10 1109@mnet 011 1900635
10 1109@mnet 011 1900635
Digital Object Identifier: Yanbin Sun, Zhihong Tian (corresponding Author), and Mohan Li are with Guangzhou University;
10.1109/MNET.011.1900635 Chunsheng Zhu is with Southern University of Science and Technology and Peng Cheng Laboratory; Nadra Guizani is with Washington State University.
Application Application
Application Layer
Layer Layer
S
Service S
Service
Service Layer
Layer Layer
Virtual Virtual
Virtual Layer
Layer Layer
Physical Physical
Physical
Layer Layer
Layer
edges, if the attack condition for the attack of the cal model is only a theoretical model for 5G;
last edge is satisfied by the attack result obtained how to apply the model to solve specific
by the attack of the first edge, then the two adja- security issues remains a problem. In the next
cent edges form an attack chain. section, we will present an automated attack
The defense strategy can also be represented and defense framework by using this model.
by a triple <cost, mtd, dfs_rst>. Each triple cor-
responds to an attack (a directed edge) and can AutoMAted AttAck And defense frAMework
be one of the attributes of the edge. The cost Most 5G security studies rely on an expert’s knowl-
denotes the defense resources which are need- edge and require manual interventions. It is hard to
ed by the strategy. The mtd denotes the detailed satisfy the requirements of scalability, accuracy and
defense method. The dfs_rst denotes the defense efficiency for addressing security threats. Therefore,
effect. In response to the attack chain, a list of automated attack and defense becomes one of the
defense strategies can be achieved. However, key research areas for 5G security.
not all defense strategies need to be executed. The proposed hierarchical attack and defense
We only need to break the connectivity of the model is essentially a graph containing the objects
attack chain by choosing some specific defense in all layers and their relationships. Correspond-
strategies according to the security requirement ingly, it can be implemented by a security knowl-
or a defense strategy toward a critical attack on edge graph. Base on such a knowledge graph, the
the attack chain. specific objects, vulnerabilities, attacks, defense
strategies, and so on, can be correlated with
dIscussIon of HIerArcHIcAl Model each other. Thus, given an attack/defense object,
The hierarchical attack and defense model can attack or defense can be performed automatically
support the security description for not only the according to the relationships on security knowl-
single-layer threat but also the cross-layer threat. edge graph.
For example, 5G can be used for smart factory An automated attack and defense framework
in the future. There may exist some attacks to the is constructed based on a security knowledge
industrial control process, such as tampering the graph. Figure 3 shows the structure of framework
monitoring data or the control data. The attack which consists of four components: the security
process may cross multiple layers. The ferry attack knowledge graph, automated attack technologies,
is first used to access the physical server, and then automated defense technologies, and 5G secu-
the NFV manager vulnerability can be used to find rity testbed. Based on large amounts of security
the corresponding industrial control service slicing. data, the knowledge graph is first constructed and
Base on the slicing resources, the logical topology used to support automated attack and defense
of smart factory is identified, and the data tam- by using known knowledge. Then, to explore
pering attack is performed according to specific unknown security threats and effective defense
application. The whole attack process crosses all strategies, the automated attack technology and
layers. According to the hierarchical characteristic automated defense technology are studied to pro-
of 5G architecture, an attack starting from a layer vide feedback to the knowledge graph. To verify
and spreading to objects in other layers or in the new security technologies, a security testbed of
same layer will be one of the main threats to 5G. 5G is needed.
The hierarchical security model has three
advantages: securIty knowledge grApH
• Complex security threats can be formally The security knowledge graph is based on the
represented and deeply analyzed such that the hierarchical attack and defense model. Mul-
effective strategies against security threats tiple entities (objects) are identified from large
can be adopted. amounts of scattered security knowledge and
• Based on directed paths, unknown security corresponding attributes and relationships are
threats can be found such that security risks extracted. Figure 4 shows a part of a security
are avoided when possible. knowledge graph. To distinguish different attacks
• The hierarchical model is essentially a graph to an attack/defense object, the security threat
and it is suitable for supporting automated (such as attack, vulnerability, and so on) is also
attack and defense. However, the hierarchi- viewed as an object and the defense strategy is
Test&Ver
Testbed for automated attack and defense of 5G networks
ification
used as the corresponding attribute. The red lines Vulnerability mining automatically digs for vul-
in the figure denote an attack chain from Object1 nerabilities in firmware, software and protocols.
to Object3. In addition to the presented objects, Fuzzing technologies combined with symbolic
other objects, relationships, and attributes also execution are always used. Automated vulnerabil-
exist; these are not shown in the figure. ity exploitation technology automatically locates
Security knowledge graph construction con- the jumpable address of a program stack and
sists of three steps: data collection, knowledge then uses the layout memory to replace the jump-
extraction and fusion, and knowledge reasoning. able address with a shellcode address, such that
Although mature technologies can be directly the shellcode can be executed. Due to the large
used for the construction, special requirements number of IoT devices in 5G, the vulnerabilities
for 5G should be considered. For data collection, of IoT firmware and new protocols need further
the large-scale and dynamic requirements should research. For password guessing, AI-based pass-
be satisfied. The security data can be obtained word generation for password libraries is a prom-
in many existing ways, such as vulnerability data- ising technology. Based on the password library,
bases, exploit-db, Github, dark networks, security password guessing tools, such as HashCat an
competitions, and security event analysis. To sup- John the Ripper, are used to guess the password,
port 5G security, a centralized 5G security data and they may play an important role especially
platform is needed. Data extraction and fusion when dealing with IoT devices of 5G. To bypass
face challenges of accuracy and completeness. the security detection, an AI-based automated
Due to the existence of multisource and unstruc- attack is studied, for example, by dynamically
tured data, two representations of an entity may changing the characteristic and the rule of device
be identified as different entities, thus it is hard access with AI technology, a DDoS attack detec-
to extract a relationship accurately and com- tion for a base station can be bypassed.
pletely. Multisource knowledge fusion, as well as The above technologies are used to provide
semi-structured and unstructured data process, feedback knowledge to the knowledge graph. To
should be further studied. Security knowledge rea- utilize the knowledge graph, attack chain search
soning can be used to discover the hidden rela- technology and attack chain generation tech-
tionship and the efficiency is the main challenge. nology can be studied for existing and potential
In consideration of the large-scale knowledge threats.
graph, subgraph-based knowledge reasoning or Since existing attack chains are already record-
AI-based knowledge reasoning can be promising ed in the knowledge graph, the attack chains
approaches. started from an object or against an object can
If the attack chain from an object to another be obtained by attack chain search technology.
object exists in the knowledge graph, the attack Given an object, multiple attack chains with a tree
or corresponding defense strategies can be structure starting from the object can be obtained
obtained automatically. Otherwise, new entries according to some conditions, such as the minimal
and relationships should be added. To support cost and the maximum threat. Similarly, an attack
unknown security threats, automated attack and chain against the object can also be found. On the
defense technologies are needed. large graph, efficiency is one of the main focuses
of attack chain search technology. Path search on
AutoMAted AttAck tecHnology large graphs may be a promising technology.
The research on automated attack focuses on two An unknown attack chain can be predicted
aspects. Key technologies for automated attack- and constructed by using attack chain genera-
ing, such as vulnerability mining and exploitation, tion technology based on existing knowledge.
password guessing, AI-based automated attack, AI-based technology (such as a graph neural net-
and so on, are studied separately. The search and work) is a promising technology. Existing attack
generation of attack chain is studied to find exist- chains are first learned by training of an AI model,
ing and potential attack chains. then the trained AI model can be used to pre-
Acknowledgment Biographies
This work is supported by the National Yanbin Sun received the B.S., M.S. and Ph.D. degrees in com-
Key Research and Development Plan (no. puter science from Harbin Institute of Technology (HIT), Harbin,
China. He is currently an assistant professor at Guangzhou Uni-
2018YFB0803504); the Guangdong Prov- versity, China. His research interests include network security,
ince Key Area R&D Program of China (no. future networking and scalable routing.
2019B010137004, 2019B010136001); the
National Natural Science Foundation of Zhihong Tian received the Ph.D. degree. He was a Standing
Director of the CyberSecurity Association of China. From 2003
China (no. 61702223, 61702220, 61871140, to 2016, he was with the Harbin Institute of Technology. He
U1636215); the Guangdong Province Univer- is currently a professor, a Ph.D. supervisor, and a Dean of the
sities and Colleges Pearl River Scholar Funded Cyberspace Institute of Advanced Technology, Guangzhou Uni-
Scheme (2019); the Natural Science Foundation versity. He was a member of the China Computer Federation.
His current research interests include computer network and
of Guangdong Province (2020A151501450); the network security. His research has been supported in part by
project PCL Future Greater-Bay Area Network the National Natural Science Foundation of China; the National
Facilities for Large-scale Experiments and Appli- High-tech R&D Program of China (863 Program); the National
cations (LZC0019); and the Opening Project Basic Research Program of China (973 Program); and the Post-
doctoral Science Foundation of China.
of Shanghai Trusted Industrial Control Platform
(TICPSH202003014-ZC). Mohan Li received her B.S., M.S. and Ph.D degrees in comput-
er science from Harbin Institute of Technology (HIT), Harbin,
References China. From 2016 to 2018, she worked at Jinan University. She is
[1] X. Du and H. Chen, “Security in Wireless Sensor Networks,” currently an associate professor at Guangzhou University, China.
IEEE Wireless Commun., vol. 15, no. 4, Aug. 2008, pp. Her research interests include data quality and data security.
60–66.
[2] Cisco, “Cisco Visual Networking Index: Global Mobile Data Chunsheng Zhu is an associate professor at the SUSTech Insti-
Traffic Forecast update (2016-2021),” Cisco White Paper, tute of Future Networks at Southern University of Science and
Feb. 2017. Technology in China. He is also an associate researcher at the
[3] H. Ji et al., “Ultra-Reliable and Low-Latency Communications PCL Research Center of Networks and Communications at the
in 5G Downlink: Physical Layer Aspects,” IEEE Wireless Com- Peng Cheng Laboratory in China. He received the Ph.D. degree in
mun., vol. 25, no. 3, July 2018, pp. 124–30. electrical and computer engineering from The University of British
[4] Z. Tian et al., “Vcash: A Novel Reputation Framework for Columbia, Canada. He has authored more than 100 publications
Identifying Denial of Traffic Service in Internet of Con- published by refereed international journals (e.g., IEEE Transactions
nected Vehicles,” IEEE IoT-J., Nov. 2019, DOI: 10.1109/ on Industrial Electronics, IEEE Transactions on Computers, IEEE
JIOT.2019.2951620. Transactions on Information Forensics and Security, IEEE Transac-
[5] N. G. M. N., Alliance, “NGMN 5G White Paper,” Next tions on Industrial Informatics, IEEE Transactions on Vehicular Tech-
Generation Mobile Networks, White paper, Feb. 2015, pp. nology, IEEE Transactions on Emerging Topics in Computing, IEEE
1–125. Transactions on Cloud Computing, ACM Transactions on Embed-
[6] Y. Wu et al., “A Survey of Physical Layer Security Techniques ded Computing Systems, ACM Transactions on Cyber-Physical
for 5G Wireless Networks and Challenges Ahead,” IEEE Systems), magazines (e.g., IEEE Communications Magazine, IEEE
JSAC, vol. 36, no. 4, Apr. 2018, pp. 679–95. Wireless Communications Magazine, IEEE Network Magazine), and
[7] I. Ahmad, et al., “Overview of 5G Security Challenges and conferences (e.g., IEEE INFOCOM, IEEE IECON, IEEE SECON,
Solutions,” IEEE Commun. Standards Mag., vol. 2, no. 1, Mar. IEEE DCOSS, IEEE ICC, IEEE GLOBECOM). His research interests
2018, pp. 36–43. mainly include Internet of Things, wireless sensor networks, cloud
[8] M. Agiwal et al., “Next Generation 5G Wireless Networks: computing, big data, social networks, and security.
A Comprehensive Survey,” IEEE Commun. Surveys Tuts., vol.
18, no. 3, Third Quarter 2016, pp. 1617–55. Nadra Guizani is an assistant professor at the School of Electri-
[9] H. Hawilo et al., “NFV: State of the Art, Challenges, and cal Engineering & Computer Science, Washington State Univer-
Implementation in Next Generation Mobile Networks sity, USA. She received her Ph.D. from Purdue University, USA.
(vEPC),” IEEE Network, vol. 28, no. 6, Nov. 2014, pp. Her Ph.D. research work revolved around prediction and access
18–26. control of disease spread data on dynamic network topologies.
[10] X. Wang et al., “Physical-Layer Authentication for Wire- Her research interests include machine learning, mobile net-
less Security Enhancement: Current Challenges and Future working, large data analysis, and prediction techniques. She is
Developments,” IEEE Commun. Mag., vol. 54, no. 6, Jun. an active member of both the Women in Engineering program
2016, pp. 152–58. and the Computing Research Association (CRA).