems. This enables security-as-a-service
infrastructure, which is integral to the service based
architecture of 5G.
4.2 Preliminary Evaluation
4.2.1 Results on WhatsApp
We consider WhatsApp as our secure chat, voice and video
application running on a 5G network for our security eval-
uations. We propose to apply cyber-analysis to WhatsApp
as a standalone application which implements several in-
transit and at-rest security countermeasures. We will also
analyze WhatsApp in the context of 5G networks.
WhatsApp is a secure instant messaging application
with over 1.5 billion users in over 180 countries. The What-
sApp messenger uses XMPP protocol and enforces E2E
encryption. E2E encryption claims that no one other than the
end users can decrypt messages in transit (including proxy
and authentication servers). WhatApp E2E encryption is
built on top of the security protocol used by the highly
secure messaging application Signal. However, there are
certain security measures that have been omitted by What-
sApp for higher efficiency. As a stand-alone application,
4
WhatsApp is highly secure. Morever, security vulnerabili-
ties at different layers like the network, IP or transport layer
can be exploited to compromise the security of WhatsApp.
We aggregate all the known attack vectors on WhatsApp
across the application layer, network layer, authentication
interfaces and the edge device [57, 58]. Till now, we have
constructed a DAG of 5 classes of vulnerabilities. The DAG
consists of 23 nodes currently. We will keep on augmenting
our DAG as new vulnerabilities are exposed. The various
threat vectors are:
1) Image file-jacking: This attack vector is launched by
a malware or rootkit on the smartphone which has
access to the shared memory. Sandboxing allows ap-
plications like WhatsApp to store its messages in a
secure partition of the memory which is inaccessible
to any other third-party application. However, the
images and other media contents received via the
messenger are stored in the shared external memory
(/storage/emulated/0/Whatsapp/media). There is
usually a delay between receiving the media file in
memory and loading it in the chat user interface.
The malware can potentially alter the media file dur-
ing this time and the attack will go undetected. This
is also known as the Man-in-the-Disk attack and can
be used to manipulate images, payment information
and audio files. The Control Flow Graph (CFG) of
this attack is shown in Fig. 2.
2) Insecure storage of keys: The WhatsApp encryp-
tion keys are stored on the device in clear text.
It is assumed that sandboxing prevents any other
application from accessing it [58]. However, root
access to the phone and memory corruption attacks,
enables access to key chains and renders encryption
keys vulnerable to confidentiality and integrity at-
tacks respectively. Besides these, there are methods
to decrypt messages on an older smartphone after
migrating to an existing WhatsApp account on a
new device. These methods can be exploited to
extract the private key.
3) SS7 network protocol exploit: WhatsApp verifies
a user’s identity with a one-factor authentication,
namely the phone number used for registration, by
calling the user’s registered phone number or by
sending him/her a verification code via SMS. The
network protocol Signalling System 7 (SS7), which
is used for communication by a large number of
providers, is vulnerable and prone to session hijack-
ing. A malicious adversary can hijack the authenti-
cation call (or SMS) and verify himself as the user,
thus impersonating the user in future conversations.
The CFG of this attack is shown in Fig. 3.
4) Voicemail exploit: As mentioned before, WhatsApp
uses voice calls to verify a new account. If the user
doesn’t receive the verification call, the verification
code is sent to the user’s voicemail. Voicemail ac-
counts can be hacked easily with brute-force attacks
on voicemail account passcodes. Hacking the voice-
mail gives access to the verification code which can
be exploited by the attacker to impersonate the user
in future conversations. The CFG of the voicemail
exploit is depicted in Fig. 4.
5) Insecurity of messages blocked in transit: This
security feature is intentionally disabled by What-
sApp as a trade-off for higher efficiency. The attack
scenario involves Alice sending a message to Bob.
Bob doesn’t receive the message immediately be-
cause he is offline. In the meantime, the adversary
Eve steals Bob’s SIM card and uses it to verify her-
self as Bob on another device. Now, Eve receives the
message from Alice which was meant for Bob [59].
The CFG of this attack is shown in Fig. 5.
These attack vectors demonstrate that, although What-
sApp is highly secure as a stand-alone application, multiple
implementation mechanisms on different platforms make it
vulnerable to various attacks.
4.2.2 Attacks on SDN framework
The SDN stack in the 5G network architecture has intro-
duced an entirely new attack surface with numerous threat
vectors. The role of SDNs in virtualizing the network func-
tions for greater flexibility and performance is pivotal for the
realization of the promises made by 5G developers. Even at
its nascent stage, it has already been adopted in multiple
real-world systems like the Google datacenters.
Multiple network operating systems (NOS), also referred
to as controllers, are available for the implementation of
a SDN framework. The most popular amongst them are
OpenDaylight [60], Floodlight [61] and POX [62]. All of
them implement the most widely used OpenFlow [63] pro-
tocol for SDN communication. It has been shown that these
NOSs are vulnerable to multiple classes of attacks [64]. A
major concern is the absence of encryption of the messages
exchanged between the controller and network switches.
We have considered the existing vulnerabilities of SDN
and constructed an attack DAG that includes the CFGs of
all such attacks. Then we implement cyber-analysis on this
DAG to obtain new attacks on the SDN framework. The
attacks that comprise the SDN attack DAG are:
1) Packet-In flooding: The network hosts and switches
send PacketIn messages to the controller when it
encounters a packet with unknown flow (a flow is
the rule which instructs the switch where to forward
the packet). The controller then sends an appropri-
ate flow to the switch and the switch follows the
specified flow rule in the future.
If compromised switches send multiple PacketIn
messages to the controller, the controller may ex-
haust all its resources in catering to them. This
would lead the controller to an unpredictable state
which may cause the network to fail. This is a classic
DoS attack on the SDN controller. The CFG of this
attack is shown in Fig. 6.
2) Switch table flooding: This is a DoS attack targetted
towards exhausting the memory resources of the
controller. The controller (or NOS) has a switch table
which stores the information about all the switches
present in the network. In the Floodlight controller,
it is observed that modifying the features-reply mes-
sage of the SDN OpenFlow protocol with a unique
datapacket ID (DPID) causes the controller to add
5
Access to
shared
memory
Detect arrival of
media file on disk
Modify the file
immediately
Fig. 2. CFG of image file jacking
Launch SS7
attack
Identify IMSI
number of victim
Request
reassignment of
victim to attack
terminal
Get subscriber profile
details of VLR and
HLR databases of
SS7 network
Complete
reassignment of
victim's profile
Spoof victim's
phone; Receive
verification SMS
Impersonate
victim
Fig. 3. CFG of SS7 vulnerability exploit
Gain access to
victim's voicemail
account by brute-
forcing passcodes
Ensure that victim
doesn't receive
verification call
Jam victim's
network
Switch off
victim' phone
Engage victim
in another call
Hypernode
Request WhatsApp
password reset with
victim's phone number
Select voice call
as verification
mechanism
Obtain
verification code
from victim's
voicemail
Impersonate
victim
Fig. 4. CFG of voicemail exploit
Migrate victim's
SIM card to
another device
Verify victim's
WhatsApp account
on new device
Server sends message
back to sender for re-
encryption
Receive message
encrypted with key
of new device
Fig. 5. CFG of blocked messages in-transit exploit
Send flows to
switches
Switches send lots of
packetIn messages
Overload control
plane
Drop legitimate
messages
Delayed response
Fig. 6. CFG of packet-In flooding attack on control plane of SDN
a new entry to its switch table. Sending numer-
ous maliciously-crafted messages can exhaust the
switch table of the controller, causing the controller
to disconnect the legitimate switches of the network.
6
The CFG of this attack is shown in Fig. 7.
3) Switch identification spoofing: Due to weak au-
thentication of the switches in the SDN protocol, a
malicious switch may pose as a legitimate switch
and request connection access with the controller.
This causes the controller to disconnect the legiti-
mate switch and connect with the malicious switch.
The CFG of this attack is shown in Fig. 8.
4) Malformed control message injection: OpenFlow
messages between the switches and the controller
contains a header. An adversary can modify the
contents of the header or the message itself to crash
the SDN controller. In such a scenario, the controller
might disconnect the switch. The CFG of this attack
is shown in Fig. 9.
5) System time manipulation: Many SDN applica-
tions depend on the system time and other system
variables. Modifying the system time may lead to
disconnection of the switch which tries to perform
time-sensitive operations. The CFG of this attack is
shown in Fig. 10.
6) Topology poisoning: In order to achieve superior
performance to traditional networks, an overall
view of the entire network is available to the con-
troller for efficient routing. The overall configura-
tion of the network is implemented via host tracking
services and link discovery services. These services
can be exploited by multiple techniques (like node
spoofing)to alter the topology of the network in the
controller database. This lead to various attacks like
eavesdropping attack and MiTM attack. The CFG of
this attack is shown in Fig. 11.
7) Arbitrary system termination: A malicious SDN
application can call the system exit function. This
will lead to the termination of the entire controller.
All applications will be killed and all entries of the
switch table will be lost. This shall be devastating
for the data plane elements like the switches and
hosts. The CFG of this attack is shown in Fig. 12.
8) System resource exhaustion: A malicious SDN ap-
plication may utilize all of the resources of the host
machine of the controller. This results in a DoS
attack on the entire network. The CFG of this attack
is shown in Fig. 13.
9) Message delivery obstruction 1: Lack of authoriza-
tion of applications allows SDN malwares to alter
the list of subscribers to packetIn messages. For
example, App1 and App2 are subscribed to packetIn
messages to the controller. A malware can alter the
subscriber list by remove App2. This prevents App2
from receiving subsequent packetIn messages, thus
hindering its proper functionality. The CFG of this
attack is shown in 14.
10) Message delivery obstruction 2: Applications run-
ning on the SDN controller generally occurs sequen-
tially in a chain. A malicious SDN application in
the chain can drop a packet that was supposed
to be forwarded to an application. This causes a
misconfiguration in the network. The CFG of this
attack is shown in 15.
11) Service chain jamming: Similar to the previous
attack, a malicious application can go into an infinite
loop. This causes the subsequent applications in its
control flow to be halted and the network comes to
a standstill. The CFG of this attack is shown in 16.
12) Unauthorized application management: SDN ap-
plications with maximal authorization provides
maximal network programmability but introduces
new attack vectors. Such applications can cause the
termination of other applications. Such operations
can cripple the network if a critical application like
routing or packet forwarding is terminated. It may
also produce various security threats if a security
function like IDS or firewall is terminated. The CFG
of this attack is shown in 17.
13) Flow rule modification: The primary task of the
controller is to generate flow rules. A malicious SDN
application can modify the flow rules of a controller,
leading to various attacks like MiTM and network
failures. The CFG of this attack is shown in 18.
14) Flow table flushing: A malicious SDN application
can flush all the flow table entries of the switch.
This would cause the switch to issue a packetIn
message for every incoming packet, thus leading to
a degradation in network performance. The CFG of
this attack is shown in 19.
15) Unauthorized network view manipulation: An ad-
vantage of the SDN architecture is that it offers an
overall view of the network topology. Most SDN
controllers lack authorization of applications trying
to modify internal storage. A SDN malware can alter
the network topology stored in the controller, thus
launching a topology poisoning attack. This affects
all the other applications that make decisions based
on this information. The CFG of this attack is shown
in 20.
16) Eavesdropping: The control messages between the
controller and the switches are unencrypted on
most NOSs. Eavesdropping on the messages of the
control channel can reveal information about the
network topology.
17) MiTM on the control channel: A MiTM attacker
can actively modify the flow rules from ”Forward”
to ”Drop” causing the switch to drop desired mes-
sages. The CFG of this attack is shown in 21.
18) Flow-rule flooding: A malicious SDN application
can continuously generate flow rules till the mem-
ory of the switch is filled. Now, the switch cannot
accept any new legitimate flow rules, thus failing
the network. This is an instance of a DoS attack. The
CFG of this attack is shown in 22.
19) Switch firmware abuse: Most OpenFlow switches
run custom firmware implementation s with differ-
ent capabilities. This spawns a new attack where the
a particular flow may be forced to be processed in
the software instead of the hardware by specifying
the source and destination MAC addresses in the
flow. Processing in software is much slower than
hardware processing, thus leading to a degradation
i network performance. The CFG of this attack is
shown in 23.
20) Malformed control message injection: Manipu-
7
Malicious switch
Connect legitimately
to controller
Send Features-reply
message with
different DPIDs
Delayed response
Fig. 7. CFG of switch-table flooding attack on control plane of SDN
Malicious switch
Connection request
with DPID of target
switch
Disconnect target
switch
Fig. 8. CFG of switch-id spoofing attack on SDN
Malicious SDN
application
Send malformed
control message
Degrade
performance
Fig. 9. CFG of various malformed message attacks on SDN
Manipulate system
time
Disconnect legitimate
switches
Fig. 10. CFG of system time manipulation attack on SDN
Spoof packets to
have target's MAC
and IP address
Switch issues
packetIn messages
to controller
HTS table updates
Disconnect legitimate
switches
Fig. 11. CFG of topology poisoning attack on SDN
Malicious SDN app
Calls system exit
function
Controller crashes
Fig. 12. CFG of arbitrary system termination attack on SDN
Malicious SDN app
Allocate infinite
memory to a process
Crashes controller
Fig. 13. CFG of system resource exhaustion attack on SDN
Malicious SDN app
Access list of
packetIn subscribers
Unsubscribe target
app
Target application
crashes
Fig. 14. CFG of a message delivery obstruction attack on SDN
Malicious SDN app
Drops packet without
forwarding
No reply received by
switch
Communication stops
Fig. 15. CFG of another message delivery obstruction attack on SDN
Malicious SDN app
Drops packet without
forwarding
Communication stops
Fig. 16. CFG of service chain jamming attack on SDN
lated control messages may be sent to the switches
to cause the switch to end up in an unpredictable
state, thus rendering it nonoperational. The CFG of
this attack is shown in 24.
21) Data leakage: SDN data plane elements are vulner-
able to side-channel attacks like timing attacks. Such
8
Malicious SDN app
Terminate another
application running
on controller
Fig. 17. CFG of unauthorized application management attack on SDN
Malicious SDN app
Issue a crafted flow
rule
Override flow table
entry
Terminate another
application running
on controller
Fig. 18. CFG of a flow rule modification attack on SDN
Malicious SDN app
Issue control
message to clear all
flow table entries
Mismatch for every
switch entry
Degrade
performance
Fig. 19. CFG of a flow table flush attack on SDN
Malicious SDN app
Modify critical system
variables, tables,
network information
Legitimate
applications crash
Fig. 20. CFG of unauthorized network view manipulation attack on SDN
Receive another
switch's flow rules
from controller
Modify the flow rules
Legitimate
applications crash
Fig. 21. CFG of MiTM attack on control channel of SDN
Malicious SDN
application
Continuously issue
flow rules
Fill flow table of
switch
Degrade
performance
Fig. 22. CFG of flow rule flooding attack on data plane of SDN
Malicious SDN
application
Issue crafted flow
rule
Network flow
processed in
software
Degrade
performance
Fig. 23. CFG of switch firmware abuse attack on SDN
Malicious SDN
application
Send malformed
control message
Degrade
performance
Fig. 24. CFG of malformed message injection attack on SDN
attacks can lead to fingerprinting attacks to compro-
mise privacy. Side-channel attacks can also lead to
loss of sensitive information like access control rules
in the controller.
Combining all the CFGs mentioned above, we construct
an attack CFG for SDN as shown in Fig. 25.
4.3 Future Work
Using ML on the system level operations has showed signif-
icant preliminary success [65, 2]. We plan on extending this
methodology to various other platforms and applications.
4.3.1 Representation of attacks
We will delve deep into each of the security categories
mentioned above (along with other categories) and doc-
ument all the possible attacks in each category. Then we
decompose each attack into its constituent assembly-level
instructions [2]. These assembly-level instructions are repre-
sented in the form of a CFG. We merge the CFGs of all the
categories to form a unified DAG which encompasses all the
known threats in the 5G ecosystem. Some of the detailed
threats in 5G are documented in Tables 1, 2. Similar tables
can be constructed for RAN, SDN and NFV security.
9
Malicious SDN app
Puts control in infinite
loop
Communication
stopped
Drops packet without
forwarding
No reply received by
switch
Issue control
message to clear all
flow table entries
Mismatch for every
entry
Degrade
performance
Disable
important
apps like
packet
forwarding
Calls system exit
function
Crash controller
Allocate infinite
memory to a process
Out of memory error
Modify internal
system variables,
tables, network info
Crash legitimate
apps
Access list of
packetIn subscribers
Unsubscribe target
app
Crash target app
Disable security
critical apps like
firewall, IDS
Issue crafted flow
rule
Override flow table
entry
Existing connection
disallowed
Send malformed
control message
Fill flow table of
switch
Controller passes
packetIn to apps Network flow
processed in
software
Spoof packets to
have target's MAC &
IP addr
Switch issues
packetIn messages
to controller
HTS table updates
All of target's traffic is
routed to attacker
(MiTM)
Alter header of OF
packetIn message
Disconnect legitimate
switches
Connect with
controller
Spoof target switch
(DPID)
Manipulate system
time
Announce OF
version during
handshake
Send incorrect OF
version in packetIn
message
Put incorrect protocol
type in Ethernet
frame
Send malformed OF
message type
Malicious switch
Connect legitimately
to controller
Send
"Features_Reply"
message with
different DPID
Connection request
with DPID of another
legitimate switch
Delayed respponse
Overload control
plane
Switches send lots of
packetIn messages
Send flows to
switches
Drop legitimate
packetIn messages
MiTM: Receive
another switch's
message from
controller
Send modified
message to switch
Fig. 25. Attack DAG on SDN
4.3.2 Machine learning on DAG
After the construction of the DAG, we characterize each
node of the DAG with multiple binary-valued features. We
train multiple ML models like SVM, K-nearest neighbors
and decision trees with the node features. The ML model is
trained to predict new possible branches in the DAG, giving
rise to new attacks. Deep learning methods cannot be used
in this scenario due to the insufficient data.
4.3.3 Implementation on different frameworks
This framework is a general approach which can be exe-
cuted on any application. The algorithm remains the same
but the DAG changes depending on the features and spec-
ifications of the framework. Our immediate focus is to
implement this on a secure instant messaging application,
like Signal or Whatsapp. We aim to test its effectiveness on
different platforms like Android, iOS, Unix, etc. This anal-
ysis will help to comprehend the underlying dependencies
of application layer security on the network and hardware
stacks.
4.3.4 Evaluation of the 5G stack
5G network security is a challenging research problem as
its infrastructure is entirely different from its predecessor.
Many unknown vulnerabilities potentially exist across mul-
tiple levels in the hardware, software and network stacks of
10
TABLE 1
Mobile network security: Evolved Packet Core threats and challenges
Category Threat Description
Availability Flooding an interface Attackers flood an interface resulting in DoS condition (DNS lookup, etc.)
Availability Crashing a network ele-
ment
Attackers crash a network element by sending malformed packets
Confidentiality Eavesdropping Attackers eavesdrop on sensitive data on control and user plane
Confidentiality Data Leakage Unauthorized access to sensitive data on the server
Integrity Traffic modification Attackers modify information during transit (DNS redirection, etc.)
Integrity Data modification Attackers modify data on network element (change the network element configurations)
Control Control the network Attackers control the network via protocol or implementation flaw
Control Compromise of
network element
Attackers compromise of network element via management interface
Malicious insider Insider attacks Insiders make data modification on network elements, make unauthorized changes to network element
configuration, etc.
Theft of service Service free of charge Attackers exploits a flaw to use services without being charged
TABLE 2
Threats and challenges in IP Multimedia Subsystems
Category Threat Description
Availability Flooding an interface Distributed DoS (DDoS)/Telephony DoS (TDoS) via mobile end-points)
Availability Crashing a network element DoS/TDoS via rogue media streams and malformed packets
Confidentiality Eavesdropping Eavesdropping via sniffing the SGi(Gm) interface
Confidentiality Data Leakage Unauthorized access to sensitive data on the IMS Home Subscriber Server (HSS)
Integrity Traffic modification MiTM attack on SGi(Gm) interface
Integrity Data modification Session Initiation Protocol (SIP) messaging impersonation via spoofed SIP messages
Control Control the network Spam over Internet Telephony / unsolicited voice calls resulting in Voice-SPAM/TDoS
Control Compromise of network ele-
ment
Compromise of network element via attacks from external IP networks
Malicious insider Insider attacks Malicious Insider makes unauthorized changes to IMSHSS configurations
Theft of service Service free of charge Theft of Service via SIP messaging impersonation
implementation. We aim to discover these weaknesses using
our algorithm to make the 5G infrastructure safer and more
secure. There are certain classes of attacks that can be easily
evaded in 5G due to the separation of the data plane and
the control plane. Multiple attack and defence measures are
expected to be accelerated in the 5G ecosystem. We expect
to get novel insights into the overall security framework of
5G by probing into these intricacies with ML.
4.3.5 Reinforcement Learning for security
Reinforcement learning (RL) [66] can be utilized to provide
real-time defence solutions. Similarly, it can also be utilized
to come up with real-time attack vectors. We aim to use
RL to study the implications of real-time attack scenarios in
the 5G framework. A defensive or attacking agent can be
deployed in a real-world scenario to learn the inconsisten-
cies in the operations. Multi-agent RL may also prove to be
useful in such scenarios. Counterfactual regret (CFR) [67]
minimization games have shown better results than RL
in certain classes of games (where the environment is not
fully observable to the player) like poker. We would like to
investigate the potential impact of CFR minimization games
in 5G security.
5 EVALUATION PLAN
5.1 Year 1
• Develop a unified framework for analyzing the inter-
connected security vulnerabilities between the hard-
ware, software (microcode, kernel, OS and applica-
tion layers) and network (including, cryptographic
protocols, virtualization layers, and others) stacks
with 5G network architectures.
• Study the dependencies of application layer security
on the network layer security in the 5G framework.
• Analyze the security of cryptographic protocols and
primitives proposed as part of the 5G framework.
• Analyze the security of a mobile application (which
is secure at the application layer) running on 5G. This
will give a deeper insight into the applicability and
usability of the developed tool.
• Utilize deep learning techniques to analyze graphs
representing various attacks and threat models. Re-
cent graphical deep learning analysis tools like
Graph2Vec [68] enables us to use deep learning to
analyze graphs. This has a potential of generating
new methods of analyzing threat models.
5.2 Year 2
• Utilize the developed framework to analyze the
security of multiple 5G-specific applications like
autonomous vehicles, Internet-of-Things and smart
healthcare.
• Extend the existing framework to other broader areas
of security like application security, OS security, etc.
11
5.3 Year 3
• Integrate state-of-the-art methods of ML like RL to
deploy real-time vulnerability detection systems.
• With the advent of 5G, the amount of data being
transferred will increase manifold. We wish to study
the implications of the magnanimous amount of data
transfer on user privacy.
REFERENCES
[1] R. Vannithamby and S. Talwar, Towards 5G: Applications,
requirements and candidate technologies. John Wiley &
Sons, 2017.
[2] T. Saha, N. Aaraj, N. Ajjarapu, and N. K. Jha, “Sharks:
Smart hacking approaches for risk scanning in internet-
of-things and cyber-physical systems based on machine
learning,” IEEE Transactions on Emerging Topics in Com-
puting, 2021.
[3] S. Chen, J. Hu, Y. Shi, Y. Peng, J. Fang, R. Zhao, and
L. Zhao, “Vehicle-to-everything (V2X) services sup-
ported by LTE-based systems and 5G,” IEEE Commu-
nications Standards Magazine, vol. 1, no. 2, pp. 70–76,
2017.
[4] R. Molina-Masegosa and J. Gozalvez, “LTE-V for
sidelink 5G V2X vehicular communications: A new
5G technology for short-range vehicle-to-everything
communications,” IEEE Vehicular Technology Magazine,
vol. 12, no. 4, pp. 30–39, 2017.
[5] C. X. Mavromoustakis, G. Mastorakis, and J. M.
Batalla, Internet of Things (IoT) in 5G mobile technologies.
Springer, 2016, vol. 8.
[6] M. Erol-Kantarci and S. Sukhmani, “Caching and com-
puting at the edge for mobile augmented reality and
virtual reality (AR/VR) in 5G,” in Ad Hoc Networks.
Springer, 2018, pp. 169–177.
[7] K. E. Skouby and P. Lynggaard, “Smart home and
smart city solutions enabled by 5G, IoT, AAI and CoT
services,” in 2014 International Conference on Contempo-
rary Computing and Informatics (IC3I). IEEE, 2014, pp.
874–878.
[8] J. Santos, T. Wauters, B. Volckaert, and F. De Turck,
“Fog computing: Enabling the management and or-
chestration of smart city applications in 5G networks,”
Entropy, vol. 20, no. 1, p. 4, 2018.
[9] J. Brown, T. Saha, and N. K. Jha, “Gravitas: Graphical
reticulated attack vectors for internet-of-things aggre-
gate security,” IEEE Transactions on Emerging Topics in
Computing, 2021.
[10] M. Chen, J. Yang, J. Zhou, Y. Hao, J. Zhang, and
C.-H. Youn, “5G-smart diabetes: Toward personalized
diabetes diagnosis with healthcare big data clouds,”
IEEE Communications Magazine, vol. 56, no. 4, pp. 16–
23, 2018.
[11] M. Chen, J. Yang, Y. Hao, S. Mao, and K. Hwang, “A 5G
cognitive system for healthcare,” Big Data and Cognitive
Computing, vol. 1, no. 1, p. 2, 2017.
[12] S. Latif, J. Qadir, S. Farooq, and M. Imran, “How 5G
wireless (and concomitant technologies) will revolu-
tionize healthcare?” Future Internet, vol. 9, no. 4, p. 93,
2017.
[13] R. Chávez-Santiago, M. Szydełko, A. Kliks, F. Foukalas,
Y. Haddad, K. E. Nolan, M. Y. Kelly, M. T. Masonta, and
I. Balasingham, “5G: The convergence of wireless com-
munications,” Wireless Personal Communications, vol. 83,
no. 3, pp. 1617–1642, 2015.
[14] I. Ahmad, T. Kumar, M. Liyanage, J. Okwuibe,
M. Ylianttila, and A. Gurtov, “5g security: Analysis
of threats and solutions,” in 2017 IEEE Conference on
Standards for Communications and Networking (CSCN).
IEEE, 2017, pp. 193–199.
[15] M. A. Ferrag, L. Maglaras, A. Argyriou, D. Kosmanos,
and H. Janicke, “Security for 4G and 5G cellular
networks: A survey of existing authentication and
privacy-preserving schemes,” Journal of Network and
Computer Applications, vol. 101, pp. 55–82, 2018.
[16] C. Cremers and M. Dehnel-Wild, “Component-based
formal analysis of 5G-AKA: Channel Assumptions and
Session Confusion,” 2019.
[17] B. Bangerter, S. Talwar, R. Arefi, and K. Stewart, “Net-
works and devices for the 5G era,” IEEE Communica-
tions Magazine, vol. 52, no. 2, pp. 90–96, 2014.
[18] J. Ni, X. Lin, and X. S. Shen, “Efficient and se-
cure service-oriented authentication supporting net-
work slicing for 5G-enabled IoT,” IEEE Journal on Se-
lected Areas in Communications, vol. 36, no. 3, pp. 644–
657, 2018.
[19] E. Dubrova, M. Näslund, and G. Selander, “CRC-based
message authentication for 5G mobile technology,” in
2015 IEEE Trustcom/BigDataSE/ISPA, vol. 1. IEEE, 2015,
pp. 1186–1191.
[20] H. Zhang, Y. Cole, L. Ge, S. Wei, W. Yu, C. Lu, G. Chen,
D. Shen, E. Blasch, and K. D. Pham, “ScanMe mobile: a
cloud-based android malware analysis service,” ACM
SIGAPP Applied Computing Review, vol. 16, no. 1, pp.
36–49, 2016.
[21] W. Yu, G. Xu, Z. Chen, and P. Moulema, “A cloud com-
puting based architecture for cyber security situation
awareness,” in 2013 IEEE Conference on Communications
and Network Security (CNS). IEEE, 2013, pp. 488–492.
[22] Z. Chen, G. Xu, V. Mahalingam, L. Ge, J. Nguyen,
W. Yu, and C. Lu, “A cloud computing based network
monitoring and threat detection system for critical in-
frastructures,” Big Data Research, vol. 3, pp. 10–23, 2016.
[23] “Security challenges in next gen-
eration 5G mobile networks,”
https://www.informationsecuritybuzz.com/articles/security-
challenges-next-generation-5G-mobile-networks/.
[24] S. Chen and J. Zhao, “The requirements, challenges,
and technologies for 5G of terrestrial mobile telecom-
munication,” IEEE communications magazine, vol. 52,
no. 5, pp. 36–43, 2014.
[25] F. Boccardi, R. W. Heath, A. Lozano, T. L. Marzetta, and
P. Popovski, “Five disruptive technology directions for
5G,” IEEE Communications Magazine, vol. 52, no. 2, pp.
74–80, 2014.
[26] C.-X. Wang, F. Haider, X. Gao, X.-H. You, Y. Yang,
D. Yuan, H. M. Aggoune, H. Haas, S. Fletcher, and
E. Hepsaydir, “Cellular architecture and key technolo-
gies for 5G wireless communication networks,” IEEE
communications magazine, vol. 52, no. 2, pp. 122–130,
2014.
12
[27] S. Kekki, W. Featherstone, Y. Fang, P. Kuure, A. Li,
A. Ranjan, D. Purkayastha, F. Jiangping, D. Frydman,
G. Verin et al., “MEC in 5G networks,” ETSI white paper,
vol. 28, pp. 1–28, 2018.
[28] Y. C. Hu, M. Patel, D. Sabella, N. Sprecher, and
V. Young, “Mobile edge computing—a key technology
towards 5G,” ETSI white paper, vol. 11, no. 11, pp. 1–16,
2015.
[29] I. Parvez, A. Rahmati, I. Guvenc, A. I. Sarwat, and
H. Dai, “A survey on low latency towards 5G: Ran, core
network and caching solutions,” IEEE Communications
Surveys & Tutorials, vol. 20, no. 4, pp. 3098–3130, 2018.
[30] B. Blanco, J. O. Fajardo, I. Giannoulakis, E. Kafetzakis,
S. Peng, J. Pérez-Romero, I. Trajkovska, P. S. Kho-
dashenas, L. Goratti, M. Paolino et al., “Technology
pillars in the architecture of future 5G mobile networks:
NFV, MEC and SDN,” Computer Standards & Interfaces,
vol. 54, pp. 216–228, 2017.
[31] R. Trivisonno, R. Guerzoni, I. Vaishnavi, and D. Sol-
dani, “SDN-based 5G mobile networks: architecture,
functions, procedures and backward compatibility,”
Transactions on Emerging Telecommunications Technolo-
gies, vol. 26, no. 1, pp. 82–92, 2015.
[32] H.-H. Cho, C.-F. Lai, T. K. Shih, and H.-C. Chao, “Inte-
gration of SDR and SDN for 5G,” IEEE Access, vol. 2,
pp. 1196–1204, 2014.
[33] J. Ordonez-Lucena, P. Ameigeiras, D. Lopez, J. J.
Ramos-Munoz, J. Lorca, and J. Folgueira, “Network
slicing for 5G with SDN/NFV: Concepts, architec-
tures, and challenges,” IEEE Communications Magazine,
vol. 55, no. 5, pp. 80–87, 2017.
[34] M. Geller and P. Nair, “5G security innovation with
cisco,” Whitepaper Cisco Public, pp. 1–29, 2018.
[35] Z. Yan, P. Zhang, and A. V. Vasilakos, “A security and
trust framework for virtualized networks and software-
defined networking,” Security and communication net-
works, vol. 9, no. 16, pp. 3059–3069, 2016.
[36] V. G. Vassilakis, H. Mouratidis, E. Panaousis, I. D.
Moscholios, and M. D. Logothetis, “Security require-
ments modelling for virtualized 5G small cell net-
works,” in 2017 24th International Conference on Telecom-
munications (ICT). IEEE, 2017, pp. 1–5.
[37] A. Hussein, I. H. Elhajj, A. Chehab, and A. Kayssi,
“SDN VANETs in 5G: An architecture for resilient secu-
rity services,” in 2017 Fourth International Conference on
Software Defined Systems (SDS). IEEE, 2017, pp. 67–74.
[38] E. Dubrova and M. Hell, “Espresso: A stream cipher for
5g wireless communication systems,” Cryptography and
Communications, Mar 2017.
[39] T. Saha and V. Sehwag, “Tv-puf: A fast lightweight
aging-resistant threshold voltage puf,” Cryptology
ePrint Archive, 2016.
[40] V. Sehwag and T. Saha, “Tv-puf: a fast lightweight
analog physical unclonable function,” in 2016 IEEE In-
ternational Symposium on Nanoelectronic and Information
Systems (iNIS). IEEE, 2016, pp. 182–186.
[41] X. Zhang, A. Kunz, and S. Schröder, “Overview of 5G
security in 3gpp,” in 2017 IEEE Conference on Standards
for Communications and Networking (CSCN). IEEE, 2017,
pp. 181–186.
[42] K. Fan, Y. Gong, C. Liang, H. Li, and Y. Yang,
“Lightweight and ultralightweight RFID mutual au-
thentication protocol with cache in the reader for IoT in
5G,” Security and Communication Networks, vol. 9, no. 16,
pp. 3095–3104, 2016.
[43] D. Wubben, P. Rost, J. S. Bartelt, M. Lalam, V. Savin,
M. Gorgoglione, A. Dekorsy, and G. Fettweis, “Benefits
and impact of cloud computing on 5G signal process-
ing: Flexible centralization through cloud-RAN,” IEEE
signal processing magazine, vol. 31, no. 6, pp. 35–44, 2014.
[44] M. C. Parker, G. Koczian, F. Adeyemi-Ejeye, T. Quinlan,
S. D. Walker, A. Legarrea, M. S. Siddiqui, E. Escalona,
S. Spirou, D. Kritharidis et al., “Charisma: Converged
heterogeneous advanced 5G cloud-RAN architecture
for intelligent and secure media access,” in 2016 Eu-
ropean Conference on Networks and Communications (Eu-
CNC). IEEE, 2016, pp. 240–244.
[45] P. Demestichas, A. Georgakopoulos, D. Karvounas,
K. Tsagkaris, V. Stavroulaki, J. Lu, C. Xiong, and J. Yao,
“5G on the horizon: Key challenges for the radio-access
network,” IEEE vehicular technology magazine, vol. 8,
no. 3, pp. 47–53, 2013.
[46] X. Duan and X. Wang, “Authentication handover
and privacy protection in 5G hetnets using software-
defined networking,” IEEE Communications Magazine,
vol. 53, no. 4, pp. 28–35, 2015.
[47] ——, “Fast authentication in 5G hetnet through sdn
enabled weighted secure-context-information transfer,”
in 2016 IEEE International Conference on Communications
(ICC). IEEE, 2016, pp. 1–6.
[48] M. G. Pérez, A. H. Celdrán, F. Ippoliti, P. G. Giardina,
G. Bernini, R. M. Alaez, E. Chirivella-Perez, F. J. G.
Clemente, G. M. Pérez, E. Kraja et al., “Dynamic recon-
figuration in 5G mobile networks to proactively detect
and mitigate botnets,” IEEE Internet Computing, vol. 21,
no. 5, pp. 28–36, 2017.
[49] M. S. Siddiqui, E. Escalona, E. Trouva, M.-A. Kourtis,
D. Kritharidis, K. Katsaros, S. Spirou, C. Canales, and
M. Lorenzo, “Policy based virtualised security archi-
tecture for SDN/NFV enabled 5G access networks,” in
2016 IEEE Conference on Network Function Virtualization
and Software Defined Networks (NFV-SDN). IEEE, 2016,
pp. 44–49.
[50] K. Norrman, M. Näslund, and E. Dubrova, “Protecting
imsi and user privacy in 5G networks,” in Proceedings
of the 9th EAI International Conference on Mobile Multi-
media Communications. ICST (Institute for Computer
Sciences, Social-Informatics and . . . , 2016, pp. 159–166.
[51] D. Basin, J. Dreier, L. Hirschi, S. Radomirovic, R. Sasse,
and V. Stettler, “A formal analysis of 5G authentica-
tion,” in Proceedings of the 2018 ACM SIGSAC Conference
on Computer and Communications Security. ACM, 2018,
pp. 1383–1396.
[52] S. Lal, T. Taleb, and A. Dutta, “NFV: Security threats
and best practices,” IEEE Communications Magazine,
vol. 55, no. 8, pp. 211–217, 2017.
[53] W. Yang and C. Fung, “A survey on security in network
functions virtualization,” in 2016 IEEE NetSoft Confer-
ence and Workshops (NetSoft). IEEE, 2016, pp. 15–19.
[54] D. V. Bernardo and B. B. Chua, “Introduction and
analysis of SDN and NFV security architecture (SN-
SECA),” in 2015 IEEE 29th International Conference
13
on Advanced Information Networking and Applications.
IEEE, 2015, pp. 796–801.
[55] M.-W. Shih, M. Kumar, T. Kim, and A. Gavrilovska, “S-
NFV: Securing NFV states by using sgx,” in Proceedings
of the 2016 ACM International Workshop on Security in
Software Defined Networks & Network Function Virtual-
ization. ACM, 2016, pp. 45–48.
[56] A. Aljuhani and T. Alharbi, “Virtualized network func-
tions security attacks and vulnerabilities,” in 2017 IEEE
7th Annual Computing and Communication Workshop and
Conference (CCWC). IEEE, 2017, pp. 1–4.
[57] T. Saha et al., “Machine learning-based efficient and
generalizable cybersecurity frameworks,” 2022.
[58] T. Saha, N. Aaraj, and N. K. Jha, “Machine learning
assisted security analysis of 5g-network-connected sys-
tems,” IEEE Transactions on Emerging Topics in Comput-
ing, 2022.
[59] T. Carpay and P. Lontorfos, “Whatsapp end-to-end
encryption: Are our messages private?” 2019.
[60] “A Linux Foundation Collaborative Project. OpenDay-
light SDN Controller,” https://www.opendaylight.org.
[61] “FloodLight Open SDN Controller,” https:
//floodlight.openflowhub.org/.
[62] NOX Repo, “The POX Controller.” https://github.
com/noxrepo/pox.
[63] N. McKeown, T. Anderson, H. Balakrishnan,
G. Parulkar, L. Peterson, J. Rexford, S. Shenker, and
J. Turner, “Openflow: enabling innovation in campus
networks,” ACM SIGCOMM Computer Communication
Review, vol. 38, no. 2, pp. 69–74, 2008.
[64] C. Yoon, S. Lee, H. Kang, T. Park, S. Shin, V. Yeg-
neswaran, P. Porras, and G. Gu, “Flow wars: Sys-
temizing the attack surface and defenses in software-
defined networks,” IEEE/ACM Transactions on Network-
ing (TON), vol. 25, no. 6, pp. 3514–3530, 2017.
[65] T. Saha, N. Aaraj, and N. K. Jha, “System and method
for security in internet-of-things and cyber-physical
systems based on machine learning,” Jun. 23 2022, uS
Patent App. 17/603,453.
[66] R. S. Sutton, A. G. Barto et al., Introduction to Reinforce-
ment Learning. MIT press Cambridge, 1998, vol. 2.
[67] M. Zinkevich, M. Johanson, M. Bowling, and C. Pic-
cione, “Regret minimization in games with incomplete
information,” in Advances in neural information process-
ing systems, 2008, pp. 1729–1736.
[68] A. Narayanan, M. Chandramohan, R. Venkatesan,
L. Chen, Y. Liu, and S. Jaiswal, “graph2vec: Learning
distributed representations of graphs,” 2017.

More Related Content

Similar to Network Security Roadmap have some perception of provided security

Reinforcement learning-based security schema mitigating manin-the-middle atta...
Reinforcement learning-based security schema mitigating manin-the-middle atta...Reinforcement learning-based security schema mitigating manin-the-middle atta...
Reinforcement learning-based security schema mitigating manin-the-middle atta...
IJECEIAES
 
Cloud computing security- critical infrastructures
Cloud computing security- critical infrastructuresCloud computing security- critical infrastructures
Cloud computing security- critical infrastructures
Mohammed Saqib
 
Novel secure communication protocol basepaper
Novel secure communication protocol basepaperNovel secure communication protocol basepaper
Novel secure communication protocol basepaper
Mumbai Academisc
 

Similar to Network Security Roadmap have some perception of provided security (20)

SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING MLSECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
 
Enhance Your Network Security with NGFW Firewall Solutions by SecurityGen
Enhance Your Network Security with NGFW Firewall Solutions by SecurityGenEnhance Your Network Security with NGFW Firewall Solutions by SecurityGen
Enhance Your Network Security with NGFW Firewall Solutions by SecurityGen
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
 
Reinforcement learning-based security schema mitigating manin-the-middle atta...
Reinforcement learning-based security schema mitigating manin-the-middle atta...Reinforcement learning-based security schema mitigating manin-the-middle atta...
Reinforcement learning-based security schema mitigating manin-the-middle atta...
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
6G Security Challenges And Potential Solutions
6G Security Challenges And Potential Solutions6G Security Challenges And Potential Solutions
6G Security Challenges And Potential Solutions
 
6G Security Challenges And Potential Solutions
6G Security Challenges And Potential Solutions6G Security Challenges And Potential Solutions
6G Security Challenges And Potential Solutions
 
Whitepaper - Software Defined Networking for the Telco Industry
Whitepaper - Software Defined Networking for the Telco IndustryWhitepaper - Software Defined Networking for the Telco Industry
Whitepaper - Software Defined Networking for the Telco Industry
 
Fb34942946
Fb34942946Fb34942946
Fb34942946
 
Elevating Network Security through NGFW Firewalls.pdf
Elevating Network Security through NGFW Firewalls.pdfElevating Network Security through NGFW Firewalls.pdf
Elevating Network Security through NGFW Firewalls.pdf
 
Chrono Defend: Time-Traveling Safeguards through NGFW Firewall Innovation
Chrono Defend: Time-Traveling Safeguards through NGFW Firewall InnovationChrono Defend: Time-Traveling Safeguards through NGFW Firewall Innovation
Chrono Defend: Time-Traveling Safeguards through NGFW Firewall Innovation
 
NGFW - An Updated Overview
NGFW - An Updated Overview NGFW - An Updated Overview
NGFW - An Updated Overview
 
Block Armour Zero Trust Cybersecurity Mesh for Telcom
Block Armour Zero Trust Cybersecurity Mesh for TelcomBlock Armour Zero Trust Cybersecurity Mesh for Telcom
Block Armour Zero Trust Cybersecurity Mesh for Telcom
 
A Survey on the Placement of Virtual Security Network Functions in Softwarise...
A Survey on the Placement of Virtual Security Network Functions in Softwarise...A Survey on the Placement of Virtual Security Network Functions in Softwarise...
A Survey on the Placement of Virtual Security Network Functions in Softwarise...
 
Cloud computing security- critical infrastructures
Cloud computing security- critical infrastructuresCloud computing security- critical infrastructures
Cloud computing security- critical infrastructures
 
Novel secure communication protocol basepaper
Novel secure communication protocol basepaperNovel secure communication protocol basepaper
Novel secure communication protocol basepaper
 
7215nsa05
7215nsa057215nsa05
7215nsa05
 
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKS
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKSCOMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKS
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKS
 
Hybrid cloud based firewalling
Hybrid cloud based firewallingHybrid cloud based firewalling
Hybrid cloud based firewalling
 

Recently uploaded

一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理
F
 
一比一原版帝国理工学院毕业证如何办理
一比一原版帝国理工学院毕业证如何办理一比一原版帝国理工学院毕业证如何办理
一比一原版帝国理工学院毕业证如何办理
F
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
pxcywzqs
 
一比一原版(毕业证书)新西兰怀特克利夫艺术设计学院毕业证原件一模一样
一比一原版(毕业证书)新西兰怀特克利夫艺术设计学院毕业证原件一模一样一比一原版(毕业证书)新西兰怀特克利夫艺术设计学院毕业证原件一模一样
一比一原版(毕业证书)新西兰怀特克利夫艺术设计学院毕业证原件一模一样
AS
 
Abortion Clinic in Germiston +27791653574 WhatsApp Abortion Clinic Services i...
Abortion Clinic in Germiston +27791653574 WhatsApp Abortion Clinic Services i...Abortion Clinic in Germiston +27791653574 WhatsApp Abortion Clinic Services i...
Abortion Clinic in Germiston +27791653574 WhatsApp Abortion Clinic Services i...
mikehavy0
 
一比一原版澳大利亚迪肯大学毕业证如何办理
一比一原版澳大利亚迪肯大学毕业证如何办理一比一原版澳大利亚迪肯大学毕业证如何办理
一比一原版澳大利亚迪肯大学毕业证如何办理
SS
 
一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书
一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书
一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书
c6eb683559b3
 
一比一原版犹他大学毕业证如何办理
一比一原版犹他大学毕业证如何办理一比一原版犹他大学毕业证如何办理
一比一原版犹他大学毕业证如何办理
F
 
如何办理(UCLA毕业证)加州大学洛杉矶分校毕业证成绩单本科硕士学位证留信学历认证
如何办理(UCLA毕业证)加州大学洛杉矶分校毕业证成绩单本科硕士学位证留信学历认证如何办理(UCLA毕业证)加州大学洛杉矶分校毕业证成绩单本科硕士学位证留信学历认证
如何办理(UCLA毕业证)加州大学洛杉矶分校毕业证成绩单本科硕士学位证留信学历认证
hfkmxufye
 
一比一原版(Polytechnic毕业证书)新加坡理工学院毕业证原件一模一样
一比一原版(Polytechnic毕业证书)新加坡理工学院毕业证原件一模一样一比一原版(Polytechnic毕业证书)新加坡理工学院毕业证原件一模一样
一比一原版(Polytechnic毕业证书)新加坡理工学院毕业证原件一模一样
AS
 
一比一原版(USYD毕业证书)悉尼大学毕业证原件一模一样
一比一原版(USYD毕业证书)悉尼大学毕业证原件一模一样一比一原版(USYD毕业证书)悉尼大学毕业证原件一模一样
一比一原版(USYD毕业证书)悉尼大学毕业证原件一模一样
ayvbos
 

Recently uploaded (20)

一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理
 
一比一原版帝国理工学院毕业证如何办理
一比一原版帝国理工学院毕业证如何办理一比一原版帝国理工学院毕业证如何办理
一比一原版帝国理工学院毕业证如何办理
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
 
Washington Football Commanders Redskins Feathers Shirt
Washington Football Commanders Redskins Feathers ShirtWashington Football Commanders Redskins Feathers Shirt
Washington Football Commanders Redskins Feathers Shirt
 
一比一原版(毕业证书)新西兰怀特克利夫艺术设计学院毕业证原件一模一样
一比一原版(毕业证书)新西兰怀特克利夫艺术设计学院毕业证原件一模一样一比一原版(毕业证书)新西兰怀特克利夫艺术设计学院毕业证原件一模一样
一比一原版(毕业证书)新西兰怀特克利夫艺术设计学院毕业证原件一模一样
 
Abortion Clinic in Germiston +27791653574 WhatsApp Abortion Clinic Services i...
Abortion Clinic in Germiston +27791653574 WhatsApp Abortion Clinic Services i...Abortion Clinic in Germiston +27791653574 WhatsApp Abortion Clinic Services i...
Abortion Clinic in Germiston +27791653574 WhatsApp Abortion Clinic Services i...
 
Down bad crying at the gym t shirtsDown bad crying at the gym t shirts
Down bad crying at the gym t shirtsDown bad crying at the gym t shirtsDown bad crying at the gym t shirtsDown bad crying at the gym t shirts
Down bad crying at the gym t shirtsDown bad crying at the gym t shirts
 
一比一原版澳大利亚迪肯大学毕业证如何办理
一比一原版澳大利亚迪肯大学毕业证如何办理一比一原版澳大利亚迪肯大学毕业证如何办理
一比一原版澳大利亚迪肯大学毕业证如何办理
 
Research Assignment - NIST SP800 [172 A] - Presentation.pptx
Research Assignment - NIST SP800 [172 A] - Presentation.pptxResearch Assignment - NIST SP800 [172 A] - Presentation.pptx
Research Assignment - NIST SP800 [172 A] - Presentation.pptx
 
一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书
一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书
一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书
 
一比一原版犹他大学毕业证如何办理
一比一原版犹他大学毕业证如何办理一比一原版犹他大学毕业证如何办理
一比一原版犹他大学毕业证如何办理
 
如何办理(UCLA毕业证)加州大学洛杉矶分校毕业证成绩单本科硕士学位证留信学历认证
如何办理(UCLA毕业证)加州大学洛杉矶分校毕业证成绩单本科硕士学位证留信学历认证如何办理(UCLA毕业证)加州大学洛杉矶分校毕业证成绩单本科硕士学位证留信学历认证
如何办理(UCLA毕业证)加州大学洛杉矶分校毕业证成绩单本科硕士学位证留信学历认证
 
Loker Pemandu Lagu LC Semarang 085746015303
Loker Pemandu Lagu LC Semarang 085746015303Loker Pemandu Lagu LC Semarang 085746015303
Loker Pemandu Lagu LC Semarang 085746015303
 
一比一原版(Polytechnic毕业证书)新加坡理工学院毕业证原件一模一样
一比一原版(Polytechnic毕业证书)新加坡理工学院毕业证原件一模一样一比一原版(Polytechnic毕业证书)新加坡理工学院毕业证原件一模一样
一比一原版(Polytechnic毕业证书)新加坡理工学院毕业证原件一模一样
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
一比一原版(USYD毕业证书)悉尼大学毕业证原件一模一样
一比一原版(USYD毕业证书)悉尼大学毕业证原件一模一样一比一原版(USYD毕业证书)悉尼大学毕业证原件一模一样
一比一原版(USYD毕业证书)悉尼大学毕业证原件一模一样
 
Nungambakkam (Chennai) Independent Escorts - 9632533318 100% genuine
Nungambakkam (Chennai) Independent Escorts - 9632533318 100% genuineNungambakkam (Chennai) Independent Escorts - 9632533318 100% genuine
Nungambakkam (Chennai) Independent Escorts - 9632533318 100% genuine
 
A LOOK INTO NETWORK TECHNOLOGIES MAINLY WAN.pptx
A LOOK INTO NETWORK TECHNOLOGIES MAINLY WAN.pptxA LOOK INTO NETWORK TECHNOLOGIES MAINLY WAN.pptx
A LOOK INTO NETWORK TECHNOLOGIES MAINLY WAN.pptx
 

Network Security Roadmap have some perception of provided security

  • 1. 1 Network Security Roadmap Praveen Kumar F 1 ABSTRACT Users may already have some perception of provided secu- rity based on experience with earlier generations. To main- tain the stability and coherent integration of 5G services, it is imperative that security and privacy features prevalent in earlier generations are also present in 5G. However, it is not sufficient just to provide the same security features as in the legacy systems due to the new threat model introduced by the integration of new technologies like SDN, virtualization and SBA. 5G systems are expected to be more service- oriented. This suggests there will be an additional emphasis on security and privacy requirements that spawn from the new dimension of service-oriented security architecture. 2 INTRODUCTION The fifth generation network, popularly referred to as 5G, has the potential of enabling multiple vertical indus- tries [1, 2] like vehicle networks [3, 4], IoT [5, 2], VR/AR [6], smart cities [7, 8, 9] and smart healthcare [10, 11, 12]. The millimeter wave technology that 5G employs offers 100x lower latency and 100x more bandwidth [13] than the existing 4G technology. As a result of this, real-time security requirement is a prime concern for the deployment of 5G applications. When it comes to networks involving the Internet of Things (IoT), multiple layers of the stack are vul- nerable as potential targets of security attacks [14], including the service and application layer, nodes, platforms, and the network/transport layer. For example, a unified framework of vulnerability detection in an IoT system is described in [9]. The increased speed and bandwidth enabled by 5G will eventually lead to new threat vectors and increased sophistication of cyber attacks. Another growing concern is the acceleration of existing cyber attacks in the 5G framework. Today’s cyber attacks have already targeted networks’ security: both at the IP layer and signalling layer. Thus, simply making legacy security mechanisms operate faster is not an adequate measure. The Service Based Architecture (SBA) of the core 5G network provides multiple access points to third-party service providers, thus expanding the attack surface. Legacy approaches that depend on disparate security elements will neither scale nor will be able to adequately prevent suc- cessful attacks across the SBA of 5G networks [15]. New encryption schemes and authentication protocols like 5G AKA [16] are being designed for this purpose. System designs composed of individually secure subsystems are not provably secure. 5G radio network deployments in- clude substantial augmentations of small cells connecting over insecure networks, edge communications, and edge nodes communicating with multiple cells concurrently [17]. Moreover, 5G comes with its new authentication protocols and encryption primitives, which have not received a suffi- cient amount of cryptanalysts’ scrutiny yet. This evolution broadens the threat landscape by expanding the number of intrusion points. With billions of connected devices and crit- ical enterprise applications relying on 5G networks, network operators and applications should preemptively defend against possible security breaches. Some effective measures for ensuring comprehensive end-to-end (E2E) security in the 5G framework may include: • Multiple factors of mutual authentication across all layers of the network including application, control and data planes [18, 15, 19]. • Cloud-based threat analysis and vulnerability man- agement, enabled by machine learning(ML) algo- rithms, can be used across multiple platforms to provide immediate response to known and unknown threats in real time [20, 21, 22]. • The explosion in the number of end devices re- quires real-time quarantining of infected devices us- ing data-driven approaches. • Multi-layered encryption of software-defined net- work (SDN) data planes, enabled by data classifi- cation is required for confidentiality and integrity protection. A primary reason for the necessity of stricter security measures in emerging networks is the change of the trust model as depicted in Fig. 1. Security for 5G should be taken into consideration at the initial stages of the system design (Security by Design approach). Augmenting security features at a later stage is less efficient and often more expensive in the long run. In long term, security is a driving factor for service and network evolution. 3 BACKGROUND We provide a brief background on relevant prior work in this field. 3.1 5G Network Security Unlike previous generations of communication, the security vulnerabilities in the 5G infrastructure are manifold. This is arXiv:2211.05278v1 [cs.CR] 10 Nov 2022
  • 2. 2 Fig. 1. Evolved trust model in 5G [23] due to the integration of multiple 5G enabling technologies that alter the traditional architecture of 4G networks [17, 24]. The enhanced mobile broadband and high reliability come with the introduction of flexible mobility and networks. Programmable networks, network function virtualization (NFV) and network slicing are some of the technologies that make the 5G dream possible [25, 26]. However, the integration of these features increase the attack surface. The SBA of 5G has multiple third-party service providers sharing resources for efficient functioning of the network. This makes every entity a potential point of attack, unlike the existing systems where most services are provided by the network provider. Hence, 5G security is not just an extension of the current security measures. The primary changes in the 5G Core from the existing 4G Evolved Packet Core manifest in the form of NFV, Multi-access Edge Computing (MEC) [27, 28], Radio Access Network (RAN) [29] and SDN [30, 31, 32]. NFV decou- ples software from hardware by replacing various network functions such as firewalls, load balancers and routers with virtualized instances. Network slicing enables the imple- mentation of NFV by allowing multiple logical networks to run on top of a shared physical resource. This provides increased flexibility across networks. SDN is a complimen- tary technology to NFV for achieving a unified network abstraction to expand data flow control in the form of virtual switches [33]. 4 PROPOSED WORK There have been preliminary studies on the emerging vul- nerabilities in the individual components of the 5G net- work [34, 14, 35, 36, 37]. However, there has not been a comprehensive analysis of the vulnerabilities emerging due to integration of these various components yet. We aim to study such vulnerabilities. There are some attack classes that can be more effectively defended against in the 5G framework. We wish to study such scenarios as well. We also aim to study system level (OS and kernel) and application level vulnerabilities, their correlation to network vulnerabilities as well as the emergence of new threats using artificial intelligence methods. 4.1 Pillars of the methodology Newer technologies integrated in 5G require the formula- tion of: • New stream ciphers: As mentioned earlier, the 5G ecosystem will enable multiple vertical industries like IoT. This involves the existence of a heteroge- neous amalgamation of resource-constrained edge devices. More energy-efficient encryption algorithms and authentication methods are required for effi- ciency of these devices. Some good candidates for ef- ficient 5G radio communications with constrained re- sources are mentioned in [38, 19]. However, in-depth cryptanalysis is yet to demonstrate the strength of such ciphers. • New security protocols: Due to the change in the architecture of existing 4G networks, new protocols have been designed for better attack resistance of 5G radio access networks. Random access procedure based on tunable puzzles is an example introducing generalization and improved usability in existing security puzzles [39, 40]. On another hand, 5G network is composed of many subsystems functioning together. The security of each of these subsystems as stand-alone disparate systems is nec- essary but not sufficient to ensure the security of the overall system. The study of the security challenges arising due to the integration of the following subsystems is still in its infancy. Some of the major 5G security subsystems are: 1) Application layer security: Application layer secu- rity refers to ways of protecting the application layer from malicious attacks and the exploit of inherent software vulnerabilities. Application layer provides the largest threat surface to the attackers due to accessibility and the huge diversity and minimal abstraction from the user. Application layer vul- nerabilities may lead to performance and stability degradation, loss of privacy, and the network being taken down [41]. Application layer threats include buffer overflows, race conditions, SQL injections and privilege escalation, amongst others. 2) Edge security: The edge of the network generally comprises the computing nodes, like smartphones, sensors, RFID tags and smart controllers. Edge de- vices often process and store confidential informa- tion which must be protected. In a smart system like an autonomous vehicle or an IoT ecosystem [42, 5], an edge device (namely the microcode, kernel and operating system layers) are prone to security ex-
  • 3. 3 ploits. It is essential to detect such exploits in real- time. Edge security poses many different threats, a major one being a DDoS attack launched by hijacked edge nodes. 3) Cloud RAN (C-RAN) security: C-RAN is a central- ized cloud-based radio access network architecture that has multiple advantages over traditional radio access networks. C-RAN has been adopted by mul- tiple operators for the 5G infrastructure [43]. Due to its widespread integration, C-RAN security has received a lot of attention recently. The traditional C- RAN threat vectors include eavesdropping attacks, impersonation attacks, jamming attacks, primary user emulation attacks and wireless channel attacks. Most of these attacks can be evaded using existing cybersecurity measures but the potential emergence of novel threat vectors due to its integration to the disparate new technologies have not been explored yet [44, 45]. 4) SDN security: Traditionally, network components like routers and switches have the rules for packet forwarding hard-coded into the devices. This in- hibits the flexibility of the devices and may lead to inefficient packet routes. SDN separates the con- trol plane and the data plane, allowing a soft- ware defined controller to dynamically determine the packet forwarding routes. This increases effi- ciency. Many 5G operators are looking forward to integrate SDN in the 5G framework. However, the SDN controllers are stand-alone components which need to be protected from attackers [46, 47]. Other security aspects includes establishing trust between SDN controllers and the data plane (via authen- tication), creating a robust policy framework and conducting forensic tests to detect and remediate a compromised controller. Various attacks include DoS attacks on the controller and the data planes, topology poisoning attacks and man-in-the-middle (MiTM) attacks. These attacks are described in detail in section 4.2.2. 5) Proactive security analysis: The 5G infrastructure is a service based architecture. Such an architecture is controlled by smart controllers. Hence, future updates in 5G will be software updates. Because of the cyber vulnerabilities of software, we need a proactive real-time security analyzer to detect and alleviate the threats before an attacker exploits it [48, 49]. The dramatic increase in bandwidth in 5G gives rise to additional attack vectors. Short range, small-cell antennae physically deployed all across the country become the new entry-points for attackers, expand- ing the attack surface. Functionally, these antennae will use 5G’s Dynamic Spectrum Sharing capability in which multiple streams of information share the bandwidth in so-called “slices”—each slice with its own varying degree of cyber risk. Such dynamic modes of operation require dynamic cybersecurity solutions, rather than uniform rigid defences. 6) Hypervisor security: Hypervisors enable the map- ping of various network functions to underlying logical instances and hardware in a virtualized 5G network. A hypervisor can create and execute multiple guest operating systems and performs the necessary resource allocation for those systems. This makes the hypervisor a potential point of entry to multiple networks. Hypervisors are susceptible to DoS attacks on virtual machines (VMs), VM hop- ping attacks and network slice attacks via host op- erating systems. Some common hypervisor vulner- abilities include software bugs and network attacks like network intrusion and DoS attacks. 7) Faster authentication: With the facilitation of multi- ple vertical industries like autonomous vehicles, IoT and smart healthcare, the number of edge devices will face an exponential growth. The number of virtual machines will also increase due to the inte- gration of services like SDN and NFV. All these indi- vidual components need to authenticate themselves to one another to ensure secure interaction between them [50, 51]. Faster and reliable authentication mechanisms and policies are required for effective operation of the 5G infrastructure. 8) NFV security: NFV utilizes virtualization to allow multiple networks to run on shared resources. NFV is an integral part of the 5G ecosystem and se- curing it is a fundamental concern. While some of the issues related to NFV security like hypervisor security and SDN security have been discussed be- fore, there are certain unique threats to NFV which must be considered during secure 5G system design [52, 53, 54, 55]. These vulnerabilities include soft- ware bugs, insider attacks (like Trojans), outsider attacks (like malicious third-party operator) and attacks on shared resources (like cache poisoning attacks) [56]. An advantage of NFV is that it allows the virtual- ization of network security functions like intrusion detection systems. This enables security-as-a-service infrastructure, which is integral to the service based architecture of 5G. 4.2 Preliminary Evaluation 4.2.1 Results on WhatsApp We consider WhatsApp as our secure chat, voice and video application running on a 5G network for our security eval- uations. We propose to apply cyber-analysis to WhatsApp as a standalone application which implements several in- transit and at-rest security countermeasures. We will also analyze WhatsApp in the context of 5G networks. WhatsApp is a secure instant messaging application with over 1.5 billion users in over 180 countries. The What- sApp messenger uses XMPP protocol and enforces E2E encryption. E2E encryption claims that no one other than the end users can decrypt messages in transit (including proxy and authentication servers). WhatApp E2E encryption is built on top of the security protocol used by the highly secure messaging application Signal. However, there are certain security measures that have been omitted by What- sApp for higher efficiency. As a stand-alone application,
  • 4. 4 WhatsApp is highly secure. Morever, security vulnerabili- ties at different layers like the network, IP or transport layer can be exploited to compromise the security of WhatsApp. We aggregate all the known attack vectors on WhatsApp across the application layer, network layer, authentication interfaces and the edge device [57, 58]. Till now, we have constructed a DAG of 5 classes of vulnerabilities. The DAG consists of 23 nodes currently. We will keep on augmenting our DAG as new vulnerabilities are exposed. The various threat vectors are: 1) Image file-jacking: This attack vector is launched by a malware or rootkit on the smartphone which has access to the shared memory. Sandboxing allows ap- plications like WhatsApp to store its messages in a secure partition of the memory which is inaccessible to any other third-party application. However, the images and other media contents received via the messenger are stored in the shared external memory (/storage/emulated/0/Whatsapp/media). There is usually a delay between receiving the media file in memory and loading it in the chat user interface. The malware can potentially alter the media file dur- ing this time and the attack will go undetected. This is also known as the Man-in-the-Disk attack and can be used to manipulate images, payment information and audio files. The Control Flow Graph (CFG) of this attack is shown in Fig. 2. 2) Insecure storage of keys: The WhatsApp encryp- tion keys are stored on the device in clear text. It is assumed that sandboxing prevents any other application from accessing it [58]. However, root access to the phone and memory corruption attacks, enables access to key chains and renders encryption keys vulnerable to confidentiality and integrity at- tacks respectively. Besides these, there are methods to decrypt messages on an older smartphone after migrating to an existing WhatsApp account on a new device. These methods can be exploited to extract the private key. 3) SS7 network protocol exploit: WhatsApp verifies a user’s identity with a one-factor authentication, namely the phone number used for registration, by calling the user’s registered phone number or by sending him/her a verification code via SMS. The network protocol Signalling System 7 (SS7), which is used for communication by a large number of providers, is vulnerable and prone to session hijack- ing. A malicious adversary can hijack the authenti- cation call (or SMS) and verify himself as the user, thus impersonating the user in future conversations. The CFG of this attack is shown in Fig. 3. 4) Voicemail exploit: As mentioned before, WhatsApp uses voice calls to verify a new account. If the user doesn’t receive the verification call, the verification code is sent to the user’s voicemail. Voicemail ac- counts can be hacked easily with brute-force attacks on voicemail account passcodes. Hacking the voice- mail gives access to the verification code which can be exploited by the attacker to impersonate the user in future conversations. The CFG of the voicemail exploit is depicted in Fig. 4. 5) Insecurity of messages blocked in transit: This security feature is intentionally disabled by What- sApp as a trade-off for higher efficiency. The attack scenario involves Alice sending a message to Bob. Bob doesn’t receive the message immediately be- cause he is offline. In the meantime, the adversary Eve steals Bob’s SIM card and uses it to verify her- self as Bob on another device. Now, Eve receives the message from Alice which was meant for Bob [59]. The CFG of this attack is shown in Fig. 5. These attack vectors demonstrate that, although What- sApp is highly secure as a stand-alone application, multiple implementation mechanisms on different platforms make it vulnerable to various attacks. 4.2.2 Attacks on SDN framework The SDN stack in the 5G network architecture has intro- duced an entirely new attack surface with numerous threat vectors. The role of SDNs in virtualizing the network func- tions for greater flexibility and performance is pivotal for the realization of the promises made by 5G developers. Even at its nascent stage, it has already been adopted in multiple real-world systems like the Google datacenters. Multiple network operating systems (NOS), also referred to as controllers, are available for the implementation of a SDN framework. The most popular amongst them are OpenDaylight [60], Floodlight [61] and POX [62]. All of them implement the most widely used OpenFlow [63] pro- tocol for SDN communication. It has been shown that these NOSs are vulnerable to multiple classes of attacks [64]. A major concern is the absence of encryption of the messages exchanged between the controller and network switches. We have considered the existing vulnerabilities of SDN and constructed an attack DAG that includes the CFGs of all such attacks. Then we implement cyber-analysis on this DAG to obtain new attacks on the SDN framework. The attacks that comprise the SDN attack DAG are: 1) Packet-In flooding: The network hosts and switches send PacketIn messages to the controller when it encounters a packet with unknown flow (a flow is the rule which instructs the switch where to forward the packet). The controller then sends an appropri- ate flow to the switch and the switch follows the specified flow rule in the future. If compromised switches send multiple PacketIn messages to the controller, the controller may ex- haust all its resources in catering to them. This would lead the controller to an unpredictable state which may cause the network to fail. This is a classic DoS attack on the SDN controller. The CFG of this attack is shown in Fig. 6. 2) Switch table flooding: This is a DoS attack targetted towards exhausting the memory resources of the controller. The controller (or NOS) has a switch table which stores the information about all the switches present in the network. In the Floodlight controller, it is observed that modifying the features-reply mes- sage of the SDN OpenFlow protocol with a unique datapacket ID (DPID) causes the controller to add
  • 5. 5 Access to shared memory Detect arrival of media file on disk Modify the file immediately Fig. 2. CFG of image file jacking Launch SS7 attack Identify IMSI number of victim Request reassignment of victim to attack terminal Get subscriber profile details of VLR and HLR databases of SS7 network Complete reassignment of victim's profile Spoof victim's phone; Receive verification SMS Impersonate victim Fig. 3. CFG of SS7 vulnerability exploit Gain access to victim's voicemail account by brute- forcing passcodes Ensure that victim doesn't receive verification call Jam victim's network Switch off victim' phone Engage victim in another call Hypernode Request WhatsApp password reset with victim's phone number Select voice call as verification mechanism Obtain verification code from victim's voicemail Impersonate victim Fig. 4. CFG of voicemail exploit Migrate victim's SIM card to another device Verify victim's WhatsApp account on new device Server sends message back to sender for re- encryption Receive message encrypted with key of new device Fig. 5. CFG of blocked messages in-transit exploit Send flows to switches Switches send lots of packetIn messages Overload control plane Drop legitimate messages Delayed response Fig. 6. CFG of packet-In flooding attack on control plane of SDN a new entry to its switch table. Sending numer- ous maliciously-crafted messages can exhaust the switch table of the controller, causing the controller to disconnect the legitimate switches of the network.
  • 6. 6 The CFG of this attack is shown in Fig. 7. 3) Switch identification spoofing: Due to weak au- thentication of the switches in the SDN protocol, a malicious switch may pose as a legitimate switch and request connection access with the controller. This causes the controller to disconnect the legiti- mate switch and connect with the malicious switch. The CFG of this attack is shown in Fig. 8. 4) Malformed control message injection: OpenFlow messages between the switches and the controller contains a header. An adversary can modify the contents of the header or the message itself to crash the SDN controller. In such a scenario, the controller might disconnect the switch. The CFG of this attack is shown in Fig. 9. 5) System time manipulation: Many SDN applica- tions depend on the system time and other system variables. Modifying the system time may lead to disconnection of the switch which tries to perform time-sensitive operations. The CFG of this attack is shown in Fig. 10. 6) Topology poisoning: In order to achieve superior performance to traditional networks, an overall view of the entire network is available to the con- troller for efficient routing. The overall configura- tion of the network is implemented via host tracking services and link discovery services. These services can be exploited by multiple techniques (like node spoofing)to alter the topology of the network in the controller database. This lead to various attacks like eavesdropping attack and MiTM attack. The CFG of this attack is shown in Fig. 11. 7) Arbitrary system termination: A malicious SDN application can call the system exit function. This will lead to the termination of the entire controller. All applications will be killed and all entries of the switch table will be lost. This shall be devastating for the data plane elements like the switches and hosts. The CFG of this attack is shown in Fig. 12. 8) System resource exhaustion: A malicious SDN ap- plication may utilize all of the resources of the host machine of the controller. This results in a DoS attack on the entire network. The CFG of this attack is shown in Fig. 13. 9) Message delivery obstruction 1: Lack of authoriza- tion of applications allows SDN malwares to alter the list of subscribers to packetIn messages. For example, App1 and App2 are subscribed to packetIn messages to the controller. A malware can alter the subscriber list by remove App2. This prevents App2 from receiving subsequent packetIn messages, thus hindering its proper functionality. The CFG of this attack is shown in 14. 10) Message delivery obstruction 2: Applications run- ning on the SDN controller generally occurs sequen- tially in a chain. A malicious SDN application in the chain can drop a packet that was supposed to be forwarded to an application. This causes a misconfiguration in the network. The CFG of this attack is shown in 15. 11) Service chain jamming: Similar to the previous attack, a malicious application can go into an infinite loop. This causes the subsequent applications in its control flow to be halted and the network comes to a standstill. The CFG of this attack is shown in 16. 12) Unauthorized application management: SDN ap- plications with maximal authorization provides maximal network programmability but introduces new attack vectors. Such applications can cause the termination of other applications. Such operations can cripple the network if a critical application like routing or packet forwarding is terminated. It may also produce various security threats if a security function like IDS or firewall is terminated. The CFG of this attack is shown in 17. 13) Flow rule modification: The primary task of the controller is to generate flow rules. A malicious SDN application can modify the flow rules of a controller, leading to various attacks like MiTM and network failures. The CFG of this attack is shown in 18. 14) Flow table flushing: A malicious SDN application can flush all the flow table entries of the switch. This would cause the switch to issue a packetIn message for every incoming packet, thus leading to a degradation in network performance. The CFG of this attack is shown in 19. 15) Unauthorized network view manipulation: An ad- vantage of the SDN architecture is that it offers an overall view of the network topology. Most SDN controllers lack authorization of applications trying to modify internal storage. A SDN malware can alter the network topology stored in the controller, thus launching a topology poisoning attack. This affects all the other applications that make decisions based on this information. The CFG of this attack is shown in 20. 16) Eavesdropping: The control messages between the controller and the switches are unencrypted on most NOSs. Eavesdropping on the messages of the control channel can reveal information about the network topology. 17) MiTM on the control channel: A MiTM attacker can actively modify the flow rules from ”Forward” to ”Drop” causing the switch to drop desired mes- sages. The CFG of this attack is shown in 21. 18) Flow-rule flooding: A malicious SDN application can continuously generate flow rules till the mem- ory of the switch is filled. Now, the switch cannot accept any new legitimate flow rules, thus failing the network. This is an instance of a DoS attack. The CFG of this attack is shown in 22. 19) Switch firmware abuse: Most OpenFlow switches run custom firmware implementation s with differ- ent capabilities. This spawns a new attack where the a particular flow may be forced to be processed in the software instead of the hardware by specifying the source and destination MAC addresses in the flow. Processing in software is much slower than hardware processing, thus leading to a degradation i network performance. The CFG of this attack is shown in 23. 20) Malformed control message injection: Manipu-
  • 7. 7 Malicious switch Connect legitimately to controller Send Features-reply message with different DPIDs Delayed response Fig. 7. CFG of switch-table flooding attack on control plane of SDN Malicious switch Connection request with DPID of target switch Disconnect target switch Fig. 8. CFG of switch-id spoofing attack on SDN Malicious SDN application Send malformed control message Degrade performance Fig. 9. CFG of various malformed message attacks on SDN Manipulate system time Disconnect legitimate switches Fig. 10. CFG of system time manipulation attack on SDN Spoof packets to have target's MAC and IP address Switch issues packetIn messages to controller HTS table updates Disconnect legitimate switches Fig. 11. CFG of topology poisoning attack on SDN Malicious SDN app Calls system exit function Controller crashes Fig. 12. CFG of arbitrary system termination attack on SDN Malicious SDN app Allocate infinite memory to a process Crashes controller Fig. 13. CFG of system resource exhaustion attack on SDN Malicious SDN app Access list of packetIn subscribers Unsubscribe target app Target application crashes Fig. 14. CFG of a message delivery obstruction attack on SDN Malicious SDN app Drops packet without forwarding No reply received by switch Communication stops Fig. 15. CFG of another message delivery obstruction attack on SDN Malicious SDN app Drops packet without forwarding Communication stops Fig. 16. CFG of service chain jamming attack on SDN lated control messages may be sent to the switches to cause the switch to end up in an unpredictable state, thus rendering it nonoperational. The CFG of this attack is shown in 24. 21) Data leakage: SDN data plane elements are vulner- able to side-channel attacks like timing attacks. Such
  • 8. 8 Malicious SDN app Terminate another application running on controller Fig. 17. CFG of unauthorized application management attack on SDN Malicious SDN app Issue a crafted flow rule Override flow table entry Terminate another application running on controller Fig. 18. CFG of a flow rule modification attack on SDN Malicious SDN app Issue control message to clear all flow table entries Mismatch for every switch entry Degrade performance Fig. 19. CFG of a flow table flush attack on SDN Malicious SDN app Modify critical system variables, tables, network information Legitimate applications crash Fig. 20. CFG of unauthorized network view manipulation attack on SDN Receive another switch's flow rules from controller Modify the flow rules Legitimate applications crash Fig. 21. CFG of MiTM attack on control channel of SDN Malicious SDN application Continuously issue flow rules Fill flow table of switch Degrade performance Fig. 22. CFG of flow rule flooding attack on data plane of SDN Malicious SDN application Issue crafted flow rule Network flow processed in software Degrade performance Fig. 23. CFG of switch firmware abuse attack on SDN Malicious SDN application Send malformed control message Degrade performance Fig. 24. CFG of malformed message injection attack on SDN attacks can lead to fingerprinting attacks to compro- mise privacy. Side-channel attacks can also lead to loss of sensitive information like access control rules in the controller. Combining all the CFGs mentioned above, we construct an attack CFG for SDN as shown in Fig. 25. 4.3 Future Work Using ML on the system level operations has showed signif- icant preliminary success [65, 2]. We plan on extending this methodology to various other platforms and applications. 4.3.1 Representation of attacks We will delve deep into each of the security categories mentioned above (along with other categories) and doc- ument all the possible attacks in each category. Then we decompose each attack into its constituent assembly-level instructions [2]. These assembly-level instructions are repre- sented in the form of a CFG. We merge the CFGs of all the categories to form a unified DAG which encompasses all the known threats in the 5G ecosystem. Some of the detailed threats in 5G are documented in Tables 1, 2. Similar tables can be constructed for RAN, SDN and NFV security.
  • 9. 9 Malicious SDN app Puts control in infinite loop Communication stopped Drops packet without forwarding No reply received by switch Issue control message to clear all flow table entries Mismatch for every entry Degrade performance Disable important apps like packet forwarding Calls system exit function Crash controller Allocate infinite memory to a process Out of memory error Modify internal system variables, tables, network info Crash legitimate apps Access list of packetIn subscribers Unsubscribe target app Crash target app Disable security critical apps like firewall, IDS Issue crafted flow rule Override flow table entry Existing connection disallowed Send malformed control message Fill flow table of switch Controller passes packetIn to apps Network flow processed in software Spoof packets to have target's MAC & IP addr Switch issues packetIn messages to controller HTS table updates All of target's traffic is routed to attacker (MiTM) Alter header of OF packetIn message Disconnect legitimate switches Connect with controller Spoof target switch (DPID) Manipulate system time Announce OF version during handshake Send incorrect OF version in packetIn message Put incorrect protocol type in Ethernet frame Send malformed OF message type Malicious switch Connect legitimately to controller Send "Features_Reply" message with different DPID Connection request with DPID of another legitimate switch Delayed respponse Overload control plane Switches send lots of packetIn messages Send flows to switches Drop legitimate packetIn messages MiTM: Receive another switch's message from controller Send modified message to switch Fig. 25. Attack DAG on SDN 4.3.2 Machine learning on DAG After the construction of the DAG, we characterize each node of the DAG with multiple binary-valued features. We train multiple ML models like SVM, K-nearest neighbors and decision trees with the node features. The ML model is trained to predict new possible branches in the DAG, giving rise to new attacks. Deep learning methods cannot be used in this scenario due to the insufficient data. 4.3.3 Implementation on different frameworks This framework is a general approach which can be exe- cuted on any application. The algorithm remains the same but the DAG changes depending on the features and spec- ifications of the framework. Our immediate focus is to implement this on a secure instant messaging application, like Signal or Whatsapp. We aim to test its effectiveness on different platforms like Android, iOS, Unix, etc. This anal- ysis will help to comprehend the underlying dependencies of application layer security on the network and hardware stacks. 4.3.4 Evaluation of the 5G stack 5G network security is a challenging research problem as its infrastructure is entirely different from its predecessor. Many unknown vulnerabilities potentially exist across mul- tiple levels in the hardware, software and network stacks of
  • 10. 10 TABLE 1 Mobile network security: Evolved Packet Core threats and challenges Category Threat Description Availability Flooding an interface Attackers flood an interface resulting in DoS condition (DNS lookup, etc.) Availability Crashing a network ele- ment Attackers crash a network element by sending malformed packets Confidentiality Eavesdropping Attackers eavesdrop on sensitive data on control and user plane Confidentiality Data Leakage Unauthorized access to sensitive data on the server Integrity Traffic modification Attackers modify information during transit (DNS redirection, etc.) Integrity Data modification Attackers modify data on network element (change the network element configurations) Control Control the network Attackers control the network via protocol or implementation flaw Control Compromise of network element Attackers compromise of network element via management interface Malicious insider Insider attacks Insiders make data modification on network elements, make unauthorized changes to network element configuration, etc. Theft of service Service free of charge Attackers exploits a flaw to use services without being charged TABLE 2 Threats and challenges in IP Multimedia Subsystems Category Threat Description Availability Flooding an interface Distributed DoS (DDoS)/Telephony DoS (TDoS) via mobile end-points) Availability Crashing a network element DoS/TDoS via rogue media streams and malformed packets Confidentiality Eavesdropping Eavesdropping via sniffing the SGi(Gm) interface Confidentiality Data Leakage Unauthorized access to sensitive data on the IMS Home Subscriber Server (HSS) Integrity Traffic modification MiTM attack on SGi(Gm) interface Integrity Data modification Session Initiation Protocol (SIP) messaging impersonation via spoofed SIP messages Control Control the network Spam over Internet Telephony / unsolicited voice calls resulting in Voice-SPAM/TDoS Control Compromise of network ele- ment Compromise of network element via attacks from external IP networks Malicious insider Insider attacks Malicious Insider makes unauthorized changes to IMSHSS configurations Theft of service Service free of charge Theft of Service via SIP messaging impersonation implementation. We aim to discover these weaknesses using our algorithm to make the 5G infrastructure safer and more secure. There are certain classes of attacks that can be easily evaded in 5G due to the separation of the data plane and the control plane. Multiple attack and defence measures are expected to be accelerated in the 5G ecosystem. We expect to get novel insights into the overall security framework of 5G by probing into these intricacies with ML. 4.3.5 Reinforcement Learning for security Reinforcement learning (RL) [66] can be utilized to provide real-time defence solutions. Similarly, it can also be utilized to come up with real-time attack vectors. We aim to use RL to study the implications of real-time attack scenarios in the 5G framework. A defensive or attacking agent can be deployed in a real-world scenario to learn the inconsisten- cies in the operations. Multi-agent RL may also prove to be useful in such scenarios. Counterfactual regret (CFR) [67] minimization games have shown better results than RL in certain classes of games (where the environment is not fully observable to the player) like poker. We would like to investigate the potential impact of CFR minimization games in 5G security. 5 EVALUATION PLAN 5.1 Year 1 • Develop a unified framework for analyzing the inter- connected security vulnerabilities between the hard- ware, software (microcode, kernel, OS and applica- tion layers) and network (including, cryptographic protocols, virtualization layers, and others) stacks with 5G network architectures. • Study the dependencies of application layer security on the network layer security in the 5G framework. • Analyze the security of cryptographic protocols and primitives proposed as part of the 5G framework. • Analyze the security of a mobile application (which is secure at the application layer) running on 5G. This will give a deeper insight into the applicability and usability of the developed tool. • Utilize deep learning techniques to analyze graphs representing various attacks and threat models. Re- cent graphical deep learning analysis tools like Graph2Vec [68] enables us to use deep learning to analyze graphs. This has a potential of generating new methods of analyzing threat models. 5.2 Year 2 • Utilize the developed framework to analyze the security of multiple 5G-specific applications like autonomous vehicles, Internet-of-Things and smart healthcare. • Extend the existing framework to other broader areas of security like application security, OS security, etc.
  • 11. 11 5.3 Year 3 • Integrate state-of-the-art methods of ML like RL to deploy real-time vulnerability detection systems. • With the advent of 5G, the amount of data being transferred will increase manifold. We wish to study the implications of the magnanimous amount of data transfer on user privacy. REFERENCES [1] R. Vannithamby and S. Talwar, Towards 5G: Applications, requirements and candidate technologies. John Wiley & Sons, 2017. [2] T. Saha, N. Aaraj, N. Ajjarapu, and N. K. Jha, “Sharks: Smart hacking approaches for risk scanning in internet- of-things and cyber-physical systems based on machine learning,” IEEE Transactions on Emerging Topics in Com- puting, 2021. [3] S. Chen, J. Hu, Y. Shi, Y. Peng, J. Fang, R. Zhao, and L. Zhao, “Vehicle-to-everything (V2X) services sup- ported by LTE-based systems and 5G,” IEEE Commu- nications Standards Magazine, vol. 1, no. 2, pp. 70–76, 2017. [4] R. Molina-Masegosa and J. Gozalvez, “LTE-V for sidelink 5G V2X vehicular communications: A new 5G technology for short-range vehicle-to-everything communications,” IEEE Vehicular Technology Magazine, vol. 12, no. 4, pp. 30–39, 2017. [5] C. X. Mavromoustakis, G. Mastorakis, and J. M. Batalla, Internet of Things (IoT) in 5G mobile technologies. Springer, 2016, vol. 8. [6] M. Erol-Kantarci and S. Sukhmani, “Caching and com- puting at the edge for mobile augmented reality and virtual reality (AR/VR) in 5G,” in Ad Hoc Networks. Springer, 2018, pp. 169–177. [7] K. E. Skouby and P. Lynggaard, “Smart home and smart city solutions enabled by 5G, IoT, AAI and CoT services,” in 2014 International Conference on Contempo- rary Computing and Informatics (IC3I). IEEE, 2014, pp. 874–878. [8] J. Santos, T. Wauters, B. Volckaert, and F. De Turck, “Fog computing: Enabling the management and or- chestration of smart city applications in 5G networks,” Entropy, vol. 20, no. 1, p. 4, 2018. [9] J. Brown, T. Saha, and N. K. Jha, “Gravitas: Graphical reticulated attack vectors for internet-of-things aggre- gate security,” IEEE Transactions on Emerging Topics in Computing, 2021. [10] M. Chen, J. Yang, J. Zhou, Y. Hao, J. Zhang, and C.-H. Youn, “5G-smart diabetes: Toward personalized diabetes diagnosis with healthcare big data clouds,” IEEE Communications Magazine, vol. 56, no. 4, pp. 16– 23, 2018. [11] M. Chen, J. Yang, Y. Hao, S. Mao, and K. Hwang, “A 5G cognitive system for healthcare,” Big Data and Cognitive Computing, vol. 1, no. 1, p. 2, 2017. [12] S. Latif, J. Qadir, S. Farooq, and M. Imran, “How 5G wireless (and concomitant technologies) will revolu- tionize healthcare?” Future Internet, vol. 9, no. 4, p. 93, 2017. [13] R. Chávez-Santiago, M. Szydełko, A. Kliks, F. Foukalas, Y. Haddad, K. E. Nolan, M. Y. Kelly, M. T. Masonta, and I. Balasingham, “5G: The convergence of wireless com- munications,” Wireless Personal Communications, vol. 83, no. 3, pp. 1617–1642, 2015. [14] I. Ahmad, T. Kumar, M. Liyanage, J. Okwuibe, M. Ylianttila, and A. Gurtov, “5g security: Analysis of threats and solutions,” in 2017 IEEE Conference on Standards for Communications and Networking (CSCN). IEEE, 2017, pp. 193–199. [15] M. A. Ferrag, L. Maglaras, A. Argyriou, D. Kosmanos, and H. Janicke, “Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes,” Journal of Network and Computer Applications, vol. 101, pp. 55–82, 2018. [16] C. Cremers and M. Dehnel-Wild, “Component-based formal analysis of 5G-AKA: Channel Assumptions and Session Confusion,” 2019. [17] B. Bangerter, S. Talwar, R. Arefi, and K. Stewart, “Net- works and devices for the 5G era,” IEEE Communica- tions Magazine, vol. 52, no. 2, pp. 90–96, 2014. [18] J. Ni, X. Lin, and X. S. Shen, “Efficient and se- cure service-oriented authentication supporting net- work slicing for 5G-enabled IoT,” IEEE Journal on Se- lected Areas in Communications, vol. 36, no. 3, pp. 644– 657, 2018. [19] E. Dubrova, M. Näslund, and G. Selander, “CRC-based message authentication for 5G mobile technology,” in 2015 IEEE Trustcom/BigDataSE/ISPA, vol. 1. IEEE, 2015, pp. 1186–1191. [20] H. Zhang, Y. Cole, L. Ge, S. Wei, W. Yu, C. Lu, G. Chen, D. Shen, E. Blasch, and K. D. Pham, “ScanMe mobile: a cloud-based android malware analysis service,” ACM SIGAPP Applied Computing Review, vol. 16, no. 1, pp. 36–49, 2016. [21] W. Yu, G. Xu, Z. Chen, and P. Moulema, “A cloud com- puting based architecture for cyber security situation awareness,” in 2013 IEEE Conference on Communications and Network Security (CNS). IEEE, 2013, pp. 488–492. [22] Z. Chen, G. Xu, V. Mahalingam, L. Ge, J. Nguyen, W. Yu, and C. Lu, “A cloud computing based network monitoring and threat detection system for critical in- frastructures,” Big Data Research, vol. 3, pp. 10–23, 2016. [23] “Security challenges in next gen- eration 5G mobile networks,” https://www.informationsecuritybuzz.com/articles/security- challenges-next-generation-5G-mobile-networks/. [24] S. Chen and J. Zhao, “The requirements, challenges, and technologies for 5G of terrestrial mobile telecom- munication,” IEEE communications magazine, vol. 52, no. 5, pp. 36–43, 2014. [25] F. Boccardi, R. W. Heath, A. Lozano, T. L. Marzetta, and P. Popovski, “Five disruptive technology directions for 5G,” IEEE Communications Magazine, vol. 52, no. 2, pp. 74–80, 2014. [26] C.-X. Wang, F. Haider, X. Gao, X.-H. You, Y. Yang, D. Yuan, H. M. Aggoune, H. Haas, S. Fletcher, and E. Hepsaydir, “Cellular architecture and key technolo- gies for 5G wireless communication networks,” IEEE communications magazine, vol. 52, no. 2, pp. 122–130, 2014.
  • 12. 12 [27] S. Kekki, W. Featherstone, Y. Fang, P. Kuure, A. Li, A. Ranjan, D. Purkayastha, F. Jiangping, D. Frydman, G. Verin et al., “MEC in 5G networks,” ETSI white paper, vol. 28, pp. 1–28, 2018. [28] Y. C. Hu, M. Patel, D. Sabella, N. Sprecher, and V. Young, “Mobile edge computing—a key technology towards 5G,” ETSI white paper, vol. 11, no. 11, pp. 1–16, 2015. [29] I. Parvez, A. Rahmati, I. Guvenc, A. I. Sarwat, and H. Dai, “A survey on low latency towards 5G: Ran, core network and caching solutions,” IEEE Communications Surveys & Tutorials, vol. 20, no. 4, pp. 3098–3130, 2018. [30] B. Blanco, J. O. Fajardo, I. Giannoulakis, E. Kafetzakis, S. Peng, J. Pérez-Romero, I. Trajkovska, P. S. Kho- dashenas, L. Goratti, M. Paolino et al., “Technology pillars in the architecture of future 5G mobile networks: NFV, MEC and SDN,” Computer Standards & Interfaces, vol. 54, pp. 216–228, 2017. [31] R. Trivisonno, R. Guerzoni, I. Vaishnavi, and D. Sol- dani, “SDN-based 5G mobile networks: architecture, functions, procedures and backward compatibility,” Transactions on Emerging Telecommunications Technolo- gies, vol. 26, no. 1, pp. 82–92, 2015. [32] H.-H. Cho, C.-F. Lai, T. K. Shih, and H.-C. Chao, “Inte- gration of SDR and SDN for 5G,” IEEE Access, vol. 2, pp. 1196–1204, 2014. [33] J. Ordonez-Lucena, P. Ameigeiras, D. Lopez, J. J. Ramos-Munoz, J. Lorca, and J. Folgueira, “Network slicing for 5G with SDN/NFV: Concepts, architec- tures, and challenges,” IEEE Communications Magazine, vol. 55, no. 5, pp. 80–87, 2017. [34] M. Geller and P. Nair, “5G security innovation with cisco,” Whitepaper Cisco Public, pp. 1–29, 2018. [35] Z. Yan, P. Zhang, and A. V. Vasilakos, “A security and trust framework for virtualized networks and software- defined networking,” Security and communication net- works, vol. 9, no. 16, pp. 3059–3069, 2016. [36] V. G. Vassilakis, H. Mouratidis, E. Panaousis, I. D. Moscholios, and M. D. Logothetis, “Security require- ments modelling for virtualized 5G small cell net- works,” in 2017 24th International Conference on Telecom- munications (ICT). IEEE, 2017, pp. 1–5. [37] A. Hussein, I. H. Elhajj, A. Chehab, and A. Kayssi, “SDN VANETs in 5G: An architecture for resilient secu- rity services,” in 2017 Fourth International Conference on Software Defined Systems (SDS). IEEE, 2017, pp. 67–74. [38] E. Dubrova and M. Hell, “Espresso: A stream cipher for 5g wireless communication systems,” Cryptography and Communications, Mar 2017. [39] T. Saha and V. Sehwag, “Tv-puf: A fast lightweight aging-resistant threshold voltage puf,” Cryptology ePrint Archive, 2016. [40] V. Sehwag and T. Saha, “Tv-puf: a fast lightweight analog physical unclonable function,” in 2016 IEEE In- ternational Symposium on Nanoelectronic and Information Systems (iNIS). IEEE, 2016, pp. 182–186. [41] X. Zhang, A. Kunz, and S. Schröder, “Overview of 5G security in 3gpp,” in 2017 IEEE Conference on Standards for Communications and Networking (CSCN). IEEE, 2017, pp. 181–186. [42] K. Fan, Y. Gong, C. Liang, H. Li, and Y. Yang, “Lightweight and ultralightweight RFID mutual au- thentication protocol with cache in the reader for IoT in 5G,” Security and Communication Networks, vol. 9, no. 16, pp. 3095–3104, 2016. [43] D. Wubben, P. Rost, J. S. Bartelt, M. Lalam, V. Savin, M. Gorgoglione, A. Dekorsy, and G. Fettweis, “Benefits and impact of cloud computing on 5G signal process- ing: Flexible centralization through cloud-RAN,” IEEE signal processing magazine, vol. 31, no. 6, pp. 35–44, 2014. [44] M. C. Parker, G. Koczian, F. Adeyemi-Ejeye, T. Quinlan, S. D. Walker, A. Legarrea, M. S. Siddiqui, E. Escalona, S. Spirou, D. Kritharidis et al., “Charisma: Converged heterogeneous advanced 5G cloud-RAN architecture for intelligent and secure media access,” in 2016 Eu- ropean Conference on Networks and Communications (Eu- CNC). IEEE, 2016, pp. 240–244. [45] P. Demestichas, A. Georgakopoulos, D. Karvounas, K. Tsagkaris, V. Stavroulaki, J. Lu, C. Xiong, and J. Yao, “5G on the horizon: Key challenges for the radio-access network,” IEEE vehicular technology magazine, vol. 8, no. 3, pp. 47–53, 2013. [46] X. Duan and X. Wang, “Authentication handover and privacy protection in 5G hetnets using software- defined networking,” IEEE Communications Magazine, vol. 53, no. 4, pp. 28–35, 2015. [47] ——, “Fast authentication in 5G hetnet through sdn enabled weighted secure-context-information transfer,” in 2016 IEEE International Conference on Communications (ICC). IEEE, 2016, pp. 1–6. [48] M. G. Pérez, A. H. Celdrán, F. Ippoliti, P. G. Giardina, G. Bernini, R. M. Alaez, E. Chirivella-Perez, F. J. G. Clemente, G. M. Pérez, E. Kraja et al., “Dynamic recon- figuration in 5G mobile networks to proactively detect and mitigate botnets,” IEEE Internet Computing, vol. 21, no. 5, pp. 28–36, 2017. [49] M. S. Siddiqui, E. Escalona, E. Trouva, M.-A. Kourtis, D. Kritharidis, K. Katsaros, S. Spirou, C. Canales, and M. Lorenzo, “Policy based virtualised security archi- tecture for SDN/NFV enabled 5G access networks,” in 2016 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN). IEEE, 2016, pp. 44–49. [50] K. Norrman, M. Näslund, and E. Dubrova, “Protecting imsi and user privacy in 5G networks,” in Proceedings of the 9th EAI International Conference on Mobile Multi- media Communications. ICST (Institute for Computer Sciences, Social-Informatics and . . . , 2016, pp. 159–166. [51] D. Basin, J. Dreier, L. Hirschi, S. Radomirovic, R. Sasse, and V. Stettler, “A formal analysis of 5G authentica- tion,” in Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2018, pp. 1383–1396. [52] S. Lal, T. Taleb, and A. Dutta, “NFV: Security threats and best practices,” IEEE Communications Magazine, vol. 55, no. 8, pp. 211–217, 2017. [53] W. Yang and C. Fung, “A survey on security in network functions virtualization,” in 2016 IEEE NetSoft Confer- ence and Workshops (NetSoft). IEEE, 2016, pp. 15–19. [54] D. V. Bernardo and B. B. Chua, “Introduction and analysis of SDN and NFV security architecture (SN- SECA),” in 2015 IEEE 29th International Conference
  • 13. 13 on Advanced Information Networking and Applications. IEEE, 2015, pp. 796–801. [55] M.-W. Shih, M. Kumar, T. Kim, and A. Gavrilovska, “S- NFV: Securing NFV states by using sgx,” in Proceedings of the 2016 ACM International Workshop on Security in Software Defined Networks & Network Function Virtual- ization. ACM, 2016, pp. 45–48. [56] A. Aljuhani and T. Alharbi, “Virtualized network func- tions security attacks and vulnerabilities,” in 2017 IEEE 7th Annual Computing and Communication Workshop and Conference (CCWC). IEEE, 2017, pp. 1–4. [57] T. Saha et al., “Machine learning-based efficient and generalizable cybersecurity frameworks,” 2022. [58] T. Saha, N. Aaraj, and N. K. Jha, “Machine learning assisted security analysis of 5g-network-connected sys- tems,” IEEE Transactions on Emerging Topics in Comput- ing, 2022. [59] T. Carpay and P. Lontorfos, “Whatsapp end-to-end encryption: Are our messages private?” 2019. [60] “A Linux Foundation Collaborative Project. OpenDay- light SDN Controller,” https://www.opendaylight.org. [61] “FloodLight Open SDN Controller,” https: //floodlight.openflowhub.org/. [62] NOX Repo, “The POX Controller.” https://github. com/noxrepo/pox. [63] N. McKeown, T. Anderson, H. Balakrishnan, G. Parulkar, L. Peterson, J. Rexford, S. Shenker, and J. Turner, “Openflow: enabling innovation in campus networks,” ACM SIGCOMM Computer Communication Review, vol. 38, no. 2, pp. 69–74, 2008. [64] C. Yoon, S. Lee, H. Kang, T. Park, S. Shin, V. Yeg- neswaran, P. Porras, and G. Gu, “Flow wars: Sys- temizing the attack surface and defenses in software- defined networks,” IEEE/ACM Transactions on Network- ing (TON), vol. 25, no. 6, pp. 3514–3530, 2017. [65] T. Saha, N. Aaraj, and N. K. Jha, “System and method for security in internet-of-things and cyber-physical systems based on machine learning,” Jun. 23 2022, uS Patent App. 17/603,453. [66] R. S. Sutton, A. G. Barto et al., Introduction to Reinforce- ment Learning. MIT press Cambridge, 1998, vol. 2. [67] M. Zinkevich, M. Johanson, M. Bowling, and C. Pic- cione, “Regret minimization in games with incomplete information,” in Advances in neural information process- ing systems, 2008, pp. 1729–1736. [68] A. Narayanan, M. Chandramohan, R. Venkatesan, L. Chen, Y. Liu, and S. Jaiswal, “graph2vec: Learning distributed representations of graphs,” 2017.