1. A Formal Approach for Complex Attacks Generation based on Mutation of 5G Network Traffic
- Author
-
Zujany Salazar, Fatiha Zaidi, Wissam Mallouli, Ana Cavalli, Huu Nguyen, Edgardo Montes De Oca, Laboratoire Méthodes Formelles (LMF), Institut National de Recherche en Informatique et en Automatique (Inria)-CentraleSupélec-Université Paris-Saclay-Centre National de la Recherche Scientifique (CNRS)-Ecole Normale Supérieure Paris-Saclay (ENS Paris Saclay), Montimage [Paris], University of Fribourg, Switzerland, University of Twente, Netherlands, Wroclaw University of Economics and Business, Poland and Macquarie University, Sydney, Australia, and SCITEPRESS Digital Library
- Subjects
Network Traffic ,Formal Approach ,Fuzzing Techniques ,[INFO]Computer Science [cs] ,Mutation Technique ,5G networks - Abstract
International audience; We present a formal approach based on mutation techniques for the modelling of cybersecurity attacks and its application to 5G networks. We introduce formal definitions of the main concepts of network protocols, mutation operators, flow of network packets and network traffic. We design a formal approach based on different mutation operators that allows to design models that can be assimilated with known and unknown attacks. This approach has been implemented in our open source 5G network traffic fuzzer, 5Greplay, and has been applied to two use cases that are representative of attacks against 5G networks.
- Published
- 2022