SMDFbs: Specification-Based Misbehavior Detection for False Base Stations
Abstract
:1. Introduction
- We introduced an innovative false base station attack detection technique founded on behavior-rule specification-based approach. In contrast to detection methods, such as machine learning-based techniques require prolonged learning period and impose heavy computational burden, our proposed approach relies on accurate system specifications as basis in systematically defining the policies or rules. This method significantly eliminates machine learning time and provides an efficient and robust security solution.
- We enhanced the 5G RAN simulator, UERANSIM, within the 5G ecosystem by implementing a structural approach known as Functional split. Additionally, we incorporated the 3GPP Propagation model to construct a simulation environment that facilitates seamless Inter gNB-DU Handover.
- We executed a state machine using experimentally generated data to evaluate the performance and overhead. We demonstrated the effectiveness of the proposed method through comparative analysis with seven (7) contemporary machine learning algorithms.
2. Background and Security Threats
2.1. 5G Architecture
2.2. Security Threat from a False Base Station
3. Related Works
3.1. Detecting False Base Stations
3.2. Anomaly Detection Based on Behavior Rule Specifications
4. Proposed System
4.1. Adversarial Model
4.2. Derivation of Normal Behavior Rules
4.3. Design of SMDFbs Software
4.4. Verification of SMDFbs Software Design
4.5. Compliance Statistical Analysis
5. Experiments
5.1. Experimental Environment
- The Reckless attacker acts indiscriminately, generating a random number between [0, 1]. If the number is 0.05 or higher (indicating a 95% attack probability), they initiate the attack. As soon as the scenario begins, they continuously attack throughout its duration. They emit a signal 1.5 times stronger than the surrounding signals to entice nearby UEs to connect.
- The Opportunistic attacker operates only when noise occurs, reducing the probability of detection. They attack for 5 min every 10 min throughout the scenario’s duration. Like the Reckless attacker, they send out a signal 1.5 times stronger than the surrounding signals to induce nearby UEs to connect.
- The Hidden attacker generally behaves like the Opportunistic attacker, but with a 20% attack probability. Furthermore, they transmit at the same signal strength as nearby base stations, making detection more challenging.
5.2. Evaluation
6. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- SA1. 3GPP TS 22.261; Service Requirements for the 5G System. 3GPP: Sophia-Antipolis, France, 2023.
- SA3. 3GPP TR 33.809; Study on 5G Security Enhancements against False Base Stations (FBS). 3GPP: Sophia-Antipolis, France, 2023.
- Karaçay, L.; Cheng, S.M.; Kaliski, R.; Hung, C.F. A Network-Based Positioning Method to Locate False Base Stations. IEEE Access 2021, 9, 111368–111382. [Google Scholar] [CrossRef]
- SA3. 3GPP TS 33.501; Security Architecture and Procedures for 5G System. 3GPP: Sophia-Antipolis, France, 2023.
- Chlosta, M.; Rupprecht, D.; Pöpper, C.; Holz, T. 5G SUCI-catchers: Still catching them all? In Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June–2 July 2021.
- Park, H.Y.; Kim, T.G.; Duguma, D.G.; Kim, J.; You, I.; Susilo, W. An Enhanced Group Key-Based Security Protocol to Protect 5G SON Against FBS. Comput. Syst. Sci. Eng. 2023, 45, 1145–1165. [Google Scholar] [CrossRef]
- Nakarmi, P.K.; Ersoy, M.A.; Soykan, K.E.U. Norrman, Murat: Multi-rat false base station detector. arXiv 2021, arXiv:2102.08780. [Google Scholar]
- Nakarmi, P.K.; Sternby, J.; Ullah, I. Applying Machine Learning on RSRP-based Features for False Base Station Detection. In Proceedings of the 17th International Conference on Availability, Reliability and Security, Vienna, Austria, 23–26 August 2022; pp. 1–7. [Google Scholar]
- Jin, J.; Lian, C.; Xu, M. Rogue Base Station Detection Using A Machine Learning Approach. In Proceedings of the 2019 28th Wireless and Optical Communications Conference(WOCC), Beijing, China, 9–10 May 2019; pp. 1–5. [Google Scholar]
- Park, H.; Son, D.; Kim, G.; You, I. A study on machine learning-based false base station detection method in 5G. In Proceedings of the 6th International Symposium on Mobile Internet Security (MobiSec’22), Jeju Island, Republic of Korea, 15–17 December 2022; pp. 1–7. [Google Scholar]
- Ali, A.; Fischer, G. Enabling Fake Base Station Detection through Sample-based Higher Order Noise Statistics. In Proceedings of the 2019 42nd International Conference on Telecommunications and Signal Processing (TSP), Budapest, Hungary, 1–3 July 2019; pp. 695–700. [Google Scholar]
- RAN 1. 3GPP TR 38.901; Study on Channel Model for Frequencies from 0.5 to 100 GHz. 3GPP: Sophia-Antipolis, France, 2022.
- RAN 3. 3GPP TS 38.401; NG-RAN; Architecture Description. 3GPP: Sophia-Antipolis, France, 2023.
- Masini, G. A guide to ng-ran architecture. In 5G and Beyond: Fundamentals and Standards; Springer: Cham, Switzerland, 2021; pp. 233–258. [Google Scholar]
- Bertenyi, B.; Burbidge, R.; Masini, G.; Sirotkin, S.; Gao, Y. Ng radio access network (ng-ran). J. ICT Stand. 2018, 6, 59–76. [Google Scholar] [CrossRef]
- SLS Team. Cell-Site Simulators/IMSI Catchers; Electronic Frontier Foundation: San Francisco, CA, USA, 2023. [Google Scholar]
- Yomna, N. Gotta Catch’Em All: Understanding How IMSI-Catchers Exploit Cell Networks; Electronic Frontier Foundation: San Francisco, CA, USA, 2019. [Google Scholar]
- Li, Z.; Wang, W.; Wilson, C.; Chen, J.; Qian, C.; Jung, T.; Zhang, L.; Liu, K.; Li, X.; Liu, Y. FBS-Radar: Uncovering Fake Base Stations at Scale in the Wild. In Proceedings of the 2017 Network and Distributed System Security Symposium, San Diego, CA, USA, 26 February–1 March 2017. [Google Scholar]
- Bin, Q.; Ziwen, C.; Yong, X.; Liang, H.; Sheng, S. Rogue Base Stations Detection for Advanced Metering Infrastructure Based on Signal Strength Clustering. IEEE Access 2020, 8, 158798–158805. [Google Scholar] [CrossRef]
- Shin, J.; Shin, Y.; Park, J.G. Network Detection of Fake Base Station using Automatic Neighbour Relation in Self-Organizing Networks. In Proceedings of the 2022 13th International Conference on Information and Communication Technology Convergence (ICTC), Jeju Island, Republic of Korea, 19–21 October 2022; pp. 968–970. [Google Scholar] [CrossRef]
- Sharma, V.; You, I.; Yim, K.; Chen, I.R.; Cho, J.H. BRIoT: Behavior Rule Specification-Based Misbehavior Detection for IoT-Embedded Cyber-Physical Systems. IEEE Access 2019, 7, 118556–118580. [Google Scholar] [CrossRef]
- Astillo, P.V.; Choudhary, G.; Duguma, D.G.; Kim, J.; You, I. TrMAps: Trust Management in Specification-Based Misbehavior Detection System for IMD-Enabled Artificial Pancreas System. IEEE J. Biomed. Health Inform. 2021, 25, 3763–3775. [Google Scholar] [CrossRef] [PubMed]
- UPPAAL: Integrated Tool Environment for Modeling, Validation and Verification. Available online: http://uppaal.org (accessed on 9 January 2021).
- UERANSIM. Available online: https://github.com/aligungr/UERANSIM (accessed on 22 October 2023).
Verification Property | Verification Type | Query | Normal | Abnormal |
---|---|---|---|---|
The system does not enter a deadlock | Safety | A[] not deadlock | Satisfied | Unsatisfied |
Behavior rules from 1 to 8 were evaluated once. | Reachability | E<>forall (i:id_t)Checker(i).Error | Satisfied | Unsatisfied |
Environment of Dataset Generation | |
---|---|
Operation System | Ubuntu 22.04-amd64-server LTS |
5G RAN Simulator | UERANSIM-LITE |
UE | EC2 t2.micro |
DU | EC2 t2.micro |
CU | EC2 t3.2xlarge |
False Base Station | EC2 t2.micro |
State Machine and Machine Learning Test Environment | |
Operation System | Windows 10 |
CPU | i7-12700KF |
RAM | DDR4 64.0 GB |
Graphic Card P | GeForce RTX 3070 Ti |
Program Language | Python 3.10 |
ML Library | Scikit-Learn 1.1.2 |
XGBoost Library | Python XGBOOST 1.7.3 |
Algorithms | Computation Overhead (ms) | Memory Usage (MB) |
---|---|---|
Proposed Method | 0.820 | 427 |
SVM | 2321.9216 | 621 |
KNN | 153.9976 | 628 |
Decision Tree | 17.4839 | 625 |
Naive Bayes | 13.0920 | 619 |
Random Forest | 287.5588 | 649 |
XGBoost | 520.9858 | 675 |
MLP | 8142.4864 | 648 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Park, H.; Astillo, P.V.B.; Ko, Y.; Park, Y.; Kim, T.; You, I. SMDFbs: Specification-Based Misbehavior Detection for False Base Stations. Sensors 2023, 23, 9504. https://doi.org/10.3390/s23239504
Park H, Astillo PVB, Ko Y, Park Y, Kim T, You I. SMDFbs: Specification-Based Misbehavior Detection for False Base Stations. Sensors. 2023; 23(23):9504. https://doi.org/10.3390/s23239504
Chicago/Turabian StylePark, Hoonyong, Philip Virgil Berrer Astillo, Yongho Ko, Yeongshin Park, Taeguen Kim, and Ilsun You. 2023. "SMDFbs: Specification-Based Misbehavior Detection for False Base Stations" Sensors 23, no. 23: 9504. https://doi.org/10.3390/s23239504
APA StylePark, H., Astillo, P. V. B., Ko, Y., Park, Y., Kim, T., & You, I. (2023). SMDFbs: Specification-Based Misbehavior Detection for False Base Stations. Sensors, 23(23), 9504. https://doi.org/10.3390/s23239504