1. A Network Traffic Mutation Based Ontology, and Its Application to 5G Networks
- Author
-
Zujany Salazar, Fatiha Zaidi, Huu-Nghia Nguyen, Wissam Mallouli, Ana Rosa Cavalli, and Edgardo Montes De Oca
- Subjects
Ontology ,mutation technique ,network traffic ,5G networks ,fuzzing techniques ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
This paper presents an ontology based on mutation techniques for the modelling of cybersecurity attacks and its application to 5G networks. Main concepts of network protocols, mutation operators, flow of network packets and network traffic are introduced. An ontology is designed based on different mutation operators that allow to design models that can be assimilated with known and unknown attacks. This approach has been implemented in our open source 5G network traffic fuzzer, 5Greplay, and has been applied to three use cases that are representative of attacks against 5G networks: NAS Replay attack, Denial of Service by Sending Malformed NGAP Packets and 5G encapsulation of IoT traffic.
- Published
- 2023
- Full Text
- View/download PDF