Threatening the 5G core via PFCP DoS attacks: the case of blocking UAV communications

被引:17
作者
Amponis, George [1 ,2 ]
Radoglou-Grammatikis, Panagiotis [1 ,3 ]
Lagkas, Thomas [2 ]
Mallouli, Wissam [4 ]
Cavalli, Ana [4 ]
Klonidis, Dimitris [5 ]
Markakis, Evangelos [6 ]
Sarigiannidis, Panagiotis [3 ]
机构
[1] K3Y Ltd, Sofia 1612, Bulgaria
[2] Int Hellen Univ, Dept Comp Sci, Kavala Campus, Kavala 65404, Greece
[3] Univ Western Macedonia, Dept Elect & Comp Engn, Kozani 50100, Greece
[4] MONTIMAGE, F-75013 Paris, France
[5] UBITECH Ltd, Athens 15231, Greece
[6] Hellen Mediterranean Univ, Iraklion 71004, Greece
基金
欧盟地平线“2020”;
关键词
Number:; 952672; Acronym:; H2020; Sponsor: Horizon 2020 Framework Programme;
D O I
10.1186/s13638-022-02204-5
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The modern communications landscape requires reliable, high-speed, high-throughput and secure links and sessions between user equipment instances and the data network. The 5G core implements the newly defined 3GPP network architecture enabling faster connectivity, low latency, higher bit rates and network reliability. The full potential of this set of networks will support a set of critical Internet of things (IoT) and industrial use cases. Nevertheless, several components and interfaces of the next-generation radio access network (NG-RAN) have proven to be vulnerable to attacks that can potentially obstruct the network's capability to provide reliable end-to-end communication services. Various inherent security flaws and protocol-specific weaknesses have also been identified within the 5G core itself. However, little to no research has gone into testing and exposing said core-related weaknesses, contrary to those concerning the NG-RAN. In this paper, we investigate, describe, develop, implement and finally test a set of attacks on the Packet Forwarding Control Protocol (PFCP) inside the 5G core. We find that, by transmitting unauthorised session control packets, we were able to disrupt established 5G tunnels without disrupting subscribers' connectivity to the NG-RAN, thus hindering the detection of said attacks. We evaluate the identified PFCP attacks in a drone-based scenario involving 5G tunnelling between two swarms.
引用
收藏
页数:27
相关论文
共 17 条
[1]  
Ahmad I, 2017, 2017 IEEE CONFERENCE ON STANDARDS FOR COMMUNICATIONS AND NETWORKING (CSCN), P193, DOI 10.1109/CSCN.2017.8088621
[2]   Drones in B5G/6G Networks as Flying Base Stations [J].
Amponis, Georgios ;
Lagkas, Thomas ;
Zevgara, Maria ;
Katsikas, Georgios ;
Xirofotos, Thanos ;
Moscholios, Ioannis ;
Sarigiannidis, Panagiotis .
DRONES, 2022, 6 (02)
[3]  
[Anonymous], OPEN5GS OPEN5GS DBCT
[4]   Connecting Remote eNodeB with Containerized 5G C-RANs in OpenStack Cloud [J].
Dzogovic, Bruno ;
Santos, Bernardo ;
Van Thuan Do ;
Feng, Boning ;
Jacot, Niels ;
Thanh van Do .
2019 6TH IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (IEEE CSCLOUD 2019) / 2019 5TH IEEE INTERNATIONAL CONFERENCE ON EDGE COMPUTING AND SCALABLE CLOUD (IEEE EDGECOM 2019), 2019, :14-19
[5]  
Gupta S, 2018, 2018 FIRST INTERNATIONAL CONFERENCE ON SECURE CYBER COMPUTING AND COMMUNICATIONS (ICSCCC 2018), P369, DOI 10.1109/ICSCCC.2018.8703355
[6]  
Herzberg A, 2009, STEALTH MITM DOS AT
[7]   Stealth attacks on ad-hoc wireless networks [J].
Jakobsson, M ;
Wetzel, S ;
Yener, B .
2003 IEEE 58TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS1-5, PROCEEDINGS, 2003, :2103-2111
[8]   5G Core Security in Edge Networks: A Vulnerability Assessment Approach [J].
Kholidy, Hisham A. ;
Karam, Andrew ;
Sidoran, James L. ;
Rahman, Mohammad A. .
26TH IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (IEEE ISCC 2021), 2021,
[9]   Drone-Base-Station for Next-Generation Internet-of-Things: A Comparison of Swarm Intelligence Approaches [J].
Pliatsios, Dimitrios ;
Goudos, Sotirios K. ;
Lagkas, Thomas ;
Argyriou, Vasileios ;
Boulogeorgos, Alexandros-Apostolos A. ;
Sarigiannidis, Panagiotis .
IEEE OPEN JOURNAL OF ANTENNAS AND PROPAGATION, 2022, 3 :32-47
[10]  
Positive Technologies, 5G STAND COR SEC RES