CROSS-LAYER AUTOMATED NETWORK VULNERABILITY IDENTIFICATION AND LOCALIZATION
20230094656 · 2023-03-30
Inventors
Cpc classification
International classification
Abstract
Embodiments herein include an alternative approach to vulnerability detection, denoted as an automated network vulnerability identification and localization application (ANVIL). More specifically, a network includes multiple hardware and software-based entities that communicate with each other over standardized or proprietary protocol interfaces with the objective of providing data, computing capabilities, or voice connectivity to an end user such as a mobile device. For example, a device-based or core network-based instance of ANVIL emulates different protocol layers in order to periodically scan and probe the message responses of different protocol layers and the accessibility of different network interfaces to unauthorized users. Fuzzing message responses are used to generate new fuzzing messages based on machine learning techniques in order to localize potential vulnerabilities. Multiple protocol layers and communication protocols may be emulated and multiple network entities may be probed by a single instance of ANVIL. The responses of the network to the fuzzing messages and port scans are collated by ANVIL and reported to an administrator via a dashboard that highlights potential vulnerabilities in the network and suggested remedies.
Claims
1. A method comprising: transmitting a sequence of probe messages to one or more entities across multiple protocol layers in a communication network environment; monitoring responses to these messages; and in response to detecting anomalous responses, creating a list of potential network vulnerabilities.
2. The method as in claim 1, wherein the probe messages include port scan messages to test unprotected network interfaces and protocol fuzzing messages designed to test exception handling.
3. The method as in claim 1, wherein the multiple protocol layers are specific to a mobile network, such as the physical layer, medium access control, radio link control, packet data convergence protocol, service data adaption protocol, radio resource control, and non-access stratum layer.
4. The method as in claim 1, wherein the sequence and content of probe messages is formulated and updated in real time based on the responses observed to prior probe messages.
5. The method as in claim 1, wherein the network entities include network functions that comprise a mobile core that provides data and voice connectivity to devices.
6. The method as in claim 1, wherein the transmission of probe messages is preceded by a passive monitoring phase that analyzes control, broadcast data, and beacon messages from the communication network.
7. A system comprising: communication hardware operative to: transmitting a sequence of probe messages to one or more entities across multiple protocol layers in a communication network environment; monitoring responses to these messages; and in response to detecting anomalous responses, creating a list of potential network vulnerabilities.
8. The system as in claim 7, wherein the communication hardware is further operative to include port scan messages to test unprotected network interfaces and protocol fuzzing messages designed to test exception handling.
9. The system as in claim 7, wherein the multiple protocol layers are specific to a mobile network, such as the physical layer, medium access control, radio link control, packet data convergence protocol, service data adaption protocol, radio resource control, and non-access stratum layer.
10. The system as in claim 7, wherein the sequence and content of probe messages is formulated and updated in real time based on the responses observed to prior probe messages.
11. The method as in claim 7, wherein the network entities include network functions that comprise a mobile core that provides data and voice connectivity to devices.
12. The system as in claim 7, wherein the communication hardware is further operative to: transmission of probe messages preceded by a passive monitoring phase that analyzes control, broadcast data, and beacon messages from the communication network.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0020]
[0021]
[0022]
[0023]
[0024]
[0025] The foregoing and other objects, features, and advantages of the invention will be apparent from the following more particular description of preferred embodiments herein, as illustrated in the accompanying drawings in which like reference characters refer to the same parts throughout the different views. The drawings are not necessarily to scale, with emphasis instead being placed upon illustrating the embodiments, principles, concepts, etc.
DETAILED DESCRIPTION
[0026] In accordance with general embodiments, a system includes network entities and network functions that communicate with each other using packetized messages on standards-based protocol interfaces. An instantiation of ANVIL emulates different protocol layers in order to periodically scan and probe the message responses of different protocol layers and the accessibility of different network interfaces to unauthorized users. Fuzzing message responses are used to generate new fuzzing messages based on machine learning techniques in order to localize potential vulnerabilities. Multiple protocol layers and communication protocols may be emulated and multiple network entities may be probed by a single instance of ANVIL. The responses of the network to the fuzzing messages and port scans are collated by ANVIL and reported to an administrator via a dashboard that highlights potential vulnerabilities in the network and suggested remedies.
[0027] Now, more specifically,
[0028] As shown in this example embodiment, user equipment (UE) 100 includes a processor 101 that executes software applications 101-1 such as ANVIL, memory 102 for storage, a baseband modem 103 for digital signal processing, a radio frequency (RF) interface 104 that converts analog RF signals to digital for reception and vice versa for transmission, and a RF front end 105 that comprises power amplifiers, local oscillators, and antenna elements for RF transmission and reception.
[0029] Note that each of the resources in UE 100 can be configured to include appropriate hardware, software, or combination of hardware and software to carry out respective operations as discussed herein.
[0030] For example, an instantiation of ANVIL on UE 100 monitors and measures the RF signal strengths of adjacent base stations and UEs received at the RF front end 105 to assess the vulnerability of the radio layer to jamming and spoofing attacks by adversaries. The results of the assessment are stored in memory 102 and collated as part of a vulnerability assessment report sent to either another instance of ANVIL or to a reporting dashboard.
[0031] Those skilled in the art will understand that the UE 100 can include other processes and/or software and hardware components, such as an input/output interface to a display, or an operating system that controls allocation and use of hardware resources to execute application commands 101-1.
[0032]
[0033] In another example embodiment, a series of message responses 207 are used to generate an updated series of fuzzing messages based on adversarial machine learning methods in order to localize network vulnerabilities.
[0034]
[0035]
[0036]
[0037] Note again that techniques herein are well suited to facilitate automated network vulnerability detection and localization. However, it should be noted that embodiments herein are not limited to use in such applications and that the techniques discussed herein are well suited for other applications as well.
[0038] Based on the description set forth herein, numerous specific details have been set forth to provide a thorough understanding of claimed subject matter. However, it will be understood by those skilled in the art that claimed subject matter may be practiced without these specific details. In other instances, methods, apparatuses, systems, etc., that would be known by one of ordinary skill have not been described in detail so as not to obscure claimed subject matter. Some portions of the detailed description have been presented in terms of algorithms or symbolic representations of operations on data bits or binary digital signals stored within a computing system memory, such as a computer memory. These algorithmic descriptions or representations are examples of techniques used by those of ordinary skill in the data processing arts to convey the substance of their work to others skilled in the art. An algorithm as described herein, and generally, is considered to be a self-consistent sequence of operations or similar processing leading to a desired result. In this context, operations or processing involve physical manipulation of physical quantities. Typically, although not necessarily, such quantities may take the form of electrical or magnetic signals capable of being stored, transferred, combined, compared or otherwise manipulated. It has been convenient at times, principally for reasons of common usage, to refer to such signals as bits, data, values, elements, symbols, characters, terms, numbers, numerals or the like. It should be understood, however, that all of these and similar terms are to be associated with appropriate physical quantities and are merely convenient labels. Unless specifically stated otherwise, as apparent from the following discussion, it is appreciated that throughout this specification discussions utilizing terms such as “processing,” “computing,” “calculating,” “determining” or the like refer to actions or processes of a computing platform, such as a computer or a similar electronic computing device, that manipulates or transforms data represented as physical electronic or magnetic quantities within memories, registers, or other information storage devices, transmission devices, or display devices of the computing platform.
[0039] While this invention has been particularly shown and described with references to preferred embodiments thereof, it will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the present application as defined by the appended claims. Such variations are intended to be covered by the scope of this present application. As such, the foregoing description of embodiments of the present application is not intended to be limiting. Rather, any limitations to the invention are presented in the following claims.