<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>International Journal of Productivity and
Performance Management</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="doi">10.1109/MILCOM.2002.1179634</article-id>
      <title-group>
        <article-title>Novel Intrusion Detection System for 5G1</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Maksim Iavich</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Avtandili Gagnidze</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Giorgi Iashvili</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Sergei Simonov</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Razvan Bocu</string-name>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Caucasus University</institution>
          ,
          <addr-line>1 Paata Saakadze St, Tbilisi, 0132</addr-line>
          ,
          <country country="GE">Georgia</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>East European University</institution>
          ,
          <addr-line>4 Shatili St., 0178 Tbilisi</addr-line>
          ,
          <country country="GE">Georgia</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Transilvania University of Brasov</institution>
          ,
          <addr-line>500036 Brasov</addr-line>
          ,
          <country country="RO">Romania</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2021</year>
      </pub-date>
      <volume>12109</volume>
      <issue>5</issue>
      <fpage>00006</fpage>
      <lpage>6</lpage>
      <abstract>
        <p>The telecommunication industry is majorly transforming towards 5G networks. It needs to satisfy the needs of the new and existing users. The users and the customers need much better quality of the corresponding services and they need the corresponding security in order to secure the transmitting data and other services. Therefore, the mobile leading networks must provide much better quality of an experience and security, and they must improve the performance for the services they provide. Novel services envisioned by 5G, new networking, service deployment, the new processing technologies and the storage is required. The mentioned technologies will involve the new security problems for the 5G systems. The world scientists are seriously working on analyzing the 5G security. The researchers have identified the existing problems of 5G systems. Our analysis illustrates the basics reasons of security problems in 5G. The researchers have found the vulnerabilities in 5G, which give the attackers opportunity to integrate the malicious code and to run it. MiTM, MNmap and Battery drain attacks can be successfully implemented on 5G. Our paper analyzes an existing security problems of 5G. As the result, we offer the new Intrusion Detection System using machine-learning approaches. The paper offers an integration of this intrusion detection systems into an existing 5G architecture. We offer the methodology and a pseudo code of this system.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;5G</kwd>
        <kwd>security</kwd>
        <kwd>intrusion detection systems</kwd>
        <kwd>ids</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>The scale of the traffic needed for the wireless networks and the quantity of mobile and IoT devices are
enhancing very fast, because of the different factors. The telecommunication industry is majorly
transforming towards 5G networks and it has to satisfy the requirements of the target users. The 5G wireless
networks must provide very high data rates and much higher coverage by means of dense base station
deployment. It must have high capacity, much better QoS and it must have the very small latency. All this
will involve the new technologies, and, as expected, these technologies cause new security problems for
the 5G systems. The scientists are analyzing the security of 5G technology and they have successfully
discovered some of the security problems.</p>
      <p>5G will deal with the critical infrastructure, which requires rather high security level to ensure security
of the critical infrastructure and of the whole society. For the instance, a security attack on the hypothetical
online power supply system is critical for the electronic and electrical systems. As we can see, it is very
important to analyze and emphasize the existing security problems in 5G networks and to offer the novel
solution, which will make them secure. We have analyzed the difference between 5G and 4G security
architecture</p>
      <p>These architectures are pretty much similar. The network nodes in 5G and 4G that are needed for
security, and the communication links have very much in common. The security mechanisms of these
systems can be grouped like following: One group contains the mechanisms used to offer users the safe
access to the different services and to make the system safe against the vulnerabilities connected with an
air interface, that can be located between some device and the radio node. The second group contains
other safety mechanisms for the network access. These mechanisms are needed to transfer the signaling
and user’s data from the nodes of radio to the core network. The security architecture of 5G and 4G is
shown on Fig.1</p>
    </sec>
    <sec id="sec-2">
      <title>2. Intrusion detection systems</title>
      <p>Nowadays, ten years ago and even at the very beginning of “IT revolution”, cyber-defense systems
held special place and that’s logical: nobody really wants to be hacked. Security specialists have used
several different tools to provide users protection. Some of these tools are: antiviruses, firewalls, IDS
(intrusion detection systems) and IPS (intrusion prevention systems). Let’s take a brief look at each of
them. Antivirus is a software which is installed on the host machine and is checking system processes
for a suspicious activity. Firewall is a software which is, the most often, installed between two
networks and analyses a network traffic blocking the suspicious one. As for the intrusion detection
systems, these pieces of software are targeted on analyzing network traffic and checking if there is
any suspicious activity in there. Intrusion detection systems are different from Firewall. Firewall
controls traffic between two networks but if someone performs attack inside the network, the firewall
will not be able to identify it. For a purpose of fortifying our network, we can add an intrusion
detection system inside that network, which will sniff for traffic and send out an alert that something
is wrong. By itself, an intrusion prevention system does not perform any action, it only can notify us
about malicious traffic and log the incident to the file. The one who takes care “about” bad traffic is
an IPS [], which stands for intrusion prevention system. This piece of software receives the alarm and
perform corresponding action whether it will be dropping a packet or letting it to the quarantine. In
addition, it is not necessary to have two separate devices for IDS and IPS, both of them can be
integrated in the router. Therefore, as we can see, IDS and IPS are just a specific software, which help
us extending our security. As for the IDS role in the 5G infrastructure, it can help us detecting DoS
and software defined (brute force for example) attacks on the fly, even before the data is delivered to
its destination. Of course, there will be some problems during the implementation, because such a
system will require computing power, which is not really common if we speak about non-core
segment of the system. A lot of concurrent traffic has to be analyzed at the one unit of time, that’s
why a deployment of the IDS is so important.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Novel Security mechanism</title>
      <p>Our idea is to integrate the new server software with the IDS embedded into it to the 5G base station.
The visualization of the approach is illustrated on the figure 2.</p>
      <p>Modern 5G intrusion detection systems are well known for using a KDD99 [4-7] dataset and
machine learning algorithms [8-11]. A few words about this technology: Machine learning is a methodology
of receiving processed output based on the input, for example: we supply the model (model is specific
neural network which processes the input and gives us an output) with images of animals and want it to
guess if what is the animal it has received. Machine learning algorithms use datasets [12,13]. Datasets are
files that contain specific information about something, animals for example. Each line must contain
parameters of this animal and, the most important, the conclusion about what that animal is. Using datasets,
we can train our model to recognize and process information. An example of the dataset can be found on
the figure 3 (each and every line contains an information about the attack and a name of the attack itself)</p>
      <p>To improve over existing approach, we offer adding a CIC-IDS datasets along with KDD99, which
will help us to get protection not only from KDD99 attacks, but also from different denial of service attacks.
Our intrusion detection system is trained to use two CIC-IDS style datasets. The first dataset contains the
information about the following DOS[12,13] attacks: 'MSSQL', 'LDAP', 'Syn', 'NetBIOS', 'UDPLag',
'UDP' and weights 341 MB, let us call it DOS1. As for the second database, it only contains the
information about the reflected ‘Portmap’ attack and its size is 89 MB, let us call it DOS2.</p>
      <p>Also, KDD99 was separated in two different datasets, one for training and one for testing. The
training one stores 90% of the information while the test dataset includes the remaining 10%. DOS1 and
DOS2 datasets were also divided into two separate datasets, each of them. The training dataset stores 80%
of the data, while the test dataset contains remaining 20%. Both of these datasets are split using the same
method, which was chosen because of the best accuracy results after the training. The model itself is
being trained with each dataset separately. In the case of the KDD99 dataset, model accuracy is
0.96670491252916389, in the case of DOS1 is 0.9942894736842107 and in the case of DOS2 is
0.9998966703182065.</p>
      <p>When the training process is finished, the system asks for input, which is being extracted from the
network sniffer. First, the input is checked for the attacks contained in the KDD99 dataset. If
corresponding attack pattern is found, it sends a signal to the intrusion protection system. In the case
when finding pattern for the attack fails, the system then trying to check data relative to the attack patterns
which are stored in the DOS1 dataset. If an attack pattern is identified, a program sends a signal to the
intrusion protection system. The same process is applied to the DOS2 dataset, if the attack pattern was not
determined. If the attack pattern is failed to be identified, the intrusion detection system gives us an output
that the traffic is legitimate and goes after processing the next input.</p>
      <p>The algorithmic core of the intrusion detection system is explained by the following pseudo code.
The pseudo code of the idea is shown below:</p>
    </sec>
    <sec id="sec-4">
      <title>4. Relevance of the research</title>
      <p>Our analyses have shown us the concrete reasons, which can be the security concern for 5G networks
[1-3]. These reasons are:


5G system has a very large exposure to the different software attacks and it has a lot of entry
points for the attackers, because of the virtualization 5G systems are mostly based on the software
mechanisms. The software security attacks can be implemented on 5G.</p>
      <p>Because of the new functionality, the parts of some network equipment and some network
functions are very sensitive to the different attacks. Different base stations and the key
management functions in the network are sensitive to the attacks.



</p>
      <p>Because network operators rely on concrete suppliers, the new attacks can be implemented.
The great number of IT applications need 5G network, it makes 5G sensitive to attacks, which
influence on integrity and availability.</p>
      <p>Because of large number of devices DoS and DDoS attacks are much more relevant.</p>
      <p>Because of the network slicing, attackers can attack the different slices.</p>
    </sec>
    <sec id="sec-5">
      <title>5. Experiments</title>
      <p>We have created a small test laboratory using 20 RASPBERRY PI devices, we have also used 20
modems with sim cards. We installed our IDS software on the server. Attacks replicated by us are the
following: BACK, LAND, POD, SMURF, NEPTUNE, NMAP, TEARDROP, BUFFER_OVERFLOW,
LOADMODULE, ROOTKIT FTP_WRITE, GUESS_PASSWD, IMAP, MULTIHOP, PHF, SPY,
PROBE, IPSWEEP, PORTSWEEP, SATAN, MSSQL, Portmap and LDAP.</p>
      <p>It must be emphasized that 5G system can be vulnerable to these types of attacks.</p>
      <p>We have simulated the attacks and wrote the traffic down using a network sniffer, then all the traffic was
examined. parsed all the parameters that are relevant for our KDD99 and DOS [8, 9] samples were
parsed, using the Python programming language. The output was transformed to the format of the original
datasets. After this, we all this information was passed to our IDS system which performed the analysis.</p>
    </sec>
    <sec id="sec-6">
      <title>6. Results</title>
      <p>These results prove that the IDS is rather useful and it can be used as the prototype version of the future
real-world IDS system.</p>
      <p>As the result, we received the novel IDS oriented on 5G attacks. The IDS is trained using
machine learning algorithms. It is trained using KDD99 dataset and the DOS/DDOS attacks dataset.
The IDS is trained using the attacks vectors, which are vulnerable for 5G. These attacks vectors were
identified based on our research.</p>
    </sec>
    <sec id="sec-7">
      <title>7. Discussion</title>
    </sec>
    <sec id="sec-8">
      <title>8. Conclusion</title>
      <p>After conducting the corresponding experiments, we have identified that IDS is doing its job
rather well, but, unfortunately, it still has some efficiency problems. We are working on improving
the efficiency, optimization and creating our own training patterns for IDS.</p>
      <p>5G networks give us more bandwidth and speed, which can also be a huge downside: Think about
what hackers can do. DoS, DDoS, reflected DDoS and other volumetric attacks will become even
stronger. Also, some critical infrastructure will hardly depend on the 5G, smart cars, hospitals, power
plants, this means that any attack can on these can be critical: taking a digital hostage in the face of
the hospital`s inner network is a joke no more.</p>
      <p>5G is a modern, rapid technology that requires corresponding security systems to protect users
and the critical infrastructure. Using neural networks and machine learning to create a smart and
flexible software can help us in attacks mitigation and prevention</p>
      <p>The offered IDS is aiming to provide a good level of security and accuracy, but it still has some
efficiency problems. Certain work must be conducted in order to achieve the secure 5G services.</p>
    </sec>
    <sec id="sec-9">
      <title>9. Acknowledgments</title>
      <p>The work was finances by Shota Rustaveli National Science Foundation and was conducted in the
frame of CARYS-19-121 grant.
10. References
[1] Huawei 5G Security White Paper,
https://www-file.huawei.com/-/media/corporate/pdf/trustcenter/huawei-5g-security-white-paper-4th.pdf, 2019.
[2] 5G Americas: The evolution of Security in 5G,
https://www.5gamericas.org/files/4715/6450/2267/5G_Security_White_Paper_07-26-19_FINAL.pdf, 2019.
[3] Report on EU coordinated risk assessment of 5G,
https://ec.europa.eu/commission/presscorner/detail/en/IP_19_6049, 2019.
[4] Kumar V., Das A.K., Sinha D. (2020) Statistical Analysis of the UNSW-NB15 Dataset for
Intrusion Detection. In: Das A., Nayak J., Naik B., Pati S., Pelusi D. (eds) Computational
Intelligence in Pattern Recognition. Advances in Intelligent Systems and Computing, vol 999.</p>
      <p>Springer, Singapore. https://doi.org/10.1007/978-981-13-9042-5_24.</p>
    </sec>
  </body>
  <back>
    <ref-list />
  </back>
</article>