Wei Shao, Chandra Thapa, Rayne Holland, Sarah Ali Siddiqui, Seyit Camtepe
{"title":"Attacking Slicing Network via Side-channel Reinforcement Learning Attack","authors":"Wei Shao, Chandra Thapa, Rayne Holland, Sarah Ali Siddiqui, Seyit Camtepe","doi":"arxiv-2409.11258","DOIUrl":null,"url":null,"abstract":"Network slicing in 5G and the future 6G networks will enable the creation of\nmultiple virtualized networks on a shared physical infrastructure. This\ninnovative approach enables the provision of tailored networks to accommodate\nspecific business types or industry users, thus delivering more customized and\nefficient services. However, the shared memory and cache in network slicing\nintroduce security vulnerabilities that have yet to be fully addressed. In this\npaper, we introduce a reinforcement learning-based side-channel cache attack\nframework specifically designed for network slicing environments. Unlike\ntraditional cache attack methods, our framework leverages reinforcement\nlearning to dynamically identify and exploit cache locations storing sensitive\ninformation, such as authentication keys and user registration data. We assume\nthat one slice network is compromised and demonstrate how the attacker can\ninduce another shared slice to send registration requests, thereby estimating\nthe cache locations of critical data. By formulating the cache timing channel\nattack as a reinforcement learning-driven guessing game between the attack\nslice and the victim slice, our model efficiently explores possible actions to\npinpoint memory blocks containing sensitive information. Experimental results\nshowcase the superiority of our approach, achieving a success rate of\napproximately 95\\% to 98\\% in accurately identifying the storage locations of\nsensitive data. This high level of accuracy underscores the potential risks in\nshared network slicing environments and highlights the need for robust security\nmeasures to safeguard against such advanced side-channel attacks.","PeriodicalId":501332,"journal":{"name":"arXiv - CS - Cryptography and Security","volume":"24 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"arXiv - CS - Cryptography and Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/arxiv-2409.11258","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Network slicing in 5G and the future 6G networks will enable the creation of
multiple virtualized networks on a shared physical infrastructure. This
innovative approach enables the provision of tailored networks to accommodate
specific business types or industry users, thus delivering more customized and
efficient services. However, the shared memory and cache in network slicing
introduce security vulnerabilities that have yet to be fully addressed. In this
paper, we introduce a reinforcement learning-based side-channel cache attack
framework specifically designed for network slicing environments. Unlike
traditional cache attack methods, our framework leverages reinforcement
learning to dynamically identify and exploit cache locations storing sensitive
information, such as authentication keys and user registration data. We assume
that one slice network is compromised and demonstrate how the attacker can
induce another shared slice to send registration requests, thereby estimating
the cache locations of critical data. By formulating the cache timing channel
attack as a reinforcement learning-driven guessing game between the attack
slice and the victim slice, our model efficiently explores possible actions to
pinpoint memory blocks containing sensitive information. Experimental results
showcase the superiority of our approach, achieving a success rate of
approximately 95\% to 98\% in accurately identifying the storage locations of
sensitive data. This high level of accuracy underscores the potential risks in
shared network slicing environments and highlights the need for robust security
measures to safeguard against such advanced side-channel attacks.