| Literature DB >> 35009551 |
Abstract
Overall, 5G networks are expected to become the backbone of many critical IT applications. With 5G, new tech advancements and innovation are expected; 5G currently operates on software-defined networking. This enables 5G to implement network slicing to meet the unique requirements of every application. As a result, 5G is more flexible and scalable than 4G LTE and previous generations. To avoid the growing risks of hacking, 5G cybersecurity needs some significant improvements. Some security concerns involve the network itself, while others focus on the devices connected to 5G. Both aspects present a risk to consumers, governments, and businesses alike. There is currently no real-time vulnerability assessment framework that specifically addresses 5G Edge networks, with regard to their real-time scalability and dynamic nature. This paper studies the vulnerability assessment in the 5G networks and develops an optimized dynamic method that integrates the Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS) with the hexagonal fuzzy numbers to accurately analyze the vulnerabilities in 5G networks. The proposed method considers both the vulnerability and 5G network dynamic factors such as latency and accessibility to find the potential attack graph paths where the attack might propagate in the network and quantifies the attack cost and security level of the network. We test and validate the proposed method using our 5G testbed and we compare the optimized method to the classical TOPSIS and the known vulnerability scanner tool, Nessus.Entities:
Keywords: 5G Edge security; 5G security testbed; attack graphs; decision-making technique; dynamic vulnerability analysis; hexagonal fuzzy number
Mesh:
Year: 2021 PMID: 35009551 PMCID: PMC8747503 DOI: 10.3390/s22010009
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1The HFN for x ∈ [0, 1].
Figure 2Attack surfaces of the 5G Network.
Figure 3Attack surfaces enabled by the integration of MEC.
Figure 4Our 5G Edge security testbed and the ASMF Architecture.
Testbed resource capabilities.
| Component | System Parameters | ||
|---|---|---|---|
| OSM, OpenStack, and Open5GS | OS: UBUNTU 20.04 LTS | RAM: 128 GB | CPU: 32 Cores 2.10 |
| FlexRAN | OS: UBUNTU 20.04 LTS. | RAM: 32 GB. | CPU: 4 Cores 2.33 |
| SDR USRP B210 | Frequency Range: 70 MHz–6 GHz | Channels: 2TX*2RX |
Figure 5Part of an example of the generated attack Graph.
Figure 6The Hierarchical GG with corresponding factors’ codes.
Figure 7The M pair-wise Matrix.
Attacker Decision Matrix.
|
|
| |||
|
|
|
| ||
| A5 | A5 | A5 | ||
| A12 | A0–A12, A12 | A12 | ||
| A2 | A0–A2, A2 | A2 | ||
Figure 8An example of normalized fuzzy weights.
Figure 9The 5G Edge-based 3GPP planes in our testbed.
Figure 10The attack graph with the corresponding factors’ codes.
Pair-wise evaluation matrix of the criteria layer.
| 001 | 002 | 003 | 004 | 005 | 006 | 007 | 008 | 009 | 011 | 012 | … | |
|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 001 | 1 | 3 | 2 | 1/8 | 1/9 | 1/7 | 1/4 | 1/6 | 1/7 | 2 | 1/4 | … |
| 002 | 1/7 | 1 | 3 | 2 | 1 | 1/5 | 1/3 | 1/9 | 2 | 1/6 | 1/5 | … |
| 003 | 1/8 | 1/9 | 1 | 1/3 | 1/2 | 1/3 | 1/7 | 3 | 1/2 | 1/4 | 2 | … |
| 004 | 1/8 | 1/9 | 1/2 | 1 | 1/8 | 1/3 | 1/4 | 2 | 1/5 | 1/3 | 1/4 | … |
| 005 | 3 | 1/3 | 1/6 | 1/5 | 1 | 1/5 | 1/3 | 1/5 | 1/6 | 1/6 | 1/9 | … |
| 006 | 1/2 | 1/7 | 2 | 1/3 | 1/2 | 1 | 1/7 | 3 | 1/2 | 1/9 | 1/3 | … |
| 007 | 1/6 | ½ | 1/7 | 2 | 1/3 | 1/5 | 1 | 1/6 | 1/8 | 1/7 | 1/7 | … |
| 008 | 1/2 | 4 | 1/2 | 2 | 1/7 | 1/3 | 1/6 | 1 | 3 | 1/5 | 4 | … |
| 009 | 1/6 | 1/5 | 3 | 1/6 | 1/4 | 1/6 | 1/3 | 1/5 | 1 | 1/3 | 4 | … |
| 011 | 3 | 1 | 1/6 | 1/9 | 2 | 1/2 | 1/7 | 1/3 | 1/5 | 1 | 1/3 | … |
| 012 | 1/5 | 1/9 | 1/6 | 1/7 | 1 | 1/8 | 2 | 1/7 | 1/3 | 2 | 1 | … |
Attacker cost in three attacking schemes (I, S, P).
|
|
| ||||||
|
|
|
|
|
|
| ||
| 5. | 5. | 5. | - | - | - | ||
| 12, 10-17-20-12, 9-17-20-12, 9-20-12, 15-17-20-12, 15-20-12. | 0-12, 12. | 12. | 3-13-11-12, 3-11-12, 3-4-12, 3-13-4-12, 7-8-4-12, 7-11-12, 7-4-12, 8-4-12, 8-11-12, 14-4-12, 14-11-12. | 8-12, 8-4-12, 8-11-12, 19-11-12, | 11-12, 4-12, | ||
| 2, 22, 10-17-20-22, 10-17-21-22, 10-17-20-2, 10-17-22, 9-17-20-2, 9-17-20-22, 9-17-21-22, 9-17-22, 9-22, 9-20-2, 9-20-12, 9-20-22, 9-21-22, 15-17-20-2, 15-17-20-22, 15-17-21-22, 15-17-22, 15-22, 15-20-2, 15-20-12, 15-20-22, 15-21-22. | 0-2, 2, 0-22. | 2, 22, 0-2, 0-22. | - | - | - | ||
Figure 11The I, S, and P attack costs and paths.
The combinatorial weights of the CVSS and dynamic 5G network factors.
| Criteria/Indicators/Factors |
| Criteria/Indicators/Factors |
| Criteria/Indicators/Factors |
|
|---|---|---|---|---|---|
| Access Vector 000 | Report Confidence 006 | Speed 012 | |||
| Access Complexity 001 | Collateral Damage 007 | Bandwidth 013 | |||
| Authentication 002 | Target Distribution 008 | Data Size 014 | |||
| Confidentiality impact 003 | Confidentiality req. 009 | Retainability 015 | |||
| Exploitability 004 | Integrity req. 010 | - | - | ||
| Remediation level 005 | Availability req. 011 | - | - |
Linguistic terms and their corresponding HFN.
| Linguistic Variables | Hexagonal Fuzzy Numbers | Linguistic Variables | Hexagonal Fuzzy Numbers |
|---|---|---|---|
| Very low (VL) | (1, 2, 3, 4, 5, 6) | Medium high (MH) | (3, 4, 5, 6, 7, 8) |
| Low (L) | (1.5, 2.5, 3.5, 4.5, 5.5, 6.5) | High (H) | (3.5, 4.5, 5.5, 6.5, 7.5, 8.5) |
| Medium low (ML) | (2, 3, 4, 5, 6, 7) | Very high (VH) | (4, 5, 6, 7, 8, 9) |
| Neutral (N) | (2.5, 3.5, 4.5, 5.5, 6.5, 7.5) |
Rating the alternative attacker’s actions with respect to the weights of the indicators.
| 𝑊0 | 𝑊1 | 𝑊2 | 𝑊3 | 𝑊4 | 𝑊5 | 𝑊6 | 𝑊7 | 𝑊8 | 𝑊9 | 𝑊10 | 𝑊11 | 𝑊12 | 𝑊13 | 𝑊14 | 𝑊15 | |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
| VH | VL | VL | VL | VL | VL | VL | VL | VL | VL | VL | VL | VL | VL | VH | VH |
|
| N | VL | VH | VL | VL | VH | VL | VL | VL | VL | VH | VL | VL | H | H | N |
|
| VL | VL | L | VL | VH | VH | VL | VL | VL | VL | VL | VL | L | MH | VH | VH |
|
| N | VH | VL | L | ML | VH | VL | VL | VL | VL | VL | VH | VL | MH | MH | N |
|
| L | N | L | VL | L | N | VL | H | VL | VL | VL | N | L | ML | ML | L |
|
| VL | VL | VL | VL | VL | VL | VL | VL | VL | VL | VL | VL | VL | VH | VH | VH |
|
| ⋮ | ⋮ | ⋮ | ⋮ | ⋮ | ⋮ | ⋮ | ⋮ | ⋮ | ⋮ | ⋮ | ⋮ | ⋮ | ⋮ | ⋮ | ⋮ |
|
| L | L | VL | VL | L | N | VL | VL | ML | VH | VL | VL | L | ML | ML | H |
The decision matrix using the HFN.
|
|
|
|
|
|
| ||
|---|---|---|---|---|---|---|---|
|
| (4, 5, 6, 7, 8, 9) | (1, 2, 3, 4, 5, 6) | (1, 2, 3, 4, 5, 6) | (1, 2, 3, 4, 5, 6) | (1, 2, 3, 4, 5, 6) | (1, 2, 3, 4, 5, 6) | … |
|
| (2.5, 3.5, 4.5, 5.5, 6.5, 7.5) | (1, 2, 3, 4, 5, 6) | (4, 5, 6, 7, 8, 9) | (1, 2, 3, 4, 5, 6) | (1, 2, 3, 4, 5, 6) | (4, 5, 6, 7, 8, 9) | … |
|
| (1, 2, 3, 4, 5, 6) | (1, 2, 3, 4, 5, 6) | (1.5, 2.5, 3.5, 4.5, 5.5, 6.5) | (1, 2, 3, 4, 5, 6) | (4, 5, 6, 7, 8, 9) | (4, 5, 6, 7, 8, 9) | … |
|
| (2.5, 3.5, 4.5, 5.5, 6.5, 7.5) | (4, 5, 6, 7, 8, 9) | (1, 2, 3, 4, 5, 6) | (1.5, 2.5, 3.5, 4.5, 5.5, 6.5) | (2, 3, 4, 5, 6, 7) | (4, 5, 6, 7, 8, 9) | … |
|
| (1.5, 2.5, 3.5, 4.5, 5.5, 6.5) | (2.5, 3.5, 4.5, 5.5, 6.5, 7.5) | (1.5, 2.5, 3.5, 4.5, 5.5, 6.5) | (1, 2, 3, 4, 5, 6) | (1.5, 2.5, 3.5, 4.5, 5.5, 6.5) | (2.5, 3.5, 4.5, 5.5, 6.5, 7.5) | … |
|
| (1, 2, 3, 4, 5, 6) | (1, 2, 3, 4, 5, 6) | (1, 2, 3, 4, 5, 6) | (1, 2, 3, 4, 5, 6) | (1, 2, 3, 4, 5, 6) | (1, 2, 3, 4, 5, 6) | … |
|
| ⋮ | ⋮ | ⋮ | ⋮ | ⋮ | ⋮ | ⋮ |
|
| (1.5, 2.5, 3.5, 4.5, 5.5, 6.5) | (1.5, 2.5, 3.5, 4.5, 5.5, 6.5) | (1, 2, 3, 4, 5, 6) | (1, 2, 3, 4, 5, 6) | (1.5, 2.5, 3.5, 4.5, 5.5, 6.5) | (2.5, 3.5, 4.5, 5.5, 6.5, 7.5) | … |
The normalized decision matrix.
|
|
|
|
|
|
| ||
|---|---|---|---|---|---|---|---|
|
| (0.24, 0.30, 0.36, 0.42, 0.48, 0.54) | (0.10, 0.20, 0.31, 0.41, 0.52, 0.62) | (0.10, 0.20, 0.31, 0.41, 0.52, 0.62) | (0.10, 0.20, 0.31, 0.41, 0.52, 0.62) | (0.10, 0.20, 0.31, 0.41, 0.52, 0.62) | (0.10, 0.20, 0.31, 0.41, 0.52, 0.62) | … |
|
| (0.19, 0.27, 0.34, 0.42, 0.50, 0.57) | (0.10, 0.20, 0.31, 0.41, 0.52, 0.62) | (0.24, 0.30, 0.36, 0.42, 0.48, 0.54) | (0.10, 0.20, 0.31, 0.41, 0.52, 0.62) | (0.10, 0.20, 0.31, 0.41, 0.52, 0.62) | (0.24, 0.30, 0.36, 0.42, 0.48, 0.54) | … |
|
| (0.10, 0.20, 0.31, 0.41, 0.52, 0.62) | (0.10, 0.20, 0.31, 0.41, 0.52, 0.62) | (0.14, 0.23, 0.32, 0.42, 0.51, 0.61) | (0.10, 0.20, 0.31, 0.41, 0.52, 0.62) | (0.24, 0.30, 0.36, 0.42, 0.48, 0.54) | (0.24, 0.30, 0.36, 0.42, 0.48, 0.54) | … |
|
| (0.19, 0.27, 0.34, 0.42, 0.50, 0.57) | (0.24, 0.30, 0.36, 0.42, 0.48, 0.54) | (0.10, 0.20, 0.31, 0.41, 0.52, 0.62) | (0.14, 0.23, 0.32, 0.42, 0.51, 0.61) | (0.16, 0.25, 0.33, 0.42, 0.50, 0.59) | (0.24, 0.30, 0.36, 0.42, 0.48, 0.54) | … |
|
| (0.14, 0.23, 0.32, 0.42, 0.51, 0.61) | (0.19, 0.27, 0.34, 0.42, 0.50, 0.57) | (0.14, 0.23, 0.32, 0.42, 0.51, 0.61) | (0.10, 0.20, 0.31, 0.41, 0.52, 0.62) | (0.14, 0.23, 0.32, 0.42, 0.51, 0.61) | (0.19, 0.27, 0.34, 0.42, 0.50, 0.57) | … |
|
| (0.10, 0.20, 0.31, 0.41, 0.52, 0.62) | (0.10, 0.20, 0.31, 0.41, 0.52, 0.62) | (0.10, 0.20, 0.31, 0.41, 0.52, 0.62) | (0.10, 0.20, 0.31, 0.41, 0.52, 0.62) | (0.10, 0.20, 0.31, 0.41, 0.52, 0.62) | (0.10, 0.20, 0.31, 0.41, 0.52, 0.62) | … |
|
| ⋮ | ⋮ | ⋮ | ⋮ | ⋮ | ⋮ | ⋮ |
|
| (0.14, 0.23, 0.32, 0.42, 0.51, 0.61) | (0.14, 0.23, 0.32, 0.42, 0.51, 0.61) | (0.10, 0.20, 0.31, 0.41, 0.52, 0.62) | (0.10, 0.20, 0.31, 0.41, 0.52, 0.62) | (0.14, 0.23, 0.32, 0.42, 0.51, 0.61) | (0.19, 0.27, 0.34, 0.42, 0.50, 0.57) | … |
The weighted normalized decision matrix.
|
|
|
|
|
|
| ||
|---|---|---|---|---|---|---|---|
|
| (0.0072, 0.009, 0.0108, 0.0126, 0.0144, 0.0162) | (0.004, 0.008, 0.0124, 0.0164, 0.0208, 0.0248) | (0.009, 0.018, 0.0279, 0.0369, 0.0468, 0.0558) | (0.009, 0.018, 0.0279, 0.0369, 0.0468, 0.0558) | (0.011, 0.022, 0.0341, 0.0451, 0.0572, 0.0682) | (0.002, 0.004, 0.0062, 0.0082, 0.0104, 0.0124) | … |
|
| (0.0057, 0.0081, 0.0102, 0.0126, 0.015, 0.0171) | (0.004, 0.008, 0.0124, 0.0164, 0.0208, 0.0248) | (0.0216, 0.027, 0.0324, 0.0378, 0.0432, 0.0486) | (0.009, 0.018, 0.0279, 0.0369, 0.0468, 0.0558) | (0.011, 0.022, 0.0341, 0.0451, 0.0572, 0.0682) | (0.0048, 0.006, 0.0072, 0.0084, 0.0096, 0.0108) | … |
|
| (0.003, 0.006, 0.0093, 0.0123, 0.0156, 0.0186) | (0.004, 0.008, 0.0124, 0.0164, 0.0208, 0.0248) | (0.0126, 0.0207, 0.0288, 0.0378, 0.0459, 0.0549) | (0.009, 0.018, 0.0279, 0.0369, 0.0468, 0.0558) | (0.0264, 0.033, 0.0396, 0.0462, 0.0528, 0.0594) | (0.0048, 0.006, 0.0072, 0.0084, 0.0096, 0.0108) | … |
|
| (0.0057, 0.0081, 0.0102, 0.0126, 0.015, 0.0171) | (0.0096, 0.012, 0.0144, 0.0168, 0.0192, 0.0216) | (0.009, 0.018, 0.0279, 0.0369, 0.0468, 0.0558) | (0.0126, 0.0207, 0.0288, 0.0378, 0.0459, 0.0549) | (0.0176, 0.0275, 0.0363, 0.0462, 0.055, 0.0649) | (0.0048, 0.006, 0.0072, 0.0084, 0.0096, 0.0108) | … |
|
| (0.0042, 0.0069, 0.0096, 0.0126, 0.0153, 0.0183) | (0.0076, 0.0108, 0.0136, 0.0168, 0.02, 0.0228) | (0.0126, 0.0207, 0.0288, 0.0378, 0.0459, 0.0549) | (0.009, 0.018, 0.0279, 0.0369, 0.0468, 0.0558) | (0.0154, 0.0253, 0.0352, 0.0462, 0.0561, 0.0671) | (0.0038, 0.0054, 0.0068, 0.0084, 0.01, 0.0114) | … |
|
| (0.003, 0.006, 0.0093, 0.0123, 0.0156, 0.0186) | (0.004, 0.008, 0.0124, 0.0164, 0.0208, 0.0248) | (0.009, 0.018, 0.0279, 0.0369, 0.0468, 0.0558) | (0.009, 0.018, 0.0279, 0.0369, 0.0468, 0.0558) | (0.011, 0.022, 0.0341, 0.0451, 0.0572, 0.0682) | (0.002, 0.004, 0.0062, 0.0082, 0.0104, 0.0124) | … |
|
| ⋮ | ⋮ | ⋮ | ⋮ | ⋮ | ⋮ | ⋮ |
|
| (0.0042, 0.0069, 0.0096, 0.0126, 0.0153, 0.0183) | (0.0056, 0.0092, 0.0128, 0.0168, 0.0204, 0.0244) | (0.009, 0.018, 0.0279, 0.0369, 0.0468, 0.0558) | (0.009, 0.018, 0.0279, 0.0369, 0.0468, 0.0558) | (0.0154, 0.0253, 0.0352, 0.0462, 0.0561, 0.0671) | (0.0038, 0.0054, 0.0068, 0.0084, 0.01, 0.0114) | … |
The positive and negative ideal solution.
| Positive Ideal Solutions | Negative Ideal Solutions |
|---|---|
The cost and benefits of the attacker’s actions.
| Action |
|
| ||
|---|---|---|---|---|
|
| 0.0111 | 0.0021 |
|
|
|
| 0.0092 | 0.0066 |
|
|
|
| 0.0071 | 0.0080 |
|
|
|
| 0.0080 | 0.0051 |
|
|
|
| 0.0086 | 0.0033 |
|
|
|
| 0.0114 | 0 |
|
|
|
| ⋮ | ⋮ | ⋮ | ⋮ |
|
| 0.0098 | 0.0024 | 0.1967 | 0.8033 |
The cost and benefits of the attack paths for two exploitation starting points.
|
|
| ||
|
|
| ||
|
|
|
| |
|
|
|
| |
|
|
|
| |
Figure 12The VEA-bility metric of the VAA and the Nessus.
Figure 13Execution time of the VAA and Nessus.
Figure 14The scalability of the VAA and Nessus using a variant number of UEs.