Vulnerability Exploit Pattern Generation and Analysis for proactive security risk mitigation for 5G networks

Wiktor Sedkowski, Rakshesh P. Bhatt, Clifton Fernandes, Kodandram Ranganath
{"title":"Vulnerability Exploit Pattern Generation and Analysis for proactive security risk mitigation for 5G networks","authors":"Wiktor Sedkowski, Rakshesh P. Bhatt, Clifton Fernandes, Kodandram Ranganath","doi":"10.1109/INFOCOMWKSHPS57453.2023.10225912","DOIUrl":null,"url":null,"abstract":"This paper presents a proactive intelligent mechanism to detect possible variants of known vulnerability exploits being attempted on any component of wireless networks. Vulnerability Exploit Pattern Analyzer presented in this paper can prevent possible zero-day attacks by learning from the available known exploits from published databases. There have been incidents like WannaCry ransomware attack, where a known Operating Systems vulnerability was exploited sometime after it was published, and even the patches were available in public. In 5G wireless networks, the number of network functions and devices are expected to be in millions. For most of the CVEs published, different exploits are also published, and available in online databases like Exploit DB. It is likely that attackers take such exploits, manipulate them to create different variants of such exploits and launch attacks on networks. For example, https://www.exploit-db.com/has more than 8000 exploits published only for SQL injection kind of vulnerabilities. Older vulnerability exploits can inspire creation of newer ones for other products. 5G and future wireless networks having service-based architecture at the core will require more proactive approaches to predict any misuse of emerging or manipulated variants of known exploits. This paper proposes one possible solution for the same and presents results from experiments done using patterns generated from a remote command injection vulnerability exploit.","PeriodicalId":354290,"journal":{"name":"IEEE INFOCOM 2023 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE INFOCOM 2023 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INFOCOMWKSHPS57453.2023.10225912","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

This paper presents a proactive intelligent mechanism to detect possible variants of known vulnerability exploits being attempted on any component of wireless networks. Vulnerability Exploit Pattern Analyzer presented in this paper can prevent possible zero-day attacks by learning from the available known exploits from published databases. There have been incidents like WannaCry ransomware attack, where a known Operating Systems vulnerability was exploited sometime after it was published, and even the patches were available in public. In 5G wireless networks, the number of network functions and devices are expected to be in millions. For most of the CVEs published, different exploits are also published, and available in online databases like Exploit DB. It is likely that attackers take such exploits, manipulate them to create different variants of such exploits and launch attacks on networks. For example, https://www.exploit-db.com/has more than 8000 exploits published only for SQL injection kind of vulnerabilities. Older vulnerability exploits can inspire creation of newer ones for other products. 5G and future wireless networks having service-based architecture at the core will require more proactive approaches to predict any misuse of emerging or manipulated variants of known exploits. This paper proposes one possible solution for the same and presents results from experiments done using patterns generated from a remote command injection vulnerability exploit.
面向5G网络主动安全风险缓解的漏洞利用模式生成与分析
本文提出了一种主动智能机制,用于检测在无线网络的任何组件上试图利用已知漏洞的可能变体。本文提出的漏洞利用模式分析器可以通过从已发布的数据库中学习可用的已知漏洞来防止可能的零日攻击。曾经发生过类似WannaCry勒索软件攻击的事件,即已知的操作系统漏洞在发布一段时间后被利用,甚至补丁都是公开的。在5G无线网络中,网络功能和设备的数量预计将达到数百万。对于大多数已发布的cve,还发布了不同的漏洞利用,并在Exploit DB等在线数据库中可用。攻击者很可能利用这些漏洞,操纵它们来创建这些漏洞的不同变体,并对网络发起攻击。例如,https://www.exploit-db.com/has发布了8000多个针对SQL注入类漏洞的漏洞。旧的漏洞利用可以激发为其他产品创建新的漏洞。5G和以服务为核心架构的未来无线网络将需要更主动的方法来预测任何滥用新出现的或被操纵的已知漏洞变体。本文提出了一种可能的解决方案,并给出了使用远程命令注入漏洞利用产生的模式进行的实验结果。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信