5G networks vulnerable to adversarial ML attacks

2022-08-27 00:10:48 By : Ms. Rose Huang

A research paper published this week has called into question the security protections placed on 5G networks.

A team of academic researchers from the University of Liechtenstein claimed that a surprisingly simple strategy for jamming networks could allow an attacker with zero insider knowledge to disrupt traffic on next-generation networks, even with advanced defenses. The key to the attacks, according to the research team, is the use of an adversarial machine learning (ML) technique that does not rely on any prior knowledge or reconnaissance of the targeted network.

In a research paper published on July 4, the team described how the shift to 5G networks has enabled a new class of adversarial machine learning attacks. The paper, titled "Wild Networks: Exposure of 5G Network Infrastructures to Adversarial Examples," was authored by Giovanni Apruzzese, Rodion Vladimirov, Aliya Tastemirova and Pavel Laskov.

As 5G networks are deployed, and more devices begin to use those networks to move traffic, the current methods of managing network packets no longer hold up. To compensate for this, the researchers noted, many carriers are planning to use machine learning models that can better sort and prioritize traffic.

Those machine learning models proved to be the weak point for the attack, as confusing them and redirecting their priorities will let attackers tinker with how traffic is handled. The researchers suggested that by flooding the network with garbage traffic, a technique known as a "myopic attack" can take down a 5G mobile setup.

The base idea, the researchers wrote, lies in making slight changes to the data set. By doing something as simple as a data packet request appended with additional data, a machine learning setup would be fed unexpected information. Over time, those poisoned requests could modify the behavior of the machine learning software to thwart legitimate network traffic and ultimately slow or stop the flow of data.

While the real-world results would depend on the type of 5G network and machine learning model being deployed, the research team's academic tests produced resounding results. In five out of six lab experiments performed, the network was taken down using a technique that involved no knowledge of the carrier, its infrastructure or machine learning technology.

"It is simply required to append junk data to the network packets," Apruzzese told SearchSecurity. "Indeed, [one example] targets a model that is agnostic of the actual payload of network packets."

The results are relatively benign in terms of the long-term effects, but by triggering service outages and slowing network traffic, they would certainly cause a problem for those hoping to use the targeted network.

More important, the team said, is how the research underscores the need for a better model to test and address vulnerabilities in the machine learning models that future networks plan to deploy in the wild.

"The 5G paradigm enables a new class of harmful adversarial ML attacks with a low entry barrier, which cannot be formalized with existing adversarial ML threat models," the team wrote. "Furthermore, such vulnerabilities must be proactively assessed."

Adversarial machine learning and artificial intelligence have been concerns within the infosec community for some time. While the number of attacks in the wild is believed to be extremely small, many experts have cautioned that algorithmic models can be vulnerable to poisoned data and influenced by threat actors.

Discover how modern application delivery controllers and web application firewalls can improve network provisioning processes and...

Bandwidth and throughput both indicate network performance. The terms are often used together, but bandwidth refers to capacity, ...

The authors of a Cisco DevNet Professional DEVCOR study guide provide insights about the growth of network automation, CI/CD and ...

Sustainability as a business initiative has rocketed up the priority list as investors, consumers and legislators demand ...

Latest PPI data reveals a 3.1% month-over-month uptick for host computers and servers, while storage prices drop slightly and ...

The Federal Trade Commission is considering new data privacy rules that would address business data collection, analysis and ...

Whether organizations automate their log monitoring within Windows desktops or inspect them manually, logs can offer IT ...

While the four most common browsers -- Chrome, Edge, Firefox and Safari -- have largely the same feature sets, there are subtle ...

Many user tasks rely on the browser used, but not all browsers are well suited to these tasks. Learn the strengths and weaknesses...

Azure offers three VM pricing models. Learn the benefits and drawbacks of each, which model works best for you and discount ...

It's easy for an unanticipated glitch to create a significant disruption to a cloud environment. To get around these pitfalls, ...

CloudWatch Logs imposes certain limits and service quotas related to log data ingestion and other areas. Fortunately, in many ...

Archana Manjunatha's career in financial technology took her to the trading floors in India where she learned the ropes of ...

Fast-growing UK altnet signals long-term ambition to become a national broadband provider with the launch of a new Yorkshire ...

Service from comms tech provider and IT giant connects smartphones to multiple network slices simultaneously

All Rights Reserved, Copyright 2000 - 2022, TechTarget Privacy Policy Cookie Preferences Do Not Sell My Personal Info