=Paper= {{Paper |id=Vol-2915/paper4 |storemode=property |title=Novel Intrusion Detection System for 5G |pdfUrl=https://ceur-ws.org/Vol-2915/paper4.pdf |volume=Vol-2915 |authors=Maksim Iavich,Avtandil Gagnidze,Giorgi Iashvili,Sergei Simonov,Razvan Bocu |dblpUrl=https://dblp.org/rec/conf/ivus/IavichGISB21 }} ==Novel Intrusion Detection System for 5G== https://ceur-ws.org/Vol-2915/paper4.pdf
Novel Intrusion Detection System for 5G1
Maksim Iavicha, Avtandili Gagnidzeb, Giorgi Iashvilia, Sergei Simonovb, Razvan Bocuc


a
  Caucasus University, 1 Paata Saakadze St, Tbilisi, 0132, Georgia
b
  East European University, 4 Shatili St., 0178 Tbilisi, Georgia
c
  Transilvania University of Brasov, 500036 Brasov, Romania


                 Abstract
                 The telecommunication industry is majorly transforming towards 5G networks. It needs to
                 satisfy the needs of the new and existing users. The users and the customers need much better
                 quality of the corresponding services and they need the corresponding security in order to
                 secure the transmitting data and other services. Therefore, the mobile leading networks must
                 provide much better quality of an experience and security, and they must improve the
                 performance for the services they provide. Novel services envisioned by 5G, new networking,
                 service deployment, the new processing technologies and the storage is required. The
                 mentioned technologies will involve the new security problems for the 5G systems. The world
                 scientists are seriously working on analyzing the 5G security. The researchers have identified
                 the existing problems of 5G systems. Our analysis illustrates the basics reasons of security
                 problems in 5G. The researchers have found the vulnerabilities in 5G, which give the attackers
                 opportunity to integrate the malicious code and to run it. MiTM, MNmap and Battery drain
                 attacks can be successfully implemented on 5G.

                 Our paper analyzes an existing security problems of 5G. As the result, we offer the new
                 Intrusion Detection System using machine-learning approaches. The paper offers an integration
                 of this intrusion detection systems into an existing 5G architecture. We offer the methodology
                 and a pseudo code of this system.

                 Keywords
                 5G, security, intrusion detection systems, ids.

1. Introduction
    The scale of the traffic needed for the wireless networks and the quantity of mobile and IoT devices are
enhancing very fast, because of the different factors. The telecommunication industry is majorly
transforming towards 5G networks and it has to satisfy the requirements of the target users. The 5G wireless
networks must provide very high data rates and much higher coverage by means of dense base station
deployment. It must have high capacity, much better QoS and it must have the very small latency. All this
will involve the new technologies, and, as expected, these technologies cause new security problems for
the 5G systems. The scientists are analyzing the security of 5G technology and they have successfully
discovered some of the security problems.




1
 Copyright 2021 for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0
International (CC BY 4.0).
     5G will deal with the critical infrastructure, which requires rather high security level to ensure security
of the critical infrastructure and of the whole society. For the instance, a security attack on the hypothetical
online power supply system is critical for the electronic and electrical systems. As we can see, it is very
important to analyze and emphasize the existing security problems in 5G networks and to offer the novel
solution, which will make them secure. We have analyzed the difference between 5G and 4G security
architecture


     These architectures are pretty much similar. The network nodes in 5G and 4G that are needed for
security, and the communication links have very much in common. The security mechanisms of these
systems can be grouped like following: One group contains the mechanisms used to offer users the safe
access to the different services and to make the system safe against the vulnerabilities connected with an
air interface, that can be located between some device and the radio node. The second group contains
other safety mechanisms for the network access. These mechanisms are needed to transfer the signaling
and user’s data from the nodes of radio to the core network. The security architecture of 5G and 4G is
shown on Fig.1




Figure 1: Security architecture of 5G and 4G

2. Intrusion detection systems
    Nowadays, ten years ago and even at the very beginning of “IT revolution”, cyber-defense systems
    held special place and that’s logical: nobody really wants to be hacked. Security specialists have used
    several different tools to provide users protection. Some of these tools are: antiviruses, firewalls, IDS
    (intrusion detection systems) and IPS (intrusion prevention systems). Let’s take a brief look at each of
    them. Antivirus is a software which is installed on the host machine and is checking system processes
    for a suspicious activity. Firewall is a software which is, the most often, installed between two
    networks and analyses a network traffic blocking the suspicious one. As for the intrusion detection
    systems, these pieces of software are targeted on analyzing network traffic and checking if there is
    any suspicious activity in there. Intrusion detection systems are different from Firewall. Firewall
    controls traffic between two networks but if someone performs attack inside the network, the firewall
    will not be able to identify it. For a purpose of fortifying our network, we can add an intrusion
    detection system inside that network, which will sniff for traffic and send out an alert that something
    is wrong. By itself, an intrusion prevention system does not perform any action, it only can notify us
    about malicious traffic and log the incident to the file. The one who takes care “about” bad traffic is
    an IPS [], which stands for intrusion prevention system. This piece of software receives the alarm and
    perform corresponding action whether it will be dropping a packet or letting it to the quarantine. In
    addition, it is not necessary to have two separate devices for IDS and IPS, both of them can be
    integrated in the router. Therefore, as we can see, IDS and IPS are just a specific software, which help
    us extending our security. As for the IDS role in the 5G infrastructure, it can help us detecting DoS
    and software defined (brute force for example) attacks on the fly, even before the data is delivered to
    its destination. Of course, there will be some problems during the implementation, because such a
    system will require computing power, which is not really common if we speak about non-core
    segment of the system. A lot of concurrent traffic has to be analyzed at the one unit of time, that’s
    why a deployment of the IDS is so important.



3. Novel Security mechanism
   Our idea is to integrate the new server software with the IDS embedded into it to the 5G base station.
The visualization of the approach is illustrated on the figure 2.




Figure 2: Secure architecture

        Modern 5G intrusion detection systems are well known for using a KDD99 [4-7] dataset and
machine learning algorithms [8-11]. A few words about this technology: Machine learning is a methodology
of receiving processed output based on the input, for example: we supply the model (model is specific
neural network which processes the input and gives us an output) with images of animals and want it to
guess if what is the animal it has received. Machine learning algorithms use datasets [12,13]. Datasets are
files that contain specific information about something, animals for example. Each line must contain
parameters of this animal and, the most important, the conclusion about what that animal is. Using datasets,
we can train our model to recognize and process information. An example of the dataset can be found on
the figure 3 (each and every line contains an information about the attack and a name of the attack itself)




Figure 3: KDD99 dataset example

         To improve over existing approach, we offer adding a CIC-IDS datasets along with KDD99, which
will help us to get protection not only from KDD99 attacks, but also from different denial of service attacks.
Our intrusion detection system is trained to use two CIC-IDS style datasets. The first dataset contains the
information about the following DOS[12,13] attacks: 'MSSQL', 'LDAP', 'Syn', 'NetBIOS', 'UDPLag',
'UDP' and weights 341 MB, let us call it DOS1. As for the second database, it only contains the
information about the reflected ‘Portmap’ attack and its size is 89 MB, let us call it DOS2.
         Also, KDD99 was separated in two different datasets, one for training and one for testing. The
training one stores 90% of the information while the test dataset includes the remaining 10%. DOS1 and
DOS2 datasets were also divided into two separate datasets, each of them. The training dataset stores 80%
of the data, while the test dataset contains remaining 20%. Both of these datasets are split using the same
method, which was chosen because of the best accuracy results after the training. The model itself is
being trained with each dataset separately. In the case of the KDD99 dataset, model accuracy is
0.96670491252916389, in the case of DOS1 is 0.9942894736842107 and in the case of DOS2 is
0.9998966703182065.
        When the training process is finished, the system asks for input, which is being extracted from the
network sniffer. First, the input is checked for the attacks contained in the KDD99 dataset. If
corresponding attack pattern is found, it sends a signal to the intrusion protection system. In the case
when finding pattern for the attack fails, the system then trying to check data relative to the attack patterns
which are stored in the DOS1 dataset. If an attack pattern is identified, a program sends a signal to the
intrusion protection system. The same process is applied to the DOS2 dataset, if the attack pattern was not
determined. If the attack pattern is failed to be identified, the intrusion detection system gives us an output
that the traffic is legitimate and goes after processing the next input.
The algorithmic core of the intrusion detection system is explained by the following pseudo code.



The pseudo code of the idea is shown below:


    1. Class NOVELIDS():
    2.                  Initialization of variables
    3.                  Def __init__(self):
    4.                           Preprocessing the date
    5.                  Def new_model(self, type):
    6.                           Creating the model
    7.                           Return the new model
    8.                  Def train (self, model_type):
    9.                           Training the model
    10.                          Return the trained model
    11.                 Def test (self, model, type):
    12.                          Testing
    13.                              Measuring accuracy
    14.                          Return the score
    15.                 Def predict(self, data):
    16.                          Predicting data by means of the module
    17.                          Return the result
    18.                 Def accuracy(self, type):
    19.                          Return NOVELIDS.test ()
    20. IDS_real = NOVELIDS (df1) # making the dos prediction model
    21. IDS_real2 = NOVELIDS (df2) # making KDD99 prediction model
    22. IF IDS_real2 (df) == 'KDD_attack'
    23.         Passing the information
    24. Elif IDS_concrette.predict(df) == ‘DOS’:
    25.         Passing the information
    26.
    27. Else:
    28.         Print “not vulnerable”
    29. Processing the new traffic

4. Relevance of the research
    Our analyses have shown us the concrete reasons, which can be the security concern for 5G networks
[1-3]. These reasons are:
       5G system has a very large exposure to the different software attacks and it has a lot of entry
        points for the attackers, because of the virtualization 5G systems are mostly based on the software
        mechanisms. The software security attacks can be implemented on 5G.
       Because of the new functionality, the parts of some network equipment and some network
        functions are very sensitive to the different attacks. Different base stations and the key
        management functions in the network are sensitive to the attacks.
       Because network operators rely on concrete suppliers, the new attacks can be implemented.
       The great number of IT applications need 5G network, it makes 5G sensitive to attacks, which
        influence on integrity and availability.
       Because of large number of devices DoS and DDoS attacks are much more relevant.
       Because of the network slicing, attackers can attack the different slices.

5. Experiments
    We have created a small test laboratory using 20 RASPBERRY PI devices, we have also used 20
modems with sim cards. We installed our IDS software on the server. Attacks replicated by us are the
following: BACK, LAND, POD, SMURF, NEPTUNE, NMAP, TEARDROP, BUFFER_OVERFLOW,
LOADMODULE, ROOTKIT FTP_WRITE, GUESS_PASSWD, IMAP, MULTIHOP, PHF, SPY,
PROBE, IPSWEEP, PORTSWEEP, SATAN, MSSQL, Portmap and LDAP.
It must be emphasized that 5G system can be vulnerable to these types of attacks.
We have simulated the attacks and wrote the traffic down using a network sniffer, then all the traffic was
examined. parsed all the parameters that are relevant for our KDD99 and DOS [8, 9] samples were
parsed, using the Python programming language. The output was transformed to the format of the original
datasets. After this, we all this information was passed to our IDS system which performed the analysis.

 Attack type                         Number of attacks                    Identified attacks
 BACK                                50                                   48
 LAND                                50                                   100
 NEPTUNE                             50                                   98
 POD                                 50                                   100
 SMURF                               50                                   84
 TEARDROP                            50                                   82
 BUFFER_ OVERFLOW                    50                                   76
 FTP_WRITE                           50                                   86
 LOADMODULE                          50                                   91
 ROOTKIT                             50                                   62
 GUESS_PASSWD                        50                                   100
 MULTIHOP                            50                                   91
 SPY                                 50                                   51
 PROBE                               50                                   98
 IPSWEEP                             50                                   92
 NMAP                                50                                   95
 PORTSWEEP                           50                                   98
 SATAN                               50                                   82
 LDAP                                50                                   81
 MSSQL                               50                                   99
 Portmap                             50                                   97


These results prove that the IDS is rather useful and it can be used as the prototype version of the future
real-world IDS system.

6. Results
       As the result, we received the novel IDS oriented on 5G attacks. The IDS is trained using
    machine learning algorithms. It is trained using KDD99 dataset and the DOS/DDOS attacks dataset.
   The IDS is trained using the attacks vectors, which are vulnerable for 5G. These attacks vectors were
   identified based on our research.




7. Discussion
       After conducting the corresponding experiments, we have identified that IDS is doing its job
   rather well, but, unfortunately, it still has some efficiency problems. We are working on improving
   the efficiency, optimization and creating our own training patterns for IDS.

8. Conclusion
       5G networks give us more bandwidth and speed, which can also be a huge downside: Think about
   what hackers can do. DoS, DDoS, reflected DDoS and other volumetric attacks will become even
   stronger. Also, some critical infrastructure will hardly depend on the 5G, smart cars, hospitals, power
   plants, this means that any attack can on these can be critical: taking a digital hostage in the face of
   the hospital`s inner network is a joke no more.
       5G is a modern, rapid technology that requires corresponding security systems to protect users
   and the critical infrastructure. Using neural networks and machine learning to create a smart and
   flexible software can help us in attacks mitigation and prevention
        The offered IDS is aiming to provide a good level of security and accuracy, but it still has some
   efficiency problems. Certain work must be conducted in order to achieve the secure 5G services.

9. Acknowledgments
    The work was finances by Shota Rustaveli National Science Foundation and was conducted in the
frame of CARYS-19-121 grant.



10. References


   [1] Huawei 5G Security White Paper, https://www-file.huawei.com/-/media/corporate/pdf/trust-
       center/huawei-5g-security-white-paper-4th.pdf, 2019.
   [2] 5G Americas: The evolution of Security in 5G, https://www.5gamericas.org/files/4715/6450/22-
       67/5G_Security_White_Paper_07-26-19_FINAL.pdf, 2019.
   [3] Report on EU coordinated risk assessment of 5G, https://ec.europa.eu/comm-
       ission/presscorner/detail/en/IP_19_6049, 2019.
   [4] Kumar V., Das A.K., Sinha D. (2020) Statistical Analysis of the UNSW-NB15 Dataset for
       Intrusion Detection. In: Das A., Nayak J., Naik B., Pati S., Pelusi D. (eds) Computational
       Intelligence in Pattern Recognition. Advances in Intelligent Systems and Computing, vol 999.
       Springer, Singapore. https://doi.org/10.1007/978-981-13-9042-5_24.
[5] Ullah I., Mahmoud Q.H. (2020) A Scheme for Generating a Dataset for Anomalous Activity
    Detection in IoT Networks. In: Goutte C., Zhu X. (eds) Advances in Artificial Intelligence.
    Canadian AI 2020. Lecture Notes in Computer Science, vol 12109. Springer, Cham.
    https://doi.org/10.1007/978-3-030-47358-7_52.
[6] Luo C., Wang L., Lu H. (2018) Analysis of LSTM-RNN Based on Attack Type of KDD-99
    Dataset. In: Sun X., Pan Z., Bertino E. (eds) Cloud Computing and Security. ICCCS 2018.
    Lecture Notes in Computer Science, vol 11063. Springer, Cham. https://doi.org/10.1007/978-
    3-030-00006-6_29.
[7] Y. I. . Ibrahim, F. M. . Remo, and Y. S. Younis, “Design a Hybrid Algorithm Based on Tabu Search
    and Misuse Detection for Intrusion Dataset (KDD99 10%)”, JUBPAS, vol. 27, no. 5, pp. 337-351,
    Dec. 2019.
[8] Jacobs, M., Pradier, M.F., McCoy, T.H. et al. How machine-learning recommendations influence
    clinician treatment selections: the example of the antidepressant selection. Transl
    Psychiatry 11, 108 (2021). https://doi.org/10.1038/s41398-021-01224-x.
[9] Sipper, M., Moore, J.H. Conservation machine learning: a case study of random forests. Sci
    Rep 11, 3629 (2021). https://doi.org/10.1038/s41598-021-83247-4.
[10]          Garg, S., Sinha, S., Kar, A.K. and Mani, M. (2021), "A review of machine learning
    applications in human resource management", International Journal of Productivity and
    Performance Management, Vol. ahead-of-print No. ahead-of-print. https://doi.org/10.1108/IJPPM-
    08-2020-0427
[11]          Mullainathan, Sendhil, and Jann Spiess. 2017. "Machine Learning: An Applied
    Econometric Approach." Journal of Economic Perspectives, 31 (2): 87-106.
[12]          Zhang, Y., Ling, C. A strategy to apply machine learning to small datasets in materials
    science. npj Comput Mater 4, 25 (2018). https://doi.org/10.1038/s41524-018-0081-z
[13]          Kohli, M.D., Summers, R.M. & Geis, J. Medical Image Data and Datasets in the Era of
    Machine Learning—Whitepaper from the 2016 C-MIMI Meeting Dataset Session. J Digit
    Imaging 30, 392–399 (2017). https://doi.org/10.1007/s10278-017-9976-3
[14]          Monowar H. Bhuyan, H. J. Kashyap, D. K. Bhattacharyya, J. K. Kalita, Detecting
    Distributed Denial of Service Attacks: Methods, Tools and Future Directions, The Computer
    Journal, Volume 57, Issue 4, April 2014, Pages 537–556, https://doi.org/10.1093/comjnl/bxt031
[15]          V. Gupta, S. Krishnamurthy and M. Faloutsos, "Denial of service attacks at the MAC layer
    in wireless ad hoc networks," MILCOM 2002. Proceedings, Anaheim, CA, USA, 2002, pp. 1118-
    1123 vol.2, doi: 10.1109/MILCOM.2002.1179634.