5GShield: HTTP/2 Anomaly Detection in 5G Service-Based Architecture

Nathalie Wehbe, H. Alameddine, M. Pourzandi, C. Assi
{"title":"5GShield: HTTP/2 Anomaly Detection in 5G Service-Based Architecture","authors":"Nathalie Wehbe, H. Alameddine, M. Pourzandi, C. Assi","doi":"10.23919/IFIPNetworking57963.2023.10186410","DOIUrl":null,"url":null,"abstract":"Fifth Generation (5G) core network leverages the application-layer Hypertext Transfer Protocol version 2 (HTTP/2) to enable the communication between the Network Functions (NFs) of its Service-Based Architecture (SBA). 5G SBA adopts the security-by-design principle, yet, the usage of HTTP/2 introduces some vulnerabilities related to its features exploitation. For instance, the HTTP/2 stream multiplexing attack exploits the stream multiplexing feature, which allows carrying multiple requests over a single TCP connection, and causes a Denial of Service (DoS) on 5G SBA. HTTP/2 attacks can be detected using traditional flow-based anomaly detection solutions in a web environment. Nonetheless, these solutions fall short in detecting these attacks in a 5G network, as we show in this work. To reinforce 5G core network security against HTTP/2 attacks, we propose 5GShield, a novel application-layer anomaly detection framework that uses neural networks, namely, Autoencoder, for anomaly detection. To evaluate our approach, we deploy a 5G testbed, simulate the HTTP/2 stream multiplexing attack and collect HTTP/2 data. Our experimental results show that 5GShield can detect HTTP/2 stream multiplexing attack with an F1-score of 0.992, outperforming a flow-based anomaly detection solution that exhibits an F1-score of 0.78. 5GShield shows the efficiency of 5G-specific application-layer features in exposing HTTP/2 attacks that can go undetected at the network layer.","PeriodicalId":31737,"journal":{"name":"Edutech","volume":"24 1","pages":"1-9"},"PeriodicalIF":0.0000,"publicationDate":"2023-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Edutech","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.23919/IFIPNetworking57963.2023.10186410","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Fifth Generation (5G) core network leverages the application-layer Hypertext Transfer Protocol version 2 (HTTP/2) to enable the communication between the Network Functions (NFs) of its Service-Based Architecture (SBA). 5G SBA adopts the security-by-design principle, yet, the usage of HTTP/2 introduces some vulnerabilities related to its features exploitation. For instance, the HTTP/2 stream multiplexing attack exploits the stream multiplexing feature, which allows carrying multiple requests over a single TCP connection, and causes a Denial of Service (DoS) on 5G SBA. HTTP/2 attacks can be detected using traditional flow-based anomaly detection solutions in a web environment. Nonetheless, these solutions fall short in detecting these attacks in a 5G network, as we show in this work. To reinforce 5G core network security against HTTP/2 attacks, we propose 5GShield, a novel application-layer anomaly detection framework that uses neural networks, namely, Autoencoder, for anomaly detection. To evaluate our approach, we deploy a 5G testbed, simulate the HTTP/2 stream multiplexing attack and collect HTTP/2 data. Our experimental results show that 5GShield can detect HTTP/2 stream multiplexing attack with an F1-score of 0.992, outperforming a flow-based anomaly detection solution that exhibits an F1-score of 0.78. 5GShield shows the efficiency of 5G-specific application-layer features in exposing HTTP/2 attacks that can go undetected at the network layer.
5G shield:基于5G服务架构的HTTP/2异常检测
5G(第五代)核心网采用应用层HTTP/2 (Hypertext Transfer Protocol version 2)协议,实现SBA (Service-Based Architecture)网络功能NFs (network Functions)之间的通信。5G SBA采用了设计安全原则,然而,HTTP/2的使用引入了一些与其特性利用相关的漏洞。例如,HTTP/2流复用攻击利用了流复用特性,该特性允许在单个TCP连接上承载多个请求,并在5G SBA上导致拒绝服务(DoS)。在web环境中,可以使用传统的基于流的异常检测解决方案检测HTTP/2攻击。然而,正如我们在这项工作中所展示的那样,这些解决方案在检测5G网络中的这些攻击方面存在不足。为了加强5G核心网络对HTTP/2攻击的安全性,我们提出了一种新的应用层异常检测框架5G盾,该框架使用神经网络(即Autoencoder)进行异常检测。为了评估我们的方法,我们部署了一个5G测试平台,模拟HTTP/2流复用攻击并收集HTTP/2数据。实验结果表明,5GShield检测HTTP/2流复用攻击的f1得分为0.992,优于基于流的异常检测方案的f1得分为0.78。5GShield显示了5g特定应用层功能在暴露HTTP/2攻击方面的效率,这些攻击可能在网络层未被检测到。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
审稿时长
4 weeks
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信