loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Authors: Zujany Salazar 1 ; Fatiha Zaidi 2 ; Wissam Mallouli 1 ; Ana Rosa Cavalli 1 ; Huu Nghia Nguyen 1 and Edgardo Montes De Oca 1

Affiliations: 1 Montimage EURL, Paris, France ; 2 Université Paris-Saclay, CNRS, ENS Paris-Saclay, Laboratoire Méthodes Formelles, 91190, Gif-sur-Yvette, France

Keyword(s): Formal Approach, Mutation Technique, Network Traffic, 5G Networks, Fuzzing Techniques.

Abstract: We present a formal approach based on mutation techniques for the modelling of cybersecurity attacks and its application to 5G networks. We introduce formal definitions of the main concepts of network protocols, mutation operators, flow of network packets and network traffic. We design a formal approach based on different mutation operators that allows to design models that can be assimilated with known and unknown attacks. This approach has been implemented in our open source 5G network traffic fuzzer, 5Greplay, and has been applied to two use cases that are representative of attacks against 5G networks.

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 3.133.147.252

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Salazar, Z.; Zaidi, F.; Mallouli, W.; Cavalli, A.; Nguyen, H. and Montes De Oca, E. (2022). A Formal Approach for Complex Attacks Generation based on Mutation of 5G Network Traffic. In Proceedings of the 17th International Conference on Software Technologies - ICSOFT; ISBN 978-989-758-588-3; ISSN 2184-2833, SciTePress, pages 234-241. DOI: 10.5220/0011319000003266

@conference{icsoft22,
author={Zujany Salazar. and Fatiha Zaidi. and Wissam Mallouli. and Ana Rosa Cavalli. and Huu Nghia Nguyen. and Edgardo {Montes De Oca}.},
title={A Formal Approach for Complex Attacks Generation based on Mutation of 5G Network Traffic},
booktitle={Proceedings of the 17th International Conference on Software Technologies - ICSOFT},
year={2022},
pages={234-241},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0011319000003266},
isbn={978-989-758-588-3},
issn={2184-2833},
}

TY - CONF

JO - Proceedings of the 17th International Conference on Software Technologies - ICSOFT
TI - A Formal Approach for Complex Attacks Generation based on Mutation of 5G Network Traffic
SN - 978-989-758-588-3
IS - 2184-2833
AU - Salazar, Z.
AU - Zaidi, F.
AU - Mallouli, W.
AU - Cavalli, A.
AU - Nguyen, H.
AU - Montes De Oca, E.
PY - 2022
SP - 234
EP - 241
DO - 10.5220/0011319000003266
PB - SciTePress