The core network architecture of telecommunication systems has undergone a paradigm shift in the fifth-generation (5G)networks. 5G networks have transitioned to software-defined infrastructures, thereby reducing their dependence on hardware-based network functions. New technologies, like network function virtualization and software-defined networking, have been incorporated in the 5G core network (5GCN) architecture to enable this transition. This has resulted in significant improvements in efficiency, performance, and robustness of the networks. However, this has also made the core network more vulnerable, as software systems are generally easier to compromise than hardware systems. In this article, we present a comprehensive security analysis framework for the 5GCN. The novelty of this approach lies in the creation and analysis of attack graphs of the software-defined and virtualized 5GCN through machine learning. This analysis points to 119 novel possible exploits in the 5GCN. We demonstrate that these possible exploits of 5GCN vulnerabilities generate five novel attacks on the 5G Authentication and Key Agreement protocol. We combine the attacks at the network, protocol, and the application layers to generate complex attack vectors. In a case study, we use these attack vectors to find four novel security loopholes in WhatsApp running on a 5G network.
翻译:电信系统的核心网络结构在第五代(5G)网络中发生了范式转变。 5G网络已经向软件定义的基础设施转变,从而减少了对硬件基网络功能的依赖。新技术,如网络功能虚拟化和软件定义联网等新技术已经纳入5G核心网络(5GCN)结构,以便实现这一过渡。这大大改善了网络的效率、性能和稳健性。然而,这也使核心网络变得更加脆弱,因为软件系统一般比硬件系统更容易妥协。在本条中,我们为5GCN提出了一个全面的安全分析框架。这一方法的新颖之处在于通过机器学习创建和分析软件定义和虚拟化的5GCN攻击图。这一分析指出,5GCN可能利用5G网络的这些5GCN脆弱性导致对5G认证和关键协议协议协议的五种新攻击。我们把网络上的攻击、协议和应用程序层结合起来,以产生复杂的攻击矢量。在一项案例研究中,我们使用这些攻击矢量网络中的四种新的安全漏洞。