skip to main content
10.1145/3600160.3605062acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaresConference Proceedingsconference-collections
research-article

HTTP/2 Attacks Generation using 5Greplay

Published:29 August 2023Publication History

ABSTRACT

5G networks become increasingly pervasive, ensuring the robustness and integrity of network functions. The adoption of HTTP/2 in 5G core functions brings notable performance benefits but also introduces potential security risks. By analyzing HTTP/2 related threats, this research aims to shed light on the security challenges faced by 5G networks. The paper proposes effective security testing methodologies using an open-source solution called 5Greplay to detect these security breaches, enabling network operators to protect against potential attacks, safeguard user privacy, and ensure uninterrupted service continuity. By addressing the specific concerns of HTTP/2 related threats, this research contributes to the overall security posture of 5G network functions and provides valuable insights for the secure deployment of 5G networks in an evolving threat landscape.

References

  1. M. Liyanage J. Okwuibe M. Ylianttila. I. Ahmad, T. Kumar and A. Gurtov.2018. Overview of 5g security challenges and solutions.Google ScholarGoogle Scholar
  2. M. Liyanage J. Okwuibe M. Ylianttila. I. Ahmad, T. Kumar and A. Gurtov.Feb 2022. Enisa threat landscape for 5G networks.Google ScholarGoogle Scholar
  3. Baig Z. Lam C.P. Hingston Adi, E.2015. Low-rate denial-of-service attacks against http/2 services. Security and Privacy in Communication Networks (2015), 1–5.Google ScholarGoogle Scholar
  4. Jin Cao, Maode Ma, Hui Li, Ruhui Ma, Yunqing Sun, Pu Yu, and Lihui Xiong. 2020. A Survey on Security Aspects for 3GPP 5G Networks. IEEE Commun. Surv. Tutorials 22, 1 (2020), 170–195. https://doi.org/10.1109/COMST.2019.2951818Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Efstratios Chatzoglou, Vasileios Kouliaridis, Georgios Kambourakis, Georgios Karopoulos, and Stefanos Gritzalis. 2023. A hands-on gaze on HTTP/3 security through the lens of HTTP/2 and a public dataset. Comput. Secur. 125 (2023), 103051. https://doi.org/10.1016/j.cose.2022.103051Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Ning Zhang Fatima Salahdine, Tao Han. 2023. Security in 5G and beyond recent advances and future challenges. Security Privacy. (2023). https://doi.org/10.1002/spy2.271Google ScholarGoogle ScholarCross RefCross Ref
  7. Xinxin Hu, Caixia Liu, Shuxin Liu, Wei You, and Yu. Zhao. 2018. Signalling security analysis: Is HTTP/2 secure in 5G core network?Security and Privacy in Communication Networks (2018).Google ScholarGoogle Scholar
  8. Z. Mukhtar2 B. Yahaya2 Y. Ibrahim2 M. O. Momoh K. O. Shobowale1, *. 2023. Latest Advances on Security Architecture f or 5 G Technology and Services.INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING & COMPUTER SYSTEMS (IJSECS) 9, ISSUE 1 (2023), 27 – 38. https://doi.org/10.15282/ijsecs.9.1.2023.3.0107Google ScholarGoogle ScholarCross RefCross Ref
  9. Rabia Khan; Pardeep Kumar; Dushantha Nalin K. Jayakody; Madhusanka Liyanage. 2020. A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements, and Future Directions. IEEE Communications Surveys & Tutorials 22 (2020).Google ScholarGoogle Scholar
  10. Martin Thomson Mike Belshe, Roberto Peon. 2015. RFC Hypertext Transfer Protocol Version 2 (HTTP/2). https://datatracker.ietf.org/doc/html/rfc7540Google ScholarGoogle Scholar
  11. Montimage. 2023. 5GReplay Documentation. http://5greplay.org/Google ScholarGoogle Scholar
  12. Zujany Salazar, Huu Nghia Nguyen, Wissam Mallouli, Ana R. Cavalli, and Edgardo Montes de Oca. 2021. 5Greplay: A 5G Network Traffic Fuzzer - Application to Attack Injection. In Proceedings of the 16th International Conference on Availability, Reliability and Security(ARES 21). Article 106, 8 pages. https://doi.org/10.1145/3465481.3470079Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Zujany Salazar, Fatiha Zaïdi, Huu Nghia Nguyen, Wissam Mallouli, Ana Rosa Cavalli, and Edgardo Montes de Oca. 2023. A Network Traffic Mutation Based Ontology, and Its Application to 5G Networks. IEEE Access 11 (2023), 43925–43944. https://doi.org/10.1109/ACCESS.2023.3268759Google ScholarGoogle ScholarCross RefCross Ref
  14. T.2020. 3rd Generation Partnership Project (3GPP) 3gpp ts 33.117. catalogue of general security assurance requirements (2020).Google ScholarGoogle Scholar
  15. Silvio Valenti, Dario Rossi, Alberto Dainotti, Antonio Pescapè, Alessandro Finamore, and Marco Mellia. 2013. Reviewing Traffic Classification. Springer Berlin Heidelberg, Berlin, Heidelberg, 123–147. https://doi.org/10.1007/978-3-642-36784-7_6Google ScholarGoogle ScholarCross RefCross Ref
  16. Nathalie *Wehbe, Hyame Assem Alameddine, Makan Pourzandi, Elias Bou-Harb, and Chadi. Assi. [n. d.]. Assessment of HTTP/2 Usage in 5G Service Based Architecture.IEEE Communications Magazine ([n. d.]).Google ScholarGoogle Scholar
  17. Shouling Ji Meng Han Xiang Ling1, Chunming Wu1. 2023. H2DoS: An Application-Layer DoS Attack Towards HTTP/2 Protocol. Security and Privacy in Communication Networks (2023), 550–570. https://link.springer.com/chapter/10.1007/978-3-319-78813-5_28Google ScholarGoogle Scholar

Index Terms

  1. HTTP/2 Attacks Generation using 5Greplay
          Index terms have been assigned to the content through auto-classification.

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Other conferences
            ARES '23: Proceedings of the 18th International Conference on Availability, Reliability and Security
            August 2023
            1440 pages
            ISBN:9798400707728
            DOI:10.1145/3600160

            Copyright © 2023 Owner/Author

            Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 29 August 2023

            Check for updates

            Qualifiers

            • research-article
            • Research
            • Refereed limited

            Acceptance Rates

            Overall Acceptance Rate228of451submissions,51%
          • Article Metrics

            • Downloads (Last 12 months)79
            • Downloads (Last 6 weeks)14

            Other Metrics

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader

          HTML Format

          View this article in HTML Format .

          View HTML Format