Vulnerability Exploit Pattern Generation and Analysis for proactive security risk mitigation for 5G networks

Wiktor Sedkowski, Rakshesh P. Bhatt, Clifton Fernandes, Kodandram Ranganath
{"title":"Vulnerability Exploit Pattern Generation and Analysis for proactive security risk mitigation for 5G networks","authors":"Wiktor Sedkowski, Rakshesh P. Bhatt, Clifton Fernandes, Kodandram Ranganath","doi":"10.1109/INFOCOMWKSHPS57453.2023.10225912","DOIUrl":null,"url":null,"abstract":"This paper presents a proactive intelligent mechanism to detect possible variants of known vulnerability exploits being attempted on any component of wireless networks. Vulnerability Exploit Pattern Analyzer presented in this paper can prevent possible zero-day attacks by learning from the available known exploits from published databases. There have been incidents like WannaCry ransomware attack, where a known Operating Systems vulnerability was exploited sometime after it was published, and even the patches were available in public. In 5G wireless networks, the number of network functions and devices are expected to be in millions. For most of the CVEs published, different exploits are also published, and available in online databases like Exploit DB. It is likely that attackers take such exploits, manipulate them to create different variants of such exploits and launch attacks on networks. For example, https://www.exploit-db.com/has more than 8000 exploits published only for SQL injection kind of vulnerabilities. Older vulnerability exploits can inspire creation of newer ones for other products. 5G and future wireless networks having service-based architecture at the core will require more proactive approaches to predict any misuse of emerging or manipulated variants of known exploits. This paper proposes one possible solution for the same and presents results from experiments done using patterns generated from a remote command injection vulnerability exploit.","PeriodicalId":354290,"journal":{"name":"IEEE INFOCOM 2023 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE INFOCOM 2023 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INFOCOMWKSHPS57453.2023.10225912","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

This paper presents a proactive intelligent mechanism to detect possible variants of known vulnerability exploits being attempted on any component of wireless networks. Vulnerability Exploit Pattern Analyzer presented in this paper can prevent possible zero-day attacks by learning from the available known exploits from published databases. There have been incidents like WannaCry ransomware attack, where a known Operating Systems vulnerability was exploited sometime after it was published, and even the patches were available in public. In 5G wireless networks, the number of network functions and devices are expected to be in millions. For most of the CVEs published, different exploits are also published, and available in online databases like Exploit DB. It is likely that attackers take such exploits, manipulate them to create different variants of such exploits and launch attacks on networks. For example, https://www.exploit-db.com/has more than 8000 exploits published only for SQL injection kind of vulnerabilities. Older vulnerability exploits can inspire creation of newer ones for other products. 5G and future wireless networks having service-based architecture at the core will require more proactive approaches to predict any misuse of emerging or manipulated variants of known exploits. This paper proposes one possible solution for the same and presents results from experiments done using patterns generated from a remote command injection vulnerability exploit.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
面向5G网络主动安全风险缓解的漏洞利用模式生成与分析
本文提出了一种主动智能机制,用于检测在无线网络的任何组件上试图利用已知漏洞的可能变体。本文提出的漏洞利用模式分析器可以通过从已发布的数据库中学习可用的已知漏洞来防止可能的零日攻击。曾经发生过类似WannaCry勒索软件攻击的事件,即已知的操作系统漏洞在发布一段时间后被利用,甚至补丁都是公开的。在5G无线网络中,网络功能和设备的数量预计将达到数百万。对于大多数已发布的cve,还发布了不同的漏洞利用,并在Exploit DB等在线数据库中可用。攻击者很可能利用这些漏洞,操纵它们来创建这些漏洞的不同变体,并对网络发起攻击。例如,https://www.exploit-db.com/has发布了8000多个针对SQL注入类漏洞的漏洞。旧的漏洞利用可以激发为其他产品创建新的漏洞。5G和以服务为核心架构的未来无线网络将需要更主动的方法来预测任何滥用新出现的或被操纵的已知漏洞变体。本文提出了一种可能的解决方案,并给出了使用远程命令注入漏洞利用产生的模式进行的实验结果。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
A Hasty Grid S&R Prototype Using Autonomous UTM and AI-Based Mission Coordination Trajectory Design for Unmanned Aerial Vehicles via Meta-Reinforcement Learning CICADA: Cloud-based Intelligent Classification and Active Defense Approach for IoT Security Learning-Aided Multi-UAV Online Trajectory Coordination and Resource Allocation for Mobile WSNs Vulnerability Exploit Pattern Generation and Analysis for proactive security risk mitigation for 5G networks
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1