Investigating the Detectability of Hidden Communication in 5G Core Networks
Beschreibung
Mobile networks are now ubiquitous and part of our everyday lives. Due to their important role in public security and safety, they are classified as critical infrastructure and need to be protected accordingly. At the same time, 5G shifted from a closed system to a set of microservices designed to be deployed in dynamic environments such as (public) clouds. This large number of involved systems and components increases the risk of infiltration by bad actors through security flaws and supply chain issues. To understand how a compromised core network can be exploited, we described a steganography based system able to execute various attacks and implemented a proof-of-concept. This framework should now be extended and evaluated against state-of-the-art detection mechanisms.
Objectives:
• Implement the framework in an open source 5G core network (such as Open5GS, Free5GC and OpenAir-Interface).
• Perform tests on the feasibility of various attacks in this framework.
• Evaluate 5G intrusion detection and prevention approaches described in the literature.
Voraussetzungen
• Basic understanding of cellular radio communication (such as LTE, 5G NR) specifically their architecture and protocols.
• Basic knowledge of network security.
• Solid knowledge of C/C++ and/or Golang.
Please include:
• a short CV
• a current overview of your grades
in your application.
For any questions or further details regarding this thesis and the application process, please don’t hesitate to contact:
• Julian Sturm (TUM), Email: julian.sturm@tum.de
Kontakt
Julian Sturm (TUM), Email: julian.sturm@tum.de
Betreuer:
Finding and Identifying Publicly Accessible 5G Core Networks
5G, 5G Core, Security, IP
Beschreibung
Mobile networks are now ubiquitous and part of our everyday lives. Due to their important role in public security and safety, they are classified as critical infrastructure and need to be protected accordingly. At the same time, 5G shifted from a closed system to a set of microservices designed to be deployed in dynamic environments such as (public) clouds. Previous research shows, that often critical systems are identifiable from the internet with little to no protection (Bodenheim et al. 2014). For 5G however, such data is lacking.
Objectives:
• Develop methods to identify components of open source 5G core networks (such as Open5GS, Free5GC and OpenAirInterface), as well as commercial networks based on their network fingerprint.
• Perform internet scanning to search for publicly accessible networks.
• Evaluate the prevalence of deployed security mechanisms (if scans are successful).
Voraussetzungen
• Basic understanding of cellular radio communication (such as LTE, 5G NR) specifically their architecture and protocols.
• Solid understanding of IP networks, specifically their architecture and protocols.
• Solid knowledge of Python or another suitable programming language.
Please include:
• a short CV
• a current overview of your grades
in your application.
For any questions or further details regarding this thesis and the application process, please don’t hesitate to contact:
• Julian Sturm (TUM), Email: julian.sturm@tum.de
Kontakt
Julian Sturm (TUM), Email: julian.sturm@tum.de