研究生: |
黃俊鴻 Jun-Hong Huang |
---|---|
論文名稱: |
支持 SDR 的 O-RAN 惡意基站開發基於機器學習的 xApps Developing Machine Learning-Based xApps for Rogue Base Stations in SDR-Enabled O-RAN |
指導教授: |
鄭欣明
Shin-Ming Cheng |
口試委員: |
查士朝
Shi-Cho Cha 柯拉飛 Rafael David Kaliski 李奇育 CHI-YU LI 徐瑞壕 Ruei-Hau Hsu |
學位類別: |
碩士 Master |
系所名稱: |
電資學院 - 資訊工程系 Department of Computer Science and Information Engineering |
論文出版年: | 2022 |
畢業學年度: | 110 |
語文別: | 英文 |
論文頁數: | 58 |
中文關鍵詞: | 5G 非獨立式網路 、攻擊檢測 、安卓應用程式 、電波訊號 、流氓基地台攻擊 、軟體定義無線電 、監督式學習 |
外文關鍵詞: | 5G Non-Standalone, Attack Detection, Android APP, RF Signature, Rogue Base Station (BS) Attacks, Software-Defined Radio, Supervised Machine Learning |
相關次數: | 點閱:282 下載:0 |
分享至: |
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
[1] A. Garcia-Saavedra and X. Costa-Perez, “O-RAN: Disrupting the virtualized RAN ecosystem,” vol. 5,
pp. 96–103, Dec. 2021.
[2] M. Polese, “Understanding O-RAN: Architecture, interfaces, algorithms, security, and research challenges,”
arXiv preprint arXiv:2202.01032, Feb. 2022.
[3] A. S. Abdalla et al., “Toward next generation open radio access network – what O-RAN can and
cannot do!,” arXiv preprint arXiv:2111.13754, Nov. 2021.
[4] J. Feng, B.-K. Hong, , and S.-M. Cheng, “DDoS attacks in experimental LTE networks,” in Proc.
IEEE AINA 2020, Apr. 2020.
[5] J. Cao, M. Ma, H. Li, R. Ma, Y. Sun, P. Yu, and L. Xiong, “A survey on security aspects for 3GPP 5G
networks,” vol. 22, pp. 170–195, 1stquarter 2020.
[6] R. Khan, P. Kumar, D. N. K. Jayakody, and M. Liyanage, “A survey on security and privacy of 5G
technologies: Potential solutions, recent advancements, and future directions,” vol. 22, pp. 196–248,
1stquarter 2020.
[7] 3GPP TS 33.401, “System Architecture Evolution (SAE); Security architecture,” tech. rep., 2010.
version 9.2.0.
[8] Y. Wang, Z. Zhang, and Y. Xie, “Privacy-preserving and standard-compatible AKA protocol for 5G,”
in Proc. USENIX Security 2021, Aug. 2021.
[9] “srsLTE: a free and open-source 4G LTE software suite.” https://docs.srslte.com/en/
latest/. [Online; accessed 19-July-2008].
[10] “OpenAirInterface: a flexible platform towards an open LTE ecosystem.” https://www.
openairinterface.org/?page_id=2762. [Online; accessed ].
[11] 3GPP TS 33.501, “Security architecture and procedures for 5G system,” tech. rep., Aug. 2020. version
16.3.0.
[12] A. Shaik, R. Borgaonkar, J. Seifert, N. Asokan, and V. Niemi, “Practical attacks against privacy and
availability in 4G/LTE mobile communication systems,” in Proc. NDSS 2016, Feb. 2016.
[13] W.-L. Heish, B.-K. Hong, and S.-M. Cheng, “Toward large-scale rogue base station attacks using
container-based virtualization,” in Proc. IEEE VTC 2019-Fall, Aug. 2019.
[14] D. Rupprecht, K. Kohls, T. Holz, and C. Poepper, “IMP4GT: IMPersonation attacks in 4G NeTworks,”
in Proc. NDSS 2020, Feb. 2020.
[15] G. Lee et al., “This is your president speaking: Spoofing alerts in 4G LTE networks,” in Proc. ACM
MobiSys 2019, pp. 404–416, June 2019.
[16] “Snoopsnitch.” https://opensource.srlabs.de/projects/snoopsnitch, 2019. Accessed:
2021-04-04.
[17] P. Ziayi, S.-M. Farmanbar, and M. Rezvani, “YAICD: Yet another IMSI catcher detector in GSM,”
Security and Communication Networks, vol. 2021, Jan. 2021.
[18] M. Echeverria, Z. Ahmed, B. Wang, M. F. Arif, S. R. Hussain, and O. Chowdhury, “PHOENIX:
Device-centric cellular network protocol monitoring using runtime verification,” in Proc. NDSS 2021,
Jan. 2021.
[19] Z. Li, W. Wang, C. Wilson, J. Chen, C. Qian, T. Jung, L. Zhang, K. Liu, X. Li, and Y. Liu, “FBS-Radar:
Uncovering fake base stations at scale in the wild,” in Proc. NDSS 2017, Jan. 2017.
[20] C. Quintin, “Detecting fake 4G LTE base stations in real time,” in Proc. USENIX Enigma 2021, Feb.
2021.
[21] L. Karaçay et al., “A network-based positioning method to locate false base stations,” vol. 8,
pp. 111368–111382, Aug. 2021.
[22] R. Borgaonkar, A. Martin, S. Park, A. Shaik, and J.-P. Seifert, “White-Stingray: Evaluating IMSI
catchers detection applications,” in Proc. WOOT 2017, Aug. 2017.
[23] Z. Zhuang, X. Ji, et al., “FBSleuth: Fake base station forensics via radio frequency fingerprinting,”
in Proc. ACM AsiaCCS 2018, p. 261–272, June 2018.
[24] S. Park, A. Shaik, R. Borgaonkar, and J.-P. Seifert, “Anatomy of commercial IMSI catchers and detectors,”
in Proc. ACM WPES 2019, pp. 74–86, Nov. 2019.
[25] P. K. Nakarmi, M. A. Ersoy, E. U. Soykan, and K. Norrman, “Murat: Multi-RAT false base station
detector],” arXiv preprint arXiv:2102.08780, Feb. 2021.
[26] A. Singla et al., “Look before you leap: Secure connection bootstrapping for 5G networks to defend
against fake base-stations,” in Proc. ACM Asia CCS 2021, pp. 501–515, June 2021.
[27] “Smile: Statistical machine intelligence and learning engine.” https://haifengl.github.io.
[Online; accessed ].
[28] S. Erni, P. Leu, M. Kotuliak, and M. R. andSrdjan Capkun, “AdaptOver: Adaptive overshadowing of
LTE signals,” CoRR, vol. abs/2106.05039, 2021.
[29] N. Ludant and G. Noubir, “SigUnder: a stealthy 5G low power attack and defenses,” in Proc. ACM
WiSec 2021, p. 250–260, June 2021.
[30] M. Kotuliak, S. Erni, P. Leu, M. Roeschlin, and S. Capkun, “LTrack: Stealthy tracking of mobile
phones in LTE,” arXiv preprint arXiv:2106.05007, Jun 2021.