TY - GEN
T1 - SmiLe Net
T2 - 2023 IEEE Military Communications Conference, MILCOM 2023
AU - Peng, Yifeng
AU - Yang, Jingda
AU - Arya, Sudhanshu
AU - Wang, Ying
N1 - Publisher Copyright:
© 2023 IEEE.
PY - 2023
Y1 - 2023
N2 - 5G communication systems are a key component of current and future wireless networks, and their security has a direct impact on many critical areas, including personal communications, intelligent transportation, and industrial applications. With the softwarziation and virtualization, a new attack surface has been emerging levering the software vulnerabilities and unintended emergent behaviors. Fuzz testing based 5G vulnerability detection is a promising approach for revealing insights of potential exploits of vulnerabilities in the protocols and software stacks via providing random or guided-random inputs to the system to trigger anomalous behavior. However, the state of art fuzz testing approaches lack the capability of the root cause of the vulnerability in the system under consideration, but rather focus on detecting abnormal impacts. To close the loop by completing the missing deductive reasoning, in this paper, we develop a new approach, a Supervised Graph Embedding-based Machine Learning (SmiLe Net) approach for vulnerability detection in 5G. In particular, we utilize the skip-gram algorithm to convert the log files generated from the fuzz testing into vectors. Subsequently, a machine learning model is built to predict fuzzed locations to perform the root cause analysis in 5G vulnerability detection. Experimental results show that the proposed approach has a higher accuracy of approximately 97% in root cause analysis. In addition, the proposed SmiLe Net is a lightweight network and offers low computation complexity. Importantly, when compared with the conventional Convolutional Neural Network (CNN), Long Short-Term Memory (LSTM), and the Gated Recurrent Unit (GRU), the proposed SmiLe Net has minimum Multiply-Accumulate Operations (MACs). The project contributes novel approaches to exploit vulnerability across components and their chain effect in a 5G network, and respond to the activated vulnerabilities for system resilience in real-time; meanwhile, the generated synthetic knowledge will provide back-end architects and security engineers for further strategy development.
AB - 5G communication systems are a key component of current and future wireless networks, and their security has a direct impact on many critical areas, including personal communications, intelligent transportation, and industrial applications. With the softwarziation and virtualization, a new attack surface has been emerging levering the software vulnerabilities and unintended emergent behaviors. Fuzz testing based 5G vulnerability detection is a promising approach for revealing insights of potential exploits of vulnerabilities in the protocols and software stacks via providing random or guided-random inputs to the system to trigger anomalous behavior. However, the state of art fuzz testing approaches lack the capability of the root cause of the vulnerability in the system under consideration, but rather focus on detecting abnormal impacts. To close the loop by completing the missing deductive reasoning, in this paper, we develop a new approach, a Supervised Graph Embedding-based Machine Learning (SmiLe Net) approach for vulnerability detection in 5G. In particular, we utilize the skip-gram algorithm to convert the log files generated from the fuzz testing into vectors. Subsequently, a machine learning model is built to predict fuzzed locations to perform the root cause analysis in 5G vulnerability detection. Experimental results show that the proposed approach has a higher accuracy of approximately 97% in root cause analysis. In addition, the proposed SmiLe Net is a lightweight network and offers low computation complexity. Importantly, when compared with the conventional Convolutional Neural Network (CNN), Long Short-Term Memory (LSTM), and the Gated Recurrent Unit (GRU), the proposed SmiLe Net has minimum Multiply-Accumulate Operations (MACs). The project contributes novel approaches to exploit vulnerability across components and their chain effect in a 5G network, and respond to the activated vulnerabilities for system resilience in real-time; meanwhile, the generated synthetic knowledge will provide back-end architects and security engineers for further strategy development.
KW - 5G
KW - Fuzz testing
KW - Lightweight
KW - Machine Learning
KW - Root Cause Analysis
KW - Vulnerability Detection
KW - skip-gram
UR - http://www.scopus.com/inward/record.url?scp=85175778515&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85175778515&partnerID=8YFLogxK
U2 - 10.1109/MILCOM58377.2023.10356317
DO - 10.1109/MILCOM58377.2023.10356317
M3 - Conference contribution
AN - SCOPUS:85175778515
T3 - MILCOM 2023 - 2023 IEEE Military Communications Conference: Communications Supporting Military Operations in a Contested Environment
SP - 554
EP - 561
BT - MILCOM 2023 - 2023 IEEE Military Communications Conference
Y2 - 30 October 2023 through 3 November 2023
ER -