Anomaly Detection for Mitigating xApp and E2 Interface Threats in O-RAN Near-RT RIC

被引:0
作者
Hung, Cheng-Feng [1 ]
Tseng, Chi-Heng [1 ]
Cheng, Shin-Ming [1 ]
机构
[1] Natl Taiwan Univ Sci & Technol, Dept Comp Sci & Informat Engn, Taipei City 106335, Taiwan
来源
IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY | 2025年 / 6卷
关键词
Open RAN; Security; Detectors; IP networks; Real-time systems; 5G mobile communication; Monitoring; Resource management; Optimization; Traffic control; Anomaly detection; E2; node; interface; O-RAN security; xApp;
D O I
10.1109/OJCOMS.2025.3546760
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
As 5G networks advance, the Open Radio Access Network (O-RAN) is crucial in enabling openness and fostering collaboration across the telecom industry. O-RAN enhances flexibility, scalability, and interoperability through open interfaces, reducing dependence on a single vendor and promoting interoperability among vendors and solutions. The Near-Real-Time Radio Intelligent Controller (Near-RT RIC) is crucial for optimizing network resources and improving user experience. However, the openness of O-RAN also introduces security challenges, particularly from third-party developed xApps and E2 nodes that may exploit vulnerabilities to launch attacks. This paper proposes an anomaly traffic detector to protect the Near-RT RIC from threats on the E2 interface. The anomaly traffic detector verifies the legality of signaling through an internal state machine analysis module and checks packet fields through a conformance check module while monitoring network traffic in real time to detect and mitigate Denial of Service attacks. Additionally, we designed a fuzzer to simulate random attacks, testing the capability of the anomaly traffic detector. The anomaly traffic detector not only successfully passes the test cases highlighted in the O-RAN Security Test Specifications, effectively detecting unauthorized traffic and signaling, but also identifies real-world vulnerability exploits, including CVE-2023-40997, CVE-2023-40998, CVE-2023-41627, and CVE-2023-41628, thereby significantly enhancing the security of the Near-RT RIC.
引用
收藏
页码:1682 / 1694
页数:13
相关论文
共 22 条
  • [1] End-to-End O-RAN Security Architecture, Threat Surface, Coverage, and the Case of the Open Fronthaul
    Abdalla A.S.
    Marojevic V.
    [J]. IEEE Communications Standards Magazine, 2024, 8 (01): : 36 - 43
  • [2] Toward Next Generation Open Radio Access Networks: What O-RAN Can and Cannot Do!
    Abdalla, Aly S. S.
    Upadhyaya, Pratheek S. S.
    Shah, Vijay K. K.
    Marojevic, Vuk
    [J]. IEEE NETWORK, 2022, 36 (06): : 206 - 213
  • [3] Alam K, 2024, Arxiv, DOI arXiv:2405.03555
  • [4] Atalay T. O., 2023, P IEEE INFOCOM, P1, DOI [10.1109/INFOCOM53939.2023.10228961, DOI 10.1109/INFOCOM53939.2023.10228961]
  • [5] Blockchain Meets O-RAN: A Decentralized Zero-Trust Framework for Secure and Resilient O-RAN in 6G and beyond
    El Houda, Zakaria Abou
    Moudoud, Hajar
    Khoukhi, Lyes
    [J]. IEEE INFOCOM 2024-IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS, INFOCOM WKSHPS 2024, 2024,
  • [6] Federated Deep Reinforcement Learning for Efficient Jamming Attack Mitigation in O-RAN
    El Houda, Zakaria Abou
    Moudoud, Hajar
    Brik, Bouziane
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2024, 73 (07) : 9334 - 9343
  • [7] Groen J, 2023, Arxiv, DOI arXiv:2304.11125
  • [8] Security Threats to xApps Access Control and E2 Interface in O-RAN
    Hung, Cheng-Feng
    Chen, You-Run
    Tseng, Chi-Heng
    Cheng, Shin-Ming
    [J]. IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY, 2024, 5 : 1197 - 1203
  • [9] Open RAN security: Challenges and opportunities
    Liyanage, Madhusanka
    Braeken, An
    Shahabuddin, Shahriar
    Ranaweera, Pasika
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2023, 214
  • [10] Security of Open Radio Access Networks
    Mimran, Dudu
    Bitton, Ron
    Kfir, Yehonatan
    Klevansky, Eitan
    Brodt, Oleg
    Lehmann, Heiko
    Elovici, Yuval
    Shabtai, Asaf
    [J]. COMPUTERS & SECURITY, 2022, 122