@article{ART002880974},
author={Tae-Keun Park and Jong-Geun Park and Keewon Kim},
title={Analysis of the IP Spoofing Attack Exploiting Null Security Algorithms in 5G Networks},
journal={Journal of The Korea Society of Computer and Information},
issn={1598-849X},
year={2022},
volume={27},
number={9},
pages={113-120},
doi={10.9708/jksci.2022.27.09.113}
TY - JOUR
AU - Tae-Keun Park
AU - Jong-Geun Park
AU - Keewon Kim
TI - Analysis of the IP Spoofing Attack Exploiting Null Security Algorithms in 5G Networks
JO - Journal of The Korea Society of Computer and Information
PY - 2022
VL - 27
IS - 9
PB - The Korean Society Of Computer And Information
SP - 113
EP - 120
SN - 1598-849X
AB - In this paper, we analyze the feasibility of the IP spoofing attack exploiting null security algorithms in 5G networks based on 3GPP standard specifications. According to 3GPP standard specifications, the initial Registration Request message is not protected by encryption and integrity. The IP spoofing attack exploits the vulnerability that allows a malicious gNB (next generation Node B) to modify the contents of the initial Registration Request message of a victim UE (User Equipment) before forwarding it to AMF (Access and Mobility Management Function). If the attack succeeds, the victim UE is disconnected from the 5G network and a malicious UE gets Internet services, while the 5G operator will charge the victim UE. In this paper, we analyze the feasibility of the IP spoofing attack by analyzing whether each signaling message composing the attack conforms to the 3GPP Rel-17 standard specifications. As a result of the analysis, it is determined that the IP spoofing attack is not feasible in the 5G system implemented according to the 3GPP Rel-17 standard specifications.
KW - 5G;Null Security Algorithm;3GPP Standard;IP Spoofing Attack;Attack Analysis
DO - 10.9708/jksci.2022.27.09.113
ER -
Tae-Keun Park, Jong-Geun Park and Keewon Kim. (2022). Analysis of the IP Spoofing Attack Exploiting Null Security Algorithms in 5G Networks. Journal of The Korea Society of Computer and Information, 27(9), 113-120.
Tae-Keun Park, Jong-Geun Park and Keewon Kim. 2022, "Analysis of the IP Spoofing Attack Exploiting Null Security Algorithms in 5G Networks", Journal of The Korea Society of Computer and Information, vol.27, no.9 pp.113-120. Available from: doi:10.9708/jksci.2022.27.09.113
Tae-Keun Park, Jong-Geun Park, Keewon Kim "Analysis of the IP Spoofing Attack Exploiting Null Security Algorithms in 5G Networks" Journal of The Korea Society of Computer and Information 27.9 pp.113-120 (2022) : 113.
Tae-Keun Park, Jong-Geun Park, Keewon Kim. Analysis of the IP Spoofing Attack Exploiting Null Security Algorithms in 5G Networks. 2022; 27(9), 113-120. Available from: doi:10.9708/jksci.2022.27.09.113
Tae-Keun Park, Jong-Geun Park and Keewon Kim. "Analysis of the IP Spoofing Attack Exploiting Null Security Algorithms in 5G Networks" Journal of The Korea Society of Computer and Information 27, no.9 (2022) : 113-120.doi: 10.9708/jksci.2022.27.09.113
Tae-Keun Park; Jong-Geun Park; Keewon Kim. Analysis of the IP Spoofing Attack Exploiting Null Security Algorithms in 5G Networks. Journal of The Korea Society of Computer and Information, 27(9), 113-120. doi: 10.9708/jksci.2022.27.09.113
Tae-Keun Park; Jong-Geun Park; Keewon Kim. Analysis of the IP Spoofing Attack Exploiting Null Security Algorithms in 5G Networks. Journal of The Korea Society of Computer and Information. 2022; 27(9) 113-120. doi: 10.9708/jksci.2022.27.09.113
Tae-Keun Park, Jong-Geun Park, Keewon Kim. Analysis of the IP Spoofing Attack Exploiting Null Security Algorithms in 5G Networks. 2022; 27(9), 113-120. Available from: doi:10.9708/jksci.2022.27.09.113
Tae-Keun Park, Jong-Geun Park and Keewon Kim. "Analysis of the IP Spoofing Attack Exploiting Null Security Algorithms in 5G Networks" Journal of The Korea Society of Computer and Information 27, no.9 (2022) : 113-120.doi: 10.9708/jksci.2022.27.09.113