Proceedings of the 16th International Conference on Availability, Reliability and Security 2021
DOI: 10.1145/3465481.3470079
|View full text |Cite
|
Sign up to set email alerts
|

5Greplay: a 5G Network Traffic Fuzzer - Application to Attack Injection

Abstract: The fifth generation of mobile broadband is more than just an evolution to provide more mobile bandwidth, massive machine-type communications, and ultra-reliable and low-latency communications. It relies on a complex, dynamic and heterogeneous environment that implies addressing numerous testing and security challenges. In this paper we present 5Greplay, an open-source 5G network traffic fuzzer that enables the evaluation of 5G components by replaying and modifying 5G network traffic by creating and injecting … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
25
0

Year Published

2022
2022
2025
2025

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 28 publications
(25 citation statements)
references
References 7 publications
(8 reference statements)
0
25
0
Order By: Relevance
“…The work described in this paper extends the research and open-source solution 5Greplay, presented by the authors in [2], [3]. Notably, in this paper, we present an ontology based on mutation techniques for the modelling of cybersecurity attacks and its application to 5G networks, that we demonstrate by means of our 5G network traffic fuzzer, 5Greplay.…”
mentioning
confidence: 67%
See 3 more Smart Citations
“…The work described in this paper extends the research and open-source solution 5Greplay, presented by the authors in [2], [3]. Notably, in this paper, we present an ontology based on mutation techniques for the modelling of cybersecurity attacks and its application to 5G networks, that we demonstrate by means of our 5G network traffic fuzzer, 5Greplay.…”
mentioning
confidence: 67%
“…We embody our ontology in our network traffic fuzzer, 5Greplay 2 . It is an open-source solution that generates mutants of the network traffic by using mutant operators, in order to perform specified security and functional tests on a system, as well as, fuzzing testing.…”
Section: G Network Fuzzermentioning
confidence: 99%
See 2 more Smart Citations
“…In the on-going work presented here, we aim to tackle the above challenges by: (1) producing real-world datasets for AI training, especially for 5G and encrypted network traffic thanks to our open source 5Greplay tool [3]; (2) enabling explainability features of existing AI algorithms in our different AI-based systems, such as MMT-Probe for anomaly detection and MMT-RCA for Root Cause Analysis; and, (3) considering the security threats that emerge from the rapid adoption of AI algorithms in 5G/IoT networks. Existing challenges of AI in 5G/IoT networks motivate us to make the ML models more accurate, explainable and robust before they are integrated into complex systems.…”
Section: Proposalmentioning
confidence: 99%