DC Field | Value | Language |
---|---|---|
dc.contributor.advisor | Kim, Yongdae | - |
dc.contributor.advisor | 김용대 | - |
dc.contributor.author | Hwang, Yeongbin | - |
dc.date.accessioned | 2023-06-26T19:33:38Z | - |
dc.date.available | 2023-06-26T19:33:38Z | - |
dc.date.issued | 2023 | - |
dc.identifier.uri | http://library.kaist.ac.kr/search/detail/view.do?bibCtrlNo=1032942&flag=dissertation | en_US |
dc.identifier.uri | http://hdl.handle.net/10203/309833 | - |
dc.description | 학위논문(석사) - 한국과학기술원 : 전기및전자공학부, 2023.2,[iv, 24 p. :] | - |
dc.description.abstract | 5G StandAlone (SA) service was launched by T-Mobile in 2020, and the service area of the 5G SA network is increasingly expanding. However, there is little research on security in the 5G SA network for some reason. First, it is difficult to build a test environment for security research due to a lack of commercial equipment and open-source projects. In addition, since the core network is a black-box environment, it is quite hard to check the direct results of network testing. Therefore, existing approaches are only focused on finding standard vulnerabilities by applying formal methods based on specifications, and there are limitations that cannot find for other flaws, such as implementation flaws. In this work, we propose a first approach that performs stateful uplink testing while considering various attack scenarios in the 5G SA network. We analyzed the capabilities of MitM (Man-in-the-Middle) and Fake UE, which are possible attack models for networks, and classified the attack scenarios into four cases. Then, the test was done by applying these cases to all states that could happen during the UE's registration process. In addition, we categorized states according to security features and made it easy to create test cases for each network state machine. We evaluated our system with 4 core networks and discovered 16 implementation flaws: 11 cases can cause DoS (Denial-of-Sevice) attacks, 1 case can cause a eavesdropping attack, and 1 case can cause an impersonate attack. | - |
dc.language | eng | - |
dc.publisher | 한국과학기술원 | - |
dc.subject | 5G StandAlone▼aVulnerability analysis▼aImplimentation flaw▼aState machine▼aCellular network | - |
dc.subject | 5G 네트워크▼a취약점 분석▼a구현 취약점▼a상태 기계▼a셀룰러 네트워크 | - |
dc.title | Stateful black box uplink testing for 5G StandAlone network | - |
dc.title.alternative | 5G StandAlone 네트워크를 대상으로한 다양한 상태 기반 블랙박스 테스팅 | - |
dc.type | Thesis(Master) | - |
dc.identifier.CNRN | 325007 | - |
dc.description.department | 한국과학기술원 :전기및전자공학부, | - |
dc.contributor.alternativeauthor | 황영빈 | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.