A Network Traffic Mutation Based Ontology, and Its Application to 5G Networks

12Citations
Citations of this article
26Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

This paper presents an ontology based on mutation techniques for the modelling of cybersecurity attacks and its application to 5G networks. Main concepts of network protocols, mutation operators, flow of network packets and network traffic are introduced. An ontology is designed based on different mutation operators that allow to design models that can be assimilated with known and unknown attacks. This approach has been implemented in our open source 5G network traffic fuzzer, 5Greplay, and has been applied to three use cases that are representative of attacks against 5G networks: NAS Replay attack, Denial of Service by Sending Malformed NGAP Packets and 5G encapsulation of IoT traffic.

Cite

CITATION STYLE

APA

Salazar, Z., Zaidi, F., Nguyen, H. N., Mallouli, W., Cavalli, A. R., & De Oca, E. M. (2023). A Network Traffic Mutation Based Ontology, and Its Application to 5G Networks. IEEE Access, 11, 43925–43944. https://doi.org/10.1109/ACCESS.2023.3268759

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free