Wiktor Sedkowski, Rakshesh P. Bhatt, Clifton Fernandes, Kodandram Ranganath
{"title":"Vulnerability Exploit Pattern Generation and Analysis for proactive security risk mitigation for 5G networks","authors":"Wiktor Sedkowski, Rakshesh P. Bhatt, Clifton Fernandes, Kodandram Ranganath","doi":"10.1109/INFOCOMWKSHPS57453.2023.10225912","DOIUrl":null,"url":null,"abstract":"This paper presents a proactive intelligent mechanism to detect possible variants of known vulnerability exploits being attempted on any component of wireless networks. Vulnerability Exploit Pattern Analyzer presented in this paper can prevent possible zero-day attacks by learning from the available known exploits from published databases. There have been incidents like WannaCry ransomware attack, where a known Operating Systems vulnerability was exploited sometime after it was published, and even the patches were available in public. In 5G wireless networks, the number of network functions and devices are expected to be in millions. For most of the CVEs published, different exploits are also published, and available in online databases like Exploit DB. It is likely that attackers take such exploits, manipulate them to create different variants of such exploits and launch attacks on networks. For example, https://www.exploit-db.com/has more than 8000 exploits published only for SQL injection kind of vulnerabilities. Older vulnerability exploits can inspire creation of newer ones for other products. 5G and future wireless networks having service-based architecture at the core will require more proactive approaches to predict any misuse of emerging or manipulated variants of known exploits. This paper proposes one possible solution for the same and presents results from experiments done using patterns generated from a remote command injection vulnerability exploit.","PeriodicalId":354290,"journal":{"name":"IEEE INFOCOM 2023 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE INFOCOM 2023 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INFOCOMWKSHPS57453.2023.10225912","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
This paper presents a proactive intelligent mechanism to detect possible variants of known vulnerability exploits being attempted on any component of wireless networks. Vulnerability Exploit Pattern Analyzer presented in this paper can prevent possible zero-day attacks by learning from the available known exploits from published databases. There have been incidents like WannaCry ransomware attack, where a known Operating Systems vulnerability was exploited sometime after it was published, and even the patches were available in public. In 5G wireless networks, the number of network functions and devices are expected to be in millions. For most of the CVEs published, different exploits are also published, and available in online databases like Exploit DB. It is likely that attackers take such exploits, manipulate them to create different variants of such exploits and launch attacks on networks. For example, https://www.exploit-db.com/has more than 8000 exploits published only for SQL injection kind of vulnerabilities. Older vulnerability exploits can inspire creation of newer ones for other products. 5G and future wireless networks having service-based architecture at the core will require more proactive approaches to predict any misuse of emerging or manipulated variants of known exploits. This paper proposes one possible solution for the same and presents results from experiments done using patterns generated from a remote command injection vulnerability exploit.