Let NT = {F1, F2, ..., Fi, ..., Fy}, where
Fi = {P1, P2, ..., Pi, ..., Px}, where Pi =
{pr1, pr2, ..., pri, pr j, ..., pn}, pri corresponds
to the SCT P protocol, and
pri = {( f d1, value1), ( f d2, value2), ..., (proto_id,60)
, ..., ( f di, valuei)}; pr j corresponds to the NAS_5G
protocol, and
pr j = {( f d1, value1), ( f d2, value2), ..., (amf_UE_id,
93), ..., ( f di, valuei)}. And R = {γ, σ} a mutant op-
erator, according to which a subset of NT will be
filtered, and mutated.
if γ(NT ) == P.NAS_5G.message_type.93 → Pi
⇒ σ = P_MODIFY(Pi, NAS_5G, am f _UE_id,
1234) ◦ P_MODIFY (Pi, SCT P, proto_id, 0)
⇒ NT = {F1, F2, ..., Fi, ..., Fy},
Fi = {P1, P2, ..., Pi
′
, ..., Px},
Pi = {pr1, pr2, ..., pri
′
, pr j
′
, ..., pn},
pri = SCT P = {( f d1, value1), ( f d2, value2), ...,
(proto_id,0), ..., ( f di, valuei)}, and
pr j = NAS_5G = {( f d1, value1), ( f d2, value2), ...,
(amf_UE_id,1234), ..., ( f di, valuei)}.
5.2.2 Experimentation
We implement a mutant operator in 5Greplay with
context: NGAP protocol messages sent by the UE
during the authentication exchange; and action: re-
play them to the AMFs with two modification of the
SCTP and NAS_5G fields. Then, we checked the
AMF logs and we monitored the network to verify
that the AMF actually received the same packet twice.
When replaying against free5GC, we got an AMF
warning, but the simulator keep running and allowed
new UE connections. On the other hand, open5GS
was not able to handle this packet and the simulator
crashed, preventing new connections to the AMF.
6 CONCLUSION AND FUTURE
WORK
In this paper we have defined a formal approach for
network mutation that provides a scientific basis for
research work and application of these techniques.
Based on this formalism, we have designed models
of simple and complex attacks that we have applied
to 5G networks. The proposed approach has been
applied to two use cases that represent different at-
tacks against a 5G network. In future work, we plan
to introduce ML/AI techniques in order to improve
the perform a smart fuzzing.
ACKNOWLEDGEMENTS
This research is supported by the H2020 projects
SANCUS N° 952672, INSPIRE-5Gplus N° 871808,
and SPATIAL N° 101021808.
REFERENCES
Brown, G. (2017). Service-based architecture for 5g core
networks. Huawei White Paper, 1.
Dong, G., Sun, P., Shi, W., and Choi, C. (2018). A novel val-
uation pruning optimization fuzzing test model based
on mutation tree for industrial control systems. Ap-
plied Soft Computing, 70:896–902.
Hu, Y., Yang, W., Cui, B., Zhou, X., Mao, Z., and Wang, Y.
(2022). Fuzzing method based on selection mutation
of partition weight table for 5g core network ngap pro-
tocol. In Barolli, L., Yim, K., and Chen, H.-C., editors,
Innovative Mobile and Internet Services in Ubiquitous
Computing, pages 144–155, Cham. Springer Interna-
tional Publishing.
Johansson, W., Svensson, M., Larson, U. E., Almgren, M.,
and Gulisano, V. (2014). T-fuzz: Model-based fuzzing
for robustness testing of telecommunication protocols.
In 2014 IEEE Seventh International Conference on
Software Testing, Verification and Validation, pages
323–332.
Potnuru, S. and Nakarmi, P. K. (2021). Berserker: Asn.1-
based fuzzing of radio resource control protocol for
4g and 5g. In 2021 17th International Conference
on Wireless and Mobile Computing, Networking and
Communications (WiMob), pages 295–300.
Salazar, Z., Nguyen, H. N., Mallouli, W., Cavalli, A. R., and
Montes de Oca, E. (2021). 5greplay: A 5g network
traffic fuzzer - application to attack injection. In The
16th International Conference on Availability, Relia-
bility and Security, ARES 2021, New York, NY, USA.
Association for Computing Machinery.
Salls, C., Machiry, A., Doupe, A., Shoshitaishvili, Y.,
Kruegel, C., and Vigna, G. (2020). Exploring abstrac-
tion functions in fuzzing. In 2020 IEEE Conference on
Communications and Network Security (CNS), pages
1–9.
A Formal Approach for Complex Attacks Generation based on Mutation of 5G Network Traffic
241