5G RRC Protocol and Stack Vulnerabilities Detection via Listen-and-Learn

被引:18
作者
Yang, Jingda [1 ]
Wang, Ying [1 ]
Tran, Tuyen X. [2 ]
Pan, Yanjun [3 ]
机构
[1] Stevens Inst Technol, Hoboken, NJ 07030 USA
[2] AT&T Labs Res, Bedminster, NJ USA
[3] Univ Arkansas, Fayetteville, AR 72701 USA
来源
2023 IEEE 20TH CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE, CCNC | 2023年
关键词
Fuzz Testing; Vulnerabilities Detection; RRC Protocols; 5G Stack; LSTM;
D O I
10.1109/CCNC51644.2023.10059624
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The paper proposes a protocol-independent Listen-and-Learn (LAL) based fuzzing system, which provides a systematic solution for vulnerabilities and unintended emergent behavior detection with sufficient automation and scalability, for 5G and nextG protocols and large-scale open programmable stacks. We use the relay model as our base and capture and interpret packets without prior knowledge of protocols implementation. Radio Resource Control (RRC) is selected proof of concept of the proposed system. Our fuzzing architecture incorporates two abstractions of different dimension fuzzing-command-level and bit-level, and the proposed LAL fuzzing framework focuses on command-level fuzzing covering potential attacks by autonomously generating a comprehensive fuzzing case set. Our analysis of 39 RRC states successfully illustrates 129 vulnerabilities resulting in RRC connection establishment failure from 205 command-level fuzzing cases and reveals insights into exploitable vulnerabilities in each channel of RRC procedure. Furthermore, to assess risks and prevent potential vulnerability, we use the Long Short-Term Memory (LSTM) based model to perform a deep analysis of transaction states in sequenced commands. With the LSTM based model, we efficiently predict more than 95% connection failure at an average duration of 0.059 seconds after the fuzzing attack and provide sufficient time for proactive defense before RRC connection completion or failure, with an average of 3.49 seconds. The rapid vulnerability prediction capability also enables proactive defenses to potential attacks. The proposed fuzzing system offers sufficient automation, scalability, and usability to improve 5G security assurance, and could be used for existing and newly released protocols and stacks validation and real-time system vulnerability detection and prediction.
引用
收藏
页数:6
相关论文
共 27 条
[1]  
Han X, 2012, PROCEEDINGS OF 2012 2ND INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT 2012), P1018, DOI 10.1109/ICCSNT.2012.6526099
[2]   5GReasoner: A Property-Directed Security and Privacy Analysis Framework for 5G Cellular Network Protocol [J].
Hussain, Syed Rafiul ;
Echeverria, Mitziu ;
Karim, Imtiaz ;
Chowdhury, Omar ;
Bertino, Elisa .
PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, :669-684
[3]   5GReasoner: A Property-Directed Security and Privacy Analysis Framework for 5G Cellular Network Protocol [J].
Hussain, Syed Rafiul ;
Echeverria, Mitziu ;
Karim, Imtiaz ;
Chowdhury, Omar ;
Bertino, Elisa .
PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, :669-684
[4]   LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE [J].
Hussain, Syed Rafiul ;
Chowdhury, Omar ;
Mehnaz, Shagufta ;
Bertino, Elisa .
25TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2018), 2018,
[5]   Security and Protocol Exploit Analysis of the 5G Specifications [J].
Jover, Roger Piqueras ;
Marojevic, Vuk .
IEEE ACCESS, 2019, 7 :24956-24963
[6]  
Lichtman M, 2018, IEEE INT CONF COMM
[7]   Semi-valid Fuzz Testing Case Generation for Stateful Network Protocol [J].
Ma, Rui ;
Ren, Shuaimin ;
Ma, Ke ;
Hu, Changzhen ;
Xue, Jingfeng .
TSINGHUA SCIENCE AND TECHNOLOGY, 2017, 22 (05) :458-468
[8]  
Maier M. W., 1998, Systems Engineering, V1, P267, DOI [10.1002/(SICI)1520-6858(1998)1:4<267::AID-SYS3>3.0.CO
[9]  
2-D, 10.1002/(SICI)1520-6858(1998)1:4lt
[10]  
267::AID-SYS3gt