Next Article in Journal
The Dependence of Flue Pipe Airflow Parameters on the Proximity of an Obstacle to the Pipe’s Mouth
Next Article in Special Issue
Implementation of Deep-Learning-Based CSI Feedback Reporting on 5G NR-Compliant Link-Level Simulator
Previous Article in Journal
Upconversion Nanoparticles-Based Fluorescence Immunoassay for the Sensitive Detection of 2-Amino-3-methylimidazo [4,5-f] Quinoline (IQ) in Heat Processed Meat
Previous Article in Special Issue
Validating a 5G-Enabled Neutral Host Framework in City-Wide Deployments
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Multi-Layer Attack Graph Analysis in the 5G Edge Network Using a Dynamic Hexagonal Fuzzy Method

by
Hisham A. Kholidy
Department of Networks and Computer Security, College of Engineering, State University of New York (SUNY) Polytechnic Institute, Utica, NY 13502, USA
Sensors 2022, 22(1), 9; https://doi.org/10.3390/s22010009
Submission received: 24 September 2021 / Revised: 14 December 2021 / Accepted: 14 December 2021 / Published: 21 December 2021

Abstract

:
Overall, 5G networks are expected to become the backbone of many critical IT applications. With 5G, new tech advancements and innovation are expected; 5G currently operates on software-defined networking. This enables 5G to implement network slicing to meet the unique requirements of every application. As a result, 5G is more flexible and scalable than 4G LTE and previous generations. To avoid the growing risks of hacking, 5G cybersecurity needs some significant improvements. Some security concerns involve the network itself, while others focus on the devices connected to 5G. Both aspects present a risk to consumers, governments, and businesses alike. There is currently no real-time vulnerability assessment framework that specifically addresses 5G Edge networks, with regard to their real-time scalability and dynamic nature. This paper studies the vulnerability assessment in the 5G networks and develops an optimized dynamic method that integrates the Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS) with the hexagonal fuzzy numbers to accurately analyze the vulnerabilities in 5G networks. The proposed method considers both the vulnerability and 5G network dynamic factors such as latency and accessibility to find the potential attack graph paths where the attack might propagate in the network and quantifies the attack cost and security level of the network. We test and validate the proposed method using our 5G testbed and we compare the optimized method to the classical TOPSIS and the known vulnerability scanner tool, Nessus.

1. Introduction

The fifth-generation (5G) wireless technology provides higher speed, lower latency, and greater capacity than 4G LTE networks. It uses Dynamic Spectrum Sharing (DSS) that can support a range of functions—from distance learning to mobile workforces. From emergency response to global payments to next-level gaming and entertainment, the possibilities are virtually limitless. Furthermore, 5G could make drone delivery, cloud-connected traffic control and other applications live up to their potential. It can also work across a wider range of radio frequencies, opening up new possibilities in the ultra-high millimeter-wave bands for carriers to expand their network capabilities [1].
Resultantly, 5G networks require complex security architectures unlike those in prior generations of cellular networks. The architecture of the previous cellular network generations did not account for several attacks such as insider attacks or even attacks on a roaming network. [2] The dynamics of new services and technologies in 5G were not common before, e.g., multi-tenancy and virtualization services share the same mobile network infrastructure. The 5G network integrates cloud computing, Software De-fined Networking (SDN), and Network Function Virtualization (NFV), and inherits their security challenges. Therefore, 5G adds a new trust model, where only the uSIM (Universal Subscriber Identity Module) and UDM (Unified Data Management) with the ARPF (Authentication Credential Repository and Processing Function) are trusted; all intermediate network hosts are not. These 5G networks utilize well-known Internet protocols such as HTTP and TLS. This change can be viewed with some trepidation since, until now, telecom protocols were closed, making them an entry barrier to attackers. Conversely, Internet technologies are open, and they are well known. This emphasizes the need for robust security mechanisms across the entire 5G network.
According to the national strategy to secure 5G implementation plan that was developed by the National Telecommunications and Information Administration (NTIA), the following challenges should be considered to develop an efficient security solution for 5G networks [3]:
(1)
The 5G network supports heterogenous infrastructure. Any security solution should use a combination of centralized and distributed, physical and virtual deployments to ensure security at multiple levels (e.g., slices, services, and resources) across multiple domains (i.e., administrative and technological domains where 5G services are orchestrated such as Mobile Virtual Network Operators (MVNOs) for automotive, eHealth, massive IoT, massive multimedia broadband, etc. [4]).
(2)
The 5G network requires scalable and higher-performance security solutions. The increase in bandwidth from 4G eNodeB to 5G gNodeB will cause significant increases in performance and scale requirements that the current security infrastructure may not be able to handle. This means the threat detection and vulnerability analysis solutions should be dynamic, consistent, and scalable.
(3)
Distributed edge clouds create new attacks surfaces and vulnerability points. If no proper security mechanisms are in place, such as encryption or firewalls, IP connectivity will terminate at the edge of the operator. As a result, edge cloud nodes become susceptible to spoofing, eavesdropping, and other attack [5].
(4)
Virtualization and network slicing bring new risks. There must be a method for separating virtualization layers and network slices from one another [6,7,8].
To the best of our knowledge, none of the current works introduces a real-time vulnerability assessment framework that specifically works for 5G Edge networks and considers these systems’ real-time scalability and dynamic features due to the lack of publicly available 5G Edge testbeds, datasets, and attack graphs.
A few works [9,10,11,12,13,14,15,16,17,18,19,20] study vulnerability analysis and risk assessment in 5G Networks. However, they
(a)
are still at an early stage;
(b)
focus on either the SDN or NFV security [9,10];
(c)
are not accurate enough when they are applied to large-scale systems like the 5G networks;
(d)
do not consider the 5G challenges such as performance monitoring, scalability, orchestration and management, heterogeneous network support, and integration of the SDN, NFV, and edge computing;
(e)
use generalized attack graph model and do not consider specific 5G attack vectors.
Several 5G threat assessments have been introduced in [11,12,13] to evaluate threats in 5G networks with a focus on the SDN and NFV technologies to identify the threats to NFV components such as firewalls and IDS and the interfaces between the architectural layers of the data, control and application planes introduced by SDN. In [14], the authors introduced an intrusion prevention system that employed five layers of 5G systems to detect the flow table overloading attack. However, this work is more specific to a particular attack category and does not consider the rest of the 5G attack vectors. Furthermore, it lacks the vulnerability analysis of the 5G core components. The authors of [15] present a graph model for multi-stage attack scenarios relating to the critical assets of the hierarchical network architecture of the 5G. In this work, an automated attack and defense framework is proposed based on the attacker’s actions. Although vulnerabilities are generalized in this model rather than hardware or software specific ones, it does nonetheless rely on knowledge of vulnerabilities in the 5G network.
Among promising approaches that proved good performance in the cybersecurity domain is the Multi-Criteria Decision-Making Technique (MCDM) [21] using the TOPSIS [22]. In [23] authors used the TOPSIS to rank various feature selection approaches (e.g., Naive Bayes Classifier, J48 Classifier) that are used for some IDSs to select the important features on network traffic dataset.
In alignment with the NTIA’s lines of effort discussed before, we develop a Vulnerability Assessment Approach (VAA) that uses the TOPSIS approach to find the potential attack graph paths where the attack might propagate. The VAA can:
(a)
analyze the vulnerabilities in the 5G core components (i.e., SDN, NFV, and cloud Edge servers) and User Equipment (UE) from the attacker perspective especially concerning the dynamic, low latency, and scalable properties of the 5G networks;
(b)
generate attack graphs based on the 5G attack vector;
(c)
quantify the security level of the network and attack cost by deriving each attack node’s minimal effort in the attack tree.
The VAA uses the TOPSIS [22] to compute the shortest attack path by selecting the lowest attacker cost of actions that denotes the lowest attacker efforts to exploit a certain vulnerability. Such shortest paths:
(a)
help the Intrusion Response Systems (IRS) predict the position where attacks and exploits will be propagated in the 5G network;
(b)
reduce the cardinality exponential growth of the system security state space that any IRS computes and that usually causes the state space explosion problem when applying a mitigation action in large-scale systems such as 5G Edge networks.
The proposed VAA uses two alternative techniques, the classical TOPSIS as discussed in [24] and the integrated TOPSIS with the Hexagonal Fuzzy Numbers (HFN) [25] to find the attack graph paths with the lowest attacker costs where the attack most probably will propagate. The reason for integrating the TOPSIS with the HFN is that the other TOPSIS methods, such as The TOPSIS with triangular, trapezoidal, and pentagonal fuzzy numbers, are found to have some vagueness and are not sufficient to arrive at a solution because of its higher dimensionality [26] particularly when they are used with large systems such as 5G networks. The accuracy, scalability, and performance of the proposed techniques will be tested and evaluated using our new 5G Edge security testbed. The testbed also allows us to develop 5G attack scenarios and attack graphs that are required to evaluate the VAA. We make this testbed in the light of other states of the art such as 5G Playground [27], Cisco [28], AWS [29], and Huawei [30].
The remainder of this paper is organized as follows. Section 2 presents the background and related work. Section 3 describes the 5G Edge attack vectors and scenarios. Section 4 introduces the new 5G Edge security testbed. Section 5 introduces the original VAA using the classic TOPSIS [31] and the optimized VAA using the Hexagonal Fuzzy TOPSIS Method. Section 6 introduces a practical case study for both the original VAA and the optimized one. Section 7 compares the accuracy and performance of the original VAA and the optimized one with the Nessus [32]. Finally, Section 8 draws some concluding remarks and outlines future work.

2. Background and Related Work

Sulaiman et al. [33] introduced qualitative and quantitative analysis of the cyber security issues on LTE and 5G Technologies using the Support Vector Machine (SVM). The proposed approach is capable of classifying the DDoS (Distributed Denial of Service) attack, Man-in-the-middle attack, Phishing attack, SQL Injection, and False Data Injection attacks. Seongmin et al. [34] provided insight into the security challenges in the real 5G NSA network discussed the mitigation techniques. The authors also created an attack tree and developed 15 test cases that can be applied to real networks and identified eight valid vulnerabilities. Gerrit et al. [35] studied possible threats according to the STRIDE threat classification model and derive a risk matrix based on the likelihood and impact of 12 threat scenarios that affect the radio access and the network core. Sullivan et al. [36] categorize security technologies using Open Systems Interconnection (OSI) layers and, for each layer, the authors discuss vulnerabilities, threats, security solutions, challenges, gaps, and open research issues. Weiwei et al. [37] proposed a new channel-based spoofing attack detection scheme in millimeter-wave massive multiple-input multiple-output (mmWave-MIMO) 5G networks using channel virtual representation. Reference [38] introduced new control-aware attack analytics for securing the IoT-based 5G networks. References [16,17,18,19,20,39,40,41,42] introduced new vulnerability assessment and attack detection approaches that work specifically for 5G core networks. They studied the new vulnerabilities related to the 5G core network components such as the SDN, NFV, and RAN and introduced new risk assessment and attack graph analysis models using various machine learning approaches.
In the following two subsections, we highlight the techniques used in this paper, namely, the TOPSIS technique and the hexagonal fuzzy number.

2.1. The Technique for Order Preference by Similarity to an Ideal Solution (TOPSIS)

The TOPSIS [22] is a multi-criteria decision-making technique that is based on the concept that the chosen alternative should have the shortest geometric distance from the positive ideal solution and the longest geometric distance from the negative ideal solution. The preferred alternative is the one with the closest distance to the positive ideal solution. The positive ideal solution is formed as a combination of the best points of each criterion. The negative ideal solution is a combination of the worst points of each criterion. The ranking results can be obtained corresponding to the importance weights of the defined criteria. If each characteristic takes on asymptotically raising or lowering variation, then maybe an ideal solution can be easily defined. That solution consists of all possible alternative values to achieve the best attributes since the worst solution consists of all attainable worst attribute values. Assumed a decision-making issue with multiple criteria has n alternatives, A1, A2, …, An and m criteria, C1, C2, …, Cm. Each alternative is assessed against the criteria of m. All the values/ratings are allocated to alternatives regarding the decision matrix represented by X(xij)m×n. Let W = (w1, w2, …, wm) be the weight vector of criteria, satisfying ∑mj−1wj = 1. The decision Matrix X is shown below.
( X ) m × n = ( X 11 X 12 X 1 n X 21 X 22 X 2 n X m 1 X m 2 X m n )
There are several applications for the TOPSIS in different fields. Dursun and Karsak [43] used a combination of fuzzy information, a 2-tuple linguistic representation model, and fuzzy TOPSIS and gave effective results. Lin and Chang [44] proposed a fuzzy approach for evaluating customers (buyers) and used the assessment results to screen orders by applying the fuzzy TOPSIS. Kamble and Naziya [45] proposed an integrated method of fuzzy AHP and fuzzy TOPSIS and applied it to the staff selection problem. Ashtiani et al. [24] solved Multiple Criteria Decision Making (MCDM) problems using the interval-valued fuzzy TOPSIS method, in which the weights of criteria are unequal.
A few approaches used the TOPSIS method in the cybersecurity domain. For example, Ansari et al. [46] used the Triangular Fuzzy Number TOPSIS approach to select the most suitable security requirements for quality and trustworthy software development based on the security expert’s knowledge and experience. Gyumin et al. [47] developed an MCDM approach for flood vulnerability assessment which considers uncertainty. This study uses a modified fuzzy TOPSIS method based on level sets which consider various uncertainties related to weight derivation and crisp data aggregation. However, the proposed flood vulnerability assessment method is limited to support flood management policies. Yazdani et al. [48] developed a framework that extends conventional RAMCAP (Risk Analysis and Management for Critical Asset Protection) by adopting the fuzzy TOPSIS as an MCDM technique to determine the weights of each criterion and the importance of alternatives with respect to criteria.

2.2. Hexagonal Fuzzy Number

A fuzzy number M~ is an HFN denoted by six tuples M~ (a1, a2, a3, a4, a5, a6, r, s) where a1a2a3a4a5a6 are real numbers and its membership function µM~ (x) is given below in Equation (1), where and 0 < r, s < 1 are interval values of the µM~ (x). The graphical representation of a HFN for x ∈ [0, 1] is shown in Figure 1 [25,49].
µ M ˜ ( x ) = { 1 2 ( ( x a 1 ) a 2 a 1 ) , a 1 x a 2 1 2 + 1 2 ( ( x a 1 ) a 3 a 2 ) , a 2 x a 3 1 , a 3 x a 4 1 1 2 ( ( x a 4 ) a 5 a 4 ) , a 4 x a 5 1 2 ( ( a 6 x ) a 6 a 5 ) , a 5 x a 6 0 , o t h e r w i s e .
(a) 
Operation on Hexagonal Fuzzy Numbers
Consider two HFNs M~ = (m1, m2, m3, m4, m5, m6) and = (n1, n2, n3, n4, n5, n6), then the operation on these two HFNs are as follows [50]:
  • Addition: M˜ ⊕ N˜ = (m1 + n1, m2 + n2, m3 + n3, m4 + n4, m5 + n5, m6 + n6);
  • Subtraction: M˜ − N˜ = (m1n6, m2n5, m3n4, m4n3, m5n2, m6n1);
  • Multiplication: M˜ × N˜ = (m1 × n1, m2 × n2, m3 × n3, m4 × n4, m5× n5, m6 × n6);
  • Division: M˜/N˜ = (m1/n6, m2/n5, m3/n4, m4/n3, m5/n2, m6/n1).
(b) 
The Distance between Two HFNs
If = (m1, m2, m3, m4, m5, m6) and = (n1, n2, n3, n4, n5, n6) are two HFNs, then the hamming distance of from is given by Equation (2) [50].
d(, ) = 1/6 (|m1n1| + |m2n2| + |m3n3| + |m4n4| + |m5n5| + |m6n6|)

3. The 5G Edge Attack Vector

The attack surface of the 5G edge network is very big, see Figure 2. Dutta and Hammad [31] studied the 5G security challenges, risks, and threats of underlying 5G elements such as the orchestrator, SDN controller, network controller, and the NFV security orchestrator. In the following, we summarize these threat categories.
  • Threat 1: Attack from VMs in the same domain. Attackers would manipulate the VM and potentially extend the attack to other VMs. This threat category includes Buffer overflow, DOS, ARP, Hypervisor, and vswitch threats;
  • Threat 2: Attack to host, hypervisor, and VMs from applications in host Machine. The attacker exploits vulnerabilities caused by the main poor design of hypervisors and improper configuration and injects malicious software to virtual memory and control VM. This threat category includes the malformed packet attacks to hypervisors;
  • Threat 3: Attack from host applications communicating with VMs. This includes attacks that exploit vulnerabilities caused by improper network isolation and improper configuration to application privileges of the host machine;
  • Threat 4: Attack to VMs from remote management path. This includes eavesdropping, tampering, DOS attack, and Man-in-the-Middle attack;
  • Threat 5: Attack to external communication with third party applications. This includes illegal access to API and DOS attacks to API;
  • Threat 6: Attack from external network via network edge node. This includes attacks against Virtualized Firewalls and Residential gateways;
  • Threat 7: Attack from host machines or VMs of an external network domain. This includes attacks against the VNF migration and VNF scaling.
From our analysis, besides the traditional network, IoT, and cloud attack surfaces that are inherited to the 5G networks, there are additional attacks enabled by the integration of mobile Edge computing (MEC) and 5G networks, as depicted in Figure 3, namely [31]:
  • (I): Insecuremobile backhaul network. Data exchanged between MEC nodes often traverse insecure shared backhaul that is vulnerable to MITM attacks, including eavesdropping and spoofing. Such attacks can also come from edge nodes connected to the public internet through the edge Firewall Interfaces (e.g., SGi/N6);
  • (S): Shared infrastructure with third-party applications. MEC nodes can be opened to allow authorized participants to deploy applications/services to other users. However, poorly designed applications can create opportunities for attackers to invade the system and pose threats to the network applications running on the platform;
  • (P): Privacy leakage illegitimate access to the Multi-access MEC system. In this case, an attacker can compromise the service infrastructure and the network hampering information privacy, and accessing the information stored at the edge system’s upper layers that in turns poses a serious concern for privacy leakage. In this paper, we mainly target these attacks using the VAA.

4. The New 5G Edge Security Testbed and the Scalable Deployment of the Security Framework

To consider the 5G characteristics, we introduce a hierarchical, scalable, robust, and flexible deployment architecture for our Autonomous Security Management Framework (ASMF) [51,52,53,54,55,56,57,58,59] see Figure 4. The ASMF framework consists of the following components and processes. The components in yellow, grey, and pink colors are the ones we implemented; the rest of the components are open-source systems that we deployed in the testbed.
(a)
Collection. This process collects events and logs from several IDSs sensors and sends them to the integration process;
(b)
Integration. This process integrates distinct events that are collected from distinct sensors through two processes, namely, normalization and prioritization. The former formats any sensor event into the IDMEF protocol format [60] to facilitate the analysis and correlation of these events in the next layer. The latter handles the prioritization systems of distinct detectors i.e., Mobile Agent IDS(MA-IDS) and network-based IDSs (NIDS);
(c)
Correlation. It correlates the normalized events from different sensors to highlight the few critical ones. It compares each event against a set of attack rules to discover if it signals a true attack and then it correlates the related events;
(d)
Feature Selection. This process extracts a subset of relevant important features from the correlation process to enhance the classification results. More details about this process are listed in [54];
(e)
Risk Assessment. The risk assessment model assesses the risk in the 5G infrastructure based on the alert level of different events;
(f)
Autonomic Response and Countermeasures Selection Process. This process selects the most suitable set of countermeasures to protect the hosts and the network against a particular attack. More details about this process are listed in [52,53].
Our testbed consists of the following open-source components. Table 1 depicts the capabilities of the resources of the testbed machines.
  • OpenStack [61] is an open-source hypervisor platform that uses pooled physical and virtual resources to deliver Infrastructure-as-a-service (IaaS);
  • The Open-Source Network Function Virtualization Management and Orchestration (OSM) [62] handles the management and orchestration of NFV layers. OSM enables the creation of network services with programmatic ease. It has two principal elements for building a network service: (1) VNF packages and (2) NS packages;
  • The FlexRan [63] platform is made up of two main components: the FlexRAN Control Plane and FlexRAN Agent API. The FlexRAN protocol facilitates the communication between the master controller and the agents;
  • Open5GS [64] integrates with 5G New Radio Stand-Alone (SA) base stations and user equipment supporting the current need to have a flexible 5G Core Network.
In 5G Edge Networks, UE (e.g., mobile devices) at the edge of a coverage area, or the area where the signal strength of the base station and a Small Cell Access (SCA) point is very low, are connected to a relay which in turn is connected to a Base Station (BS) through SCA. Two or more devices at the relay also establish a direct connection link between each other. In our testbed, the nodes, SCA, relay, and base stations are virtually deployed using the Open5GCore toolkit [27]. Each node/device/user equipment has an MA-IDS deployed to analyze system logs and forwards security alerts to the corresponding dedicated pre-processing server. Each of these servers has a dedicated NIDS to analyze the network traffic. The pre-processing servers run the collection, normalization, integration, and correlation for the alerts forwarded through the relays, SCAs, and/or BS. After that, these servers forward the final correlated alerts to the risk assessment server. In this deployment, we have m slices corresponding to m BSs. Each slice has n risk assessment servers and n SCA Security Servers (S3s) for risk mitigation.
The risk assessment server assesses the risks based on all correlated alerts that are received from relays, SCAs, and/or BS. The correlated alerts and risk alert information produced by the VAA are forwarded to a Global BS Security Server (GBSS) which is located at each slice of the deployment. After that, each S3 applies a response against the ongoing attacks in its substation network. S3 forwards log information to the GBSS only if it can mitigate the attacks, otherwise, a response strategy is computed by the GBSS’s Autonomous Response Controller (ARC) [52,53] and applied to those substations where the S3 was not able to mitigate the attacks. The response strategy applied by the ARC of the GBSS is of two types, a manual action applied by the 5G administrator, or an automated action against multi-stage attacks requiring that each S3 correlates the alerts signaled from several substations in the 5G.

5. The New Vulnerability Analysis Approach (VAA)

The VAA develops (1) a scalable attack Graph Generator (GG) model, and (2) a new dynamic Vulnerability Analysis (VA) model that hierarchically analyzes the generated attack graphs using the TOPSIS to model the multiple-criteria decision-making problem in the 5G Edge dynamic environment to find the ideal solution that the attacker may consider. The ideal solution in the current context refers to the lowest attacker cost of actions that denotes the lowest attacker efforts to exploit a certain vulnerability, e.g., in Figure 5, if the computed TOPSIS cost of exploitation of the Common Vulnerabilities and Exposures (CVE) [48] security flow with ID CVE2004-0417 is lower than CVE2002-0392 and CVE2004-0415, this means if the attacker started exploiting CVE2004-0417 rather than the other vulnerabilities, this will be considered a positive ideal solution. In the next two sections, we introduce the two alternative TOPSIS techniques that the VAA uses.

5.1. Develop the VAA Using the Classical TOPSIS

The following steps summarize the proposed VAA.
  • Step 1: Develop a scalable attack Graph Generator (GG) model.
This model is based on the security attack vector that focuses on the attacks and threats that may harvest intelligence from the 5G network resources, states, and flows as a result of the integration of the NFV and SDN. The basic idea underlying this model is that the attacker’s action cost is under the constraint of certain vulnerability and network dynamic factors/indicators of the 5G network such as latency, accessibility, and other factors described in [65]. The vulnerability factors refer to the Common Vulnerability Scoring System (CVSS) factors/indicators namely Base, Temporal, and Environmental. Each of these factors is a composite of other several factors described in [66]. We model this problem as a multi-objective decision-making problem as follows.
(1)
Create the GG three-layer hierarchical model based on the vulnerability and dynamic network factors, see Figure 6.
The attack graph is modeled based on these factors. An attack graph is defined as a tuple G = (A, S, T), where A is a set of attack actions, S is a set of system states, T is a set of targets that the attacker tries to achieve. An attack graph GG consists of a set of nodes of four types, see Figure 5: (1) attack-step nodes (circular-shaped AND-nodes). Each node in this set represents a single attack step that can be carried out when all the predecessors (preconditions to the attack which are either configuration settings or network privileges) are satisfied; (2) Privilege nodes (diamond-shaped nodes): Each node in this set represents a single network privilege. The privilege can be achieved through any one of its predecessor AND node which represents an attack step leading to the privilege. Each node in this set represents a fact about the current network configuration that contributes to one or more attack possibilities (sub-action); (3) Configuration nodes (circular-shaped): Each node in this set represents an initial vulnerability, configuration settings, or network privileges that are known to be true and have no variance in probability; (4) Final step nodes (rectangular-shaped): Each node in this set represents a final exploit action against a certain vulnerability.
(2)
Construct a pair-wise evaluation matrix M, see Figure 7, based on the attack graph. After that, we compute the combinatorial weights (Wi) which refer to the weight of the impact of each layer’s dynamic factors, in the GG three-layer model, on the attacker decision as given in Equation (3).
W i = ( W j i L ) j = 1 n W L
where i is the GG hierarchical layer index {1,2,3}, j refers to the dynamic factors, and WL is the criteria layer combinational weight vector which is computed as given in Equation (4).
WL = MW
where W is the relevant normalized characteristic vector/eigenvector = λ m a x W, for all w = (w1, w2, w3, …, wn). λ m a x is the largest eigenvalue of matrix M.
  • Step 2: Compute the attack cost of actions using the classical TOPSIS.
To compute the attack cost of actions, we will apply the classical TOPSIS approach as follows.
(1)
Normalize the pair-wise decision matrix M to form the normalized decision matrix N as given in Equation (5).
N i j = ( N i j ) m × n
where, N i j = M i j j = 1 n M i j 2 , i = 1 , 2 , , m ,   j = 1 , 2 , , n
(2)
Calculate the weighted normalized decision matrix and the best and worth alternatives.
The weighted normalized decision matrix E = N  ×  W. The best alternative E+ and the worst alternative E are defined in Equations (6) and (7), respectively.
E+ = (E+1, E+2, E+3, ………, E+n)
E = (E1, E2, E3, ………, En)
Let us define the benefit criteria from the attacker perspective (e.g., high exploitability, high latency, low speed … etc.) as B and the cost criteria as C (e.g., long exploit time, low latency, low speed … etc.). The value of E+ and E can be calculated using Equations (8) and (9), respectively.
e i + = [ m a x j ( E i j ) | i B ] ,   [ m i n j ( E i j ) | i C ]
e i = [ m i n j ( E i j ) | i B ] ,   [ m a x j ( E i j ) | i C ]
(3)
Calculate the cost of the attacker’s actions. We use the L2-distance defined by the TOPSIS approach to calculate L2i+, the distance between the target alternative i and the best condition E+ as given in Equation (10) and L2i, the distance between the target alternative i and the worst condition E as given in Equation (11).
L 2 i + = k = 1 n ( e i , k e k + ) 2
L 2 i = k = 1 n ( e i , k e k ) 2
Based on the L2i+ and L2i distances, we compute the similarity to the worst condition as the cost of the attacker’s actions (AtcCost) as shown in Equation (12).
A t c C o s t ( i ) = L 2 i L 2 i + + L 2 i
where i {1, 2, …, m} is the actions the attacker can choose from m possible actions. Using the attack graph in Figure 5, we give a simple demonstration for the decision matrix of the attacker’s actions compared to the network indicators (the network components where the attacker may start its exploitation), see Table 2. The full case study of this example is detailed in Section 6. The computed attack graphs, actions, and the costs of these actions can be used by an intrusion response system to model the security reciprocal interaction between it and the attacker and can help in deploying the best countermeasures to mitigate the attacks in the 5G edge networks.

5.2. Develop the VAA Using the Hexagonal Fuzzy TOPSIS Method

The new proposed approach integrates the TOPSIS with the HFN approach. This approach uses the same attack Graph Generator (GG) and the three-layer hierarchical model that is based on the vulnerability and dynamic network factors described in Section 5.1. In the following, we describe the steps of the proposed approach.
  • Step 1: Construct the fuzzy decision matrix M. The fuzzy decision matrix has each entry of the HFN as given below:
M = ( X 11 X 12 X 1 m X 21 X 22 X 2 m X n 1 X n 2 X n m )
where xij = (xij1, xij2, xij3, xij4, xij5, xij6), i = 1, 2, 3,…, m; j = 1, 2, 3,…, n, represents the number of alternatives and criteria, respectively.
  • Step 2: Construct the normalized decision matrix ij using M entries as shown in Equation (13).
N ˜ i j = x i j j = 1 n x i j ~ 2 ,   i = 1 , 2 , , m
  • Step 3: Calculate the weighted normalized decision matrix.
The weighted normalized decision matrix ij = Ij × j, where i = 1 , 2 , , m and j = 1 , 2 , , n . Where j is the weight of the criterion which refers to the weight of the impact of each layer’s dynamic factors, in the GG three-layer model, on the attacker decision.
Unlike the classical TOPSIS method described in Section 5.1, which uses the λ m a x (the largest eigenvalue of matrix M) to compute the weight of the criterion, we introduce a special structure of fuzzy numbers, Normalized Fuzzy Weight, that represents a fuzzification of crisp normalized weights that are defined as non-negative real numbers w1, w2, …, wn such that j = 1 n , w j = 1 .
Fuzzy numbers W1, W2, …, Wn defined on [0, 1] are called normalized fuzzy weights if for any α (0, 1] and all j  Nn the following holds:
For any wj   W there exist wi   W, j   Nn, ij, such that wj + j = 1 ,   j i n   w j = 1 .
Normalized fuzzy weights make it possible to model mathematically an uncertain division of a unit into n fractions. Figure 8 illustrates an example of normalized fuzzy weights.
  • Step 4: Calculate the fuzzy positive ideal alternative + and the fuzzy negative ideal alternative as shown in Equations (14) and (15), respectively.
E ˜ + = ( E ˜ + 1 ,   E ˜ + 2 ,   E ˜ + 3 ,   ,   E ˜ + n ) = { ( max j   E i j | i B ) , ( min j   E i j | i C ) }
E ˜ = ( E ˜ 1 ,   E ˜ 2 ,   E ˜ 3 ,   ,   E ˜ n ) = { ( min j   E i j | i B ) , ( max j   E i j | i C ) }  
where + i is the max value of i for all the alternatives and is the min value of i for all the alternatives. B and C represent the positive (based on the benefit criteria) and negative ideal solutions (based on the cost criteria), respectively. The benefit criteria from the attacker perspective include high exploitability, high latency, low speed … etc. The cost criteria include long exploit time, low latency, low speed … etc.
  • Step 5: Determine the distance measures to ideal solutions, since the + and are still HFN, we calculate Di+, the distance between the target alternative i( E i , ~ ) and the best condition in + from the attacker perspective as given in Equation (16), and Di, the distance between the target alternative i( E i , ~ ) and the worst condition in as given in Equation (17).
D i + = k = 1 n d ( E k ~ +   , E i , k ~ ) 2 i = 1 ,   2 ,   3 , , m
D i = k = 1 n d ( E k ~   , E i , k ~ ) 2 i = 1 ,   2 ,   3 , , m
where d ( E k ~ +   , E i , k ~ ) and d ( E k ~   , E i , k ~ ) are calculated using the distance equation of HFN in Equation (2).
  • Step 6: Calculate the cost and benefits of the attacker’s actions. Based on the Di+ and Di distances, we compute the similarity to the worst condition as the cost of the attacker’s actions (AtcCost) as shown in Equation (18).
A t c C o s t ( i ) = D i D i + + D i
We compute the similarity to the best condition as the benefit of the attacker’s actions (Atcbenefit) as shown in Equation (19).
A t c b e n e f i t ( i ) = D i + D i + + D i
where i {1, 2, …, m} is the actions the attacker can choose from m possible actions.

6. Performance and Accuracy Evaluation: Case Study

To evaluate VAA, we provide a 5G edge case based on the 3GPP architecture [12] in Figure 9 that is deployed in our testbed using the open-source components described in Section 4. This architecture is based on the concepts of control and user planes split, service base architecture, and network slicing. Their main network functionalities are the Network Slice Selection Function (NSSF), the Authentication Server Function (AUSF), the Unified Data Management (UDM), the Access and Mobility Management Function (AMF), the Session Management Function (SMF), the Policy Control Function (PCF), the Application Function (AF), the User Equipment (UE), the Radio Access Network (RAN), the User Plane Function (UPF), and the Data Network (DN). A two-level SDN controllers hierarchy bridges between the functions of the control and user planes, specifically, between the SMFs and the UPFs. The 5G core NFs are implemented as VNFs in an NFVI in which the SDN Controllers are virtualized and implemented. Figure 9 shows the exploited assets in this case study in red color.
Using the Metasploit framework [67], we ran some exploits based on the 5G Edge attack vector described in Section 3. These exploits target six vulnerabilities in the testbed namely, the CVE-2019-15083 (allows for an XSS injection that leads to control what software is installed on the admin workstation), CVE-2013-0375 (allows for remote injection of SQL code that leads to bypassing the AUSF), CVE-2019-16026 (leads to a denial of service (DoS) condition on the AMF), CVE-2004-0415 (allows for illegitimate access to portions of kernel memory that leads to illegitimate access to the SDN), CVE-2002-0392 (allows for remote execution of DoS attack that leads to disruption for the NFVI functionalities), CVE-2004-0417 (allows for an integer overflow in the CVS Apps that leads to illegitimate access to the RAN). Figure 10 shows the attack graph that was created using the aforementioned approach described in Section 5.1. The main target of the attacker is to access and control the RAN module using the aforementioned vulnerabilities that belong to the three attack categories described in Section 3 (i.e., I, S, P).

6.1. Evaluating the VAA Using the Classic TOPSIS

Table 3 shows an example of the pair-wise evaluation matrix M of the criteria layer (vulnerability factors) and the indicator layer (network dynamic factors). Using Matrix M, we compute the AtcCost for each possible path of actions according to Equation (12). We then choose the lowest attacker efforts in three attacking schemes (i.e., I, S, P). As Table 4 depicts the lowest cost is achieved when the attacker exploits the CVE-2004-0417 first. Although the long attacking path increases the attacker’s cost, it also enables the attacker to consider more vulnerability and network dynamic factors that in turn reduce the attacker’s overall cost. Such long paths reduce the L2i+ and increase the L2i, which in turn reduces the AtcCost, see Equations (10)–(12). Figure 11 shows the attack costs for all possible paths of the three attacking schemes (i.e., I, S, P).

6.2. Evaluating the VAA Using the Hexagonal Fuzzy TOPSIS Method

In the following steps, we describe the practical implementation of the proposed Hexagonal Fuzzy TOPSIS Method steps that are described in Section 5.2. We use the same use case described in Section 6.1.
  • Step 1: Construct the fuzzy decision matrix M.
As depicted in Figure 10, the use case involves 16 criteria/indicators/factors and 23 actions. We compute the combinatorial weights (Wi), for i [0, 15] which refer to the weight of the impact of each vulnerability CVSS factor/indicator and other dynamic 5G network factors, see Table 5, where i refers to the index of the factor. Further, A0, A2, …, A22 refer to the alternative attacker’s actions associated with the consequences of changing the CVSS and dynamic network factors. We set the initial weights based on their factors’ impact on the security, latency, and stability of the 5G network, as Table 5 depicts.
The criteria and alternative attacker’s actions are compared with linguistic terms as Table 6 and Table 7 depict. The rating of the alternative attacker’s actions given in Table 7 is computed based on the weight/impact of the CVSS and dynamic 5G network factors/indicators on the attackers’ actions based on the generated attack graph in Figure 10. For instance, w1, w5, and w11 have a Very High (VH) impact on Action 3 (A3) because there is a direct impact of indicators 1, 5, and 11 on A3. Similarly, w13 and w14 have Medium-High (MH) impact on A3 because there is an indirect impact of indicators 13 and 14 on A3 through indicator 5. W3 has Low (L) impact on A3 because there is an indirect impact of indicators 3 on A3 through a longer path (I3-A15-I8-A20-I5-A3).
Using the information in Table 7 and the HFN in Table 6, we construct a decision matrix M, see Table 8.
  • Step 2: Construct the normalized decision matrix.
We construct the normalized decision matrix ij using Equation (13) as Table 9 depicts.
  • Step 3: Calculate the weighted normalized decision matrix.
We create the weighted normalized decision matrix ij as described in Section 5.2. The following example explains the way the weighted normalized decision matrix in Table 10 is calculated.
E˜ij = N˜ij  ×  W˜j, where i = 0 ,   1 , , 15 and j = 0 ,   2 , , 22 .
00 = (0.24, 0.3, 0.36, 0.42, 0.48, 0.54) × 0.03 = (0.0072, 0.009, 0.0108, 0.0126, 0.0144, 0.0162).
  • Step 4: Calculate the positive and the negative alternatives.
Computing the positive and negative ideal solution using Equations (14) and (15), respectively. Using the weighted normalized decision matrix of Table 10, we compute the positive and negative ideal solutions as the largest and smallest HFN of each column of the indicator’s weights respectively. For simplicity, we consider the first six factors only, which are w0, w1, w2, w3, w4, and w6. See Table 11.
  • Step 5: Determine the distance measures to ideal solutions.
The distance of each alternative from positive and negative ideal is calculated using Equations (14) and (15), then using Equations (16) and (17). For example, we compute the distance measure D0+ to ideal positive solutions for alternative A0 for the first six factors only for simplicity w0, w1, w2, w3, w4, and w6 is computed as follows: D0+ = (d((0.0072, 0.009, 0.0108, 0.0126, 0.0144, 0.0162), (0.0072, 0.009, 0.0108, 0.0126, 0.0144, 0.0162))2 + d((0.0096, 0.012, 0.0144, 0.0168, 0.0192, 0.0216), (0.004, 0.008, 0.0124, 0.0164, 0.0208, 0.0248))2 + d((0.0216, 0.027, 0.0324, 0.0378, 0.0432, 0.0486), (0.009,0.018, 0.0279, 0.0369, 0.0468, 0.0558))2 + d((0.0264, 0.033, 0.0396, 0.0462, 0.0528, 0.0594), (0.011, 0.022, 0.0341, 0.0451, 0.0572, 0.0682))2 + d((0.0048, 0.006, 0.0072, 0.0084, 0.0096, 0.0108), (0.002, 0.004, 0.0062, 0.0082, 0.0104, 0.0124))2 = 0.129. In the same way, we compute D0 = 0.0458 using the negative ideal solutions values in Table 11. In the same way we can compute the other Di+ and Di for all 22 attacker’s actions using the 16 indicators, see Table 12.
  • Step 6: Calculate the cost and benefits of the attacker’s actions.
The cost (AtcCost) and benefits (AtcBenefit) of each attacker’s action are computed using Equations (18) and (19). See Table 13.
  • Step 7: Compute the Shortest Attack Path.
To compute the shortest attack path, we calculate the total attack cost of all attack actions that form each possible attack path. After that, we rank the attack paths based on the total attack paths costs and select the path with the lowest cost. Table 13 demonstrates how the attack paths costs are calculated for two vulnerability starting points CVE-2004-0415 and CVE2002-0392. Intuitively, the cost of exploitation of CVE-2004-0415 is less expensive than CVE2002-0392 for attacks that target the goal ‘I: Exploit mobile backhaul network’. So, the attack that is launched from “CVE-2004-0415” to exploit the mobile backhaul network is easier and has lower attack efforts than that is initiated from CVE2002-0392. However, the cost of exploitation of CVE2002-0392 is less expensive than CVE-2004-0415 for attacks that target the goal ‘S: Access to Shared resources’ or ‘P: Accessing the RAN or MEC’. Thus, the attacker’s goals and the change of the 5G network factors decide which path the attack will potentially go through.

7. Compare the Accuracy and Performance of the VAA with the Nessus

The underlying idea behind the VEA-bility metric [48] is that the security of a network is influenced by many factors, including the severity of existing vulnerabilities, distribution of services, connectivity of hosts, and possible attack paths. These factors are modeled into three network dimensions: Vulnerability, Exploitability, and Attackability. The overall VEA-bility score, a numeric value in the range (0, 10), is a function of these three dimensions, where a lower value implies better security. The VEA-bility metric uses data from three sources: the 5G Edge testbed topology, attack graphs, and scores as assigned by the Common Vulnerability Scoring System (CVSS) [66]. To adjust the VEA-bility metric to validate the accuracy of the vulnerability assessment of the VAA and Nessus, we modify this metric by replacing the asset Attackability factor with the AtcCost(i) value at Equation (19) for each set of actions i. We let each vulnerability v, which corresponds to a set of actions i, have an impact score, exploitability score, and temporal score as defined by the CVSS. Impact and exploitability subscores are automatically generated for each common vulnerability identifier based on its CVE name defined by the CVSS, whereas the temporal score requires user input. We then define the severity, S, of a vulnerability to be the average of the impact and temporal scores, Equation (20):
S(v) = (Impact Score(v) + Temporal Score(v))/2
The Vulnerability score (V) of a 5G Edge testbed asset, e.g., UE, MEC server, SDN, NFV,… etc., is an exponential average of the severity scores of the vulnerabilities on the 5G Edge asset, or 10, whichever is lower. The asset Exploitability score (E) is the exponential average of the exploitability score for all asset vulnerabilities multiplied by the ratio of network services on the asset. The asset Attackability score (A) refers to the toral CP values for all vulnerabilities at a certain asset. The Attackability score is multiplied by a factor of 10 to produce a number in the range (0, 10), ensuring that all dimensions have the same range. For an asset, a, let v be an asset vulnerability. We then define the three asset dimensions as shown in Equations (21)–(23):
V(a) = min(10, lneS(v))
E(a) = (min(10, lneExploitability Score(v))) (# services on a)/(# network services)
A ( t ) = ( 10 ) i = 1 n a C P ( e i )
The overall VEA-bility equation for an asset a is then computed as in Equation (24).
VEA-bilitya = 10 − ((V + E + A)a/3)
To test the performance of the proposed VEA-bility metric for both the VAA and Nessus, we developed an extensive set of scenarios described in Section 3 and Section 6 and used the vulnerabilities observed by the Nessus scan [32] and our VAA results after running the attacks scenarios. Figure 12 shows the overall average VEA-bility scores observed in our experiments for the 5G Edge testbed assets. A higher score indicates a more secure configuration, which we call more “VEA-ble”. Figure 12 shows that the VAA using the classical TOPSIS, on average, is 31.35% more VEA-ble than Nessus. Whereas, the VAA using the Hexagonal Fuzzy TOPSIS method, on average, is 9.65% and 37.84% more VEA-ble than the VAA with the classical TOPSIS and Nessus, respectively.
To compare the performance of the VAA and Nessus, we run the experiment based on the above-mentioned six vulnerabilities. Figure 13 shows the performance of the VAA and Nessus in milliseconds. The VAA using the classical TOPSIS, on average, outperforms Nessus and the VAA using the Hexagonal Fuzzy TOPSIS by 27.14% and 11.15%, respectively. The VAA using the classical TOPSIS takes 6151ms to compute the cost related to all possible paths of the six vulnerabilities while Nessus and the VAA using the Hexagonal Fuzzy TOPSIS take 8445 ms and 6837 ms, respectively, to assess the same six vulnerabilities. The VAA using the Hexagonal Fuzzy TOPSIS outperforms Nessus by 19.02%. This shows that our VAA introduces a more scalable and faster assessment.
To evaluate the scalability of the VAA, we run one of the aforementioned six vulnerability analysis experiments using the CVE-2004-0417 that takes the longest execution time as shown in Figure 13. As shown in Figure 14, the VAA using the Hexagonal Fuzzy TOPSIS method outperforms the Nessus and the VAA using classic TOPSIS when the number of participating UEs is larger than 50. This indicates that the Hexagonal Fuzzy TOPSIS method is more scalable than the other methods when the size of the 5G network increases. However, the other methods outperform the Hexagonal Fuzzy TOPSIS method for a small size 5G network. The reason underlying this is that the HFN uses the linguistic scale and quantization method that reduces the size of the processed data by mapping several HFNs into a single linguistic variable as depicted in Table 6.

8. Conclusions and Future Work

The 5G system improves the bandwidth and capabilities of the current telecommunication infrastructure. However, it introduces new threats and attacks. In this paper, we introduced a scalable and accurate vulnerability analysis approach that was tested and evaluated using our newly developed 5G Edge testbed. The experiment results depict that VAA successfully analyzed the vulnerabilities with a low error rate. The VAA using the classical TOPSIS, on average, is 31.35% more VEA-ble than Nessus. Whereas, the VAA using the Hexagonal Fuzzy TOPSIS method, on average, is 9.65% and 37.84% more VEA-ble than the VAA with the classical TOPSIS and Nessus, respectively. From a performance perspective, the VAA using the classical TOPSIS outperforms Nessus and the VAA using the Hexagonal Fuzzy TOPSIS by 27.14% and 11.15%, respectively. This is due to the Hexagonal fuzzy number computational time. The VAA using the Hexagonal Fuzzy TOPSIS is more scalable than the other methods when it is used in a large-scale 5G network.
In future work, we will integrate the VAA with an autonomous intrusion response system that considers the vulnerability assessment values of VAA to deploy countermeasures against cyberattacks. We will also integrate the model with a secure network slicing approach to decide which resources can be used by the network slices based on their risk assessment evaluation and block resources that are under attack.

Funding

This research was generously supported in part by the SUNY Polytechnic Institute Research Seed Grant Program. This research was also supported in part by the Air Force Research Laboratory through the Information Directorate’s Information Institute® CPO# FA8750-20-3-1003 contract # SA1003202109E0410.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The author declares no conflict of interest.

References

  1. Norrman, K.; Nakarmi, P.K.; Fogelstrm, E. 5G Security Enabling a Trust-Worthy 5g System. 2018. Available online: https://www.ericsson.com/en/reports-and-papers/white-papers/5g-security---enabling-a-trustworthy-5g-system (accessed on 5 September 2021).
  2. 5G Security Issues, White Paper by Positive-Tech. Co. 2019. Available online: https://positive-tech.com/expert-lab/research/5g-security-issues/ (accessed on 5 September 2021).
  3. The National Strategy to Secure 5g Implementation Plan. The National Telecommunications and Information Administration (NTIA). 2020. Available online: https://www.govinfo.gov/content/pkg/FR-2020-06-16/pdf/2020-12960.pdf (accessed on 5 September 2021).
  4. Afolabi, I.; Ksentini, A.; Bagaa, M.; Taleb, T.; Corici, M.; Nakao, A. Towards 5G Network Slicing over Multiple-Domains. IEICE Trans. Commun. 2017, E100-B, P1992–P2006. [Google Scholar] [CrossRef] [Green Version]
  5. Vijayan, J. 4 Ways Edge Computing Changes Your Threat Model. May 2020. Available online: https://www.csoonline.com/article/3543191/4-ways-edge-computing-changes-your-threat-model.html (accessed on 10 October 2021).
  6. Subedi, P.; Alsadoon, A.; Prasad, P.W.C.; Rehman, S.; Giweli, N.; Imran, M.; Arif, S. Network slicing: A next generation 5G perspective. J. Wirel. Commun. Netw. 2021, 2021, 102. [Google Scholar] [CrossRef]
  7. Fernandez, J.-M.; Vidal, I.; Valera, F. Enabling the Orchestration of IoT Slices through Edge and Cloud Microservice Platforms. Sensors 2019, 19, 2980. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  8. Makris, N.; Zarafetas, C.; Valantasis, A.; Korakis, T. Service Orchestratidoion Over Wireless Network Slices: Testbed Setup and Integration. IEEE Trans. Netw. Serv. Manag. 2021, 18, 482–497. [Google Scholar] [CrossRef]
  9. Rodrigo, R.; Javier Lopez, M.M. Mobile edge computing, Fog et al.: A survey and analysis of security threats and challenges. Future Gener. Comput. Syst. 2018, 78, 680–698. [Google Scholar]
  10. Fan, Z.; Xiao, Y.; Nayak, A.; Tan, C. An improved network security situation assessment approach in software defined networks. Peer-to-Peer Netw. Appl. 2019, 12, 295–309. [Google Scholar] [CrossRef]
  11. Khan, R.; Kumar, P.; Jayakody, D.N.K.; Liyanage, M. A survey on security and privacy of 5g technologies: Potential solutions, recent advancements and future directions. IEEE Commun. Surv. Tutor. 2019, 22, 196–248. [Google Scholar] [CrossRef] [Green Version]
  12. Rudolph, H.C.; Kunz, A.; Iacono, L.L.; Nguyen, H.V. Security challenges of the 3gpp 5g service based architecture. IEEE Commun. Stand. Mag. 2019, 3, 60–65. [Google Scholar] [CrossRef]
  13. Enisa Threat Landscape for 5G Networks, Report, European Union for Cybersecurity. 2019. Available online: https://www.enisa.europa.eu/publications/enisa-threat-landscape-report-for-5g-networks (accessed on 10 December 2020).
  14. Abdulqadder, I.; Zou, D.; Aziz, I.; Yuan, B.; Dai, W. Deployment of robust security scheme in sdn based 5g network over nfv enabled cloud environment. IEEE Trans. Emerg. Top. Comput. 2018, 9, 866–877. [Google Scholar] [CrossRef]
  15. Tian, Z.; Sun, Y.; Su, S.; Li, M.; Du, X.; Guizani, M. Automated attack and defense framework for 5g security on physical and logical layers. arXiv 2019, arXiv:1902.04009. [Google Scholar]
  16. Luo, S.; Wu, J.; Li, J.; Guo, L.; Pei, B. Toward Vulnerability Assessment for 5G Mobile Communication Networks. In Proceedings of the 2015 IEEE International Conference on Smart City/SocialCom/SustainCom (SmartCity), Chengdu, China, 19–21 December 2015; pp. 72–76. [Google Scholar] [CrossRef]
  17. Batalla, J.M.; Andrukiewicz, E.; Gomez, G.P.; Sapiecha, P.; Mavromoustakis, C.X.; Mastorakis, G.; Zurek, J.; Imran, M. Security Risk Assessment for 5G Networks: National Perspective. IEEE Wirel. Commun. 2020, 27, 16–22. [Google Scholar] [CrossRef]
  18. Khan, J.A.; Chowdhury, M.M. Security Analysis of 5G Network. In Proceedings of the 2021 IEEE International Conference on Electro Information Technology (EIT), Mt. Pleasant, MI, USA, 14–15 May 2021. [Google Scholar] [CrossRef]
  19. Sun, Y.; Tian, Z.; Li, M.; Zhu, C.; Guizani, N. Automated Attack and Defense Framework toward 5G Security. IEEE Netw. 2020, 34, 247–253. [Google Scholar] [CrossRef]
  20. Xu, H.; Dong, M.; Ota, K.; Wu, J.; Li, J. Toward Software Defined Dynamic Defense as a Service for 5G-Enabled Vehicular Networks. In Proceedings of the 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Atlanta, GA, USA, 14–17 July 2019; pp. 880–887. [Google Scholar] [CrossRef]
  21. Kumar, A.; Sah, B.; Singh, A.R.; Deng, Y.; He, X.; Kumar, P.; Bansal, R. Chapter 1—Multicriteria decision-making methodologies and their applications in sustainable energy system/microgrids. In Decision Making Applications in Modern Power Systems; Academic Press: Cambridge, MA, USA, 2020; pp. 1–40. ISBN 9780128164457. [Google Scholar]
  22. Behzadian, M.; Khanmohammadi Otaghsara, S.; Yazdani, M.; Ignatius, J. A state-of the-art survey of TOPSIS applications. Expert Syst. Appl. 2012, 39, 13051–13069. [Google Scholar] [CrossRef]
  23. Dursun, M.; Ertugrul Karsak, E. A fuzzy MCDM approach for personnel selection. Expert Syst. Appl. 2010, 37, 4324–4330. [Google Scholar] [CrossRef]
  24. Ansari, M.T.J.; Al-Zahrani, F.A.; Pandey, D.; Agrawal, A. A fuzzy TOPSIS based analysis toward selection of effective security requirements engineering approach for trustworthy healthcare software development. BMC Med. Inform. Decis. Mak. 2020, 20, 236. [Google Scholar] [CrossRef] [PubMed]
  25. Chakraborty, A.; Maity, S.; Jain, S.; Mondal, S.P.; Alam, S. Hexagonal fuzzy number and its distinctive representation, ranking, defuzzification technique and application in production inventory management problem. Granul. Comput. 2021, 6, 507–521. [Google Scholar] [CrossRef]
  26. Fathi, M.R.; Matin, H.Z.; Zarchi, M.K.; Azizollahi, S. The application of fuzzy TOPSIS approach to personnel selection for Padir Company. Iran. J. Manag. Res. 2011, 3, 1–14. [Google Scholar] [CrossRef] [Green Version]
  27. Gheorghe-Pop, E.D. FOKUS, 5G Ready Testbeds: Enabling Early Prototyping and Experimentation, In Proceedings of the IEEE 5G and Beyond Testbed Workshop, Toronto, ON, Canada, 24 September 2017.
  28. Geller, M.; Nair, P. 5G Security Innovation White Paper. Available online: .https://www.netsync.com/2019/05/03/white-paper-5g-security-innovation-with-cisco/ (accessed on 5 April 2019).
  29. 5G Network Evolution with AWS. 2020. Available online: https://d1.awsstatic.com/whitepapers/5g-network-evolution-with-aws.pdf (accessed on 5 April 2019).
  30. Huawei 5G Security White Paper. Available online: https://www-file.huawei.com/-/media/corporate/pdf/trust-center/huawei-5g-security-white-paper-4th.pdf (accessed on 10 December 2020).
  31. Dutta, A.; Hammad, E. 5G Security Challenges and Opportunities: A System Approach. In Proceedings of the 2020 IEEE 3rd 5G World Forum (5GWF), Bangalore, India, 10–12 September 2020; pp. 109–114. [Google Scholar] [CrossRef]
  32. Nessus Vulnerability Scanner. Available online: http://www.nessus.org (accessed on 10 December 2020).
  33. Park, S.; Kim, D.; Park, Y.; Cho, H.; Kim, D.; Kwon, S. 5G Security Threat Assessment in Real Networks. Sensors 2021, 21, 5524. [Google Scholar] [CrossRef]
  34. Holtrup, G.; Lacube, W.; David, D.P.; Mermoud, A.; Bovet, G.; Lenders, V. 5G System Security Analysis. arXiv 2021, arXiv:2108.08700. [Google Scholar]
  35. Sullivan, S.; Brighente, A.; Kumar, S.A.P. 5G Security Challenges and Solutions: A Review by OSI Layers. IEEE Access 2021, 9, 116294–116314. [Google Scholar] [CrossRef]
  36. Li, W.; Wang, N.; Jiao, L.; Zang, K. Physical Layer Spoofing Attack Detection in MmWave Massive MIMO 5G Networks. IEEE Access 2021, 9, 60419–60432. [Google Scholar] [CrossRef]
  37. Singh, R.; Kumar, H.; Singla, R.K. TOPSIS Based Multi-Criteria Decision Making of Feature Selection Techniques for Network Traffic Dataset. Int. J. Eng. Technol. 2013, 5, 4598–4604. [Google Scholar]
  38. Haque, N.; Rahman, M.; Chen, D.; Kholidy, H. BIoTA: Control-Aware Attack Analytics for Building Internet of Things. In Proceedings of the 18th IEEE International Conference on Sensing, Communication and Networking (SECON), Rome, Italy, 6–9 July 2021. [Google Scholar]
  39. Kholidy, H.A.; Karam, A.; Sidoran, J.L.; Rahman, M.A. 5G Core Security in Edge Networks: A Vulnerability Assessment Approach. In Proceedings of the 26th IEEE Symposium on Computers and Communications (ISCC), Athens, Greece, 5–8 September 2021; pp. 1–6. [Google Scholar] [CrossRef]
  40. Steele, B.; Kholidy, H.A. 5G Networks Security: Attack Detection Using the J48 and the Random Forest Tree Classifiers. DSPACE and SDR Open Access Repository. Available online: https://soar.suny.edu/handle/20.500.12648/1604 (accessed on 10 December 2020).
  41. Ferrucci, R.; Kholidy, H.A. A Wireless Intrusion Detection for the Next Generation (5G) Networks: DSPACE and SOAR Open Access Repository. 2020. Available online: https://soar.suny.edu/handle/20.500.12648/1607 (accessed on 11 May 2020).
  42. Borgesen, M.L.; Kholidy, H.A. Evaluating Variant Deep Learning and Machine Learning Approaches for the Detection of Cyberattacks on the Next Generation 5G Systems. The SUNY Digital Repository, SUNY Open Access Repository. Available online: https://dspace.sunyconnect.suny.edu/handle/1951/71327 (accessed on 10 December 2020).
  43. Lin, H.T.; Chang, W.L. Order selection and pricing methods using flexible quantity and fuzzy approach for buyer evaluation. Eur. J. Oper. Res. 2008, 187, 415–428. [Google Scholar] [CrossRef]
  44. Kamble, P.N.; Parveen, N. An application of integrated fuzzy AHP and fuzzy TOPSIS method for staff selection. J. Comput. Math. Sci. 2018, 9, 1161–1169. [Google Scholar] [CrossRef]
  45. Ashtiani, B.; Haghighirad, F.; Makui, A.; Montazer, G.A. Extension of fuzzy TOPSIS method based on interval-valued fuzzy sets. Appl. Soft Comput. 2008, 9, 457–461. [Google Scholar] [CrossRef]
  46. Gyumin, L.; Chung, E.S.; Jun, K.S. MCDM Approach for Flood Vulnerability Assessment using TOPSIS Method with a Cut Level Sets. J. Korea Water Resour. Assoc. 2013, 46. [Google Scholar] [CrossRef] [Green Version]
  47. Yazdani, M.Y.M.; Alidoosti, A.; Basiri, M.H. Risk Analysis for Critical Infrastructures Using Fuzzy TOPSIS. J. Manag. Res. 2012, 4, 1–19. [Google Scholar] [CrossRef] [Green Version]
  48. Tupper, M.; Zincir-Heywood, A. VEA-bility security metric: A network security analysis tool. In Proceedings of the 2008 Third International Conference on Availability, Reliability and Security, Barcelona, Spain, 4–7 March 2008. [Google Scholar]
  49. Leela-apiradee, W.; Thipwiwatpotjana, P. A Ranking Method of Hexagonal Fuzzy Numbers Based on Their Possibilistic Mean Values. Available online: https://link.springer.com/chapter/10.1007/978-3-030-21920-8_29 (accessed on 10 December 2020).
  50. Ghosh, A.; Ghorui, N.; Mondal, S.P.; Kumari, S.; Mondal, B.K.; Das, A.; Gupta, M.S. Application of Hexagonal Fuzzy MCDM Methodology for Site Selection of Electric Vehicle Charging Station. Mathematics 2021, 9, 393. [Google Scholar] [CrossRef]
  51. Kholidy, H.A.; Erradi, A.; Abdelwahed, S.; Baiardi, F. A hierarchical, autonomous, and forecasting cloud IDS. In Proceedings of the 5th International Conference on Modelling, Identification and Control (ICMIC), Cairo, Egypt, 31 August–2 September 2013; pp. 213–220. [Google Scholar]
  52. Kholidy, H.A. Autonomous mitigation of cyber risks in the Cyber–Physical Systems. Future Gener. Comput. Syst. 2020, 115, 171–187. [Google Scholar] [CrossRef]
  53. Kholidy, H.A.; Erradi, A.; Abdelwahed, S.; Baiardi, F. A risk mitigation approach for autonomous cloud intrusion response system. Computing 2016, 98, 1111–1135. [Google Scholar] [CrossRef]
  54. Kholidy, H.A.; Erradi, A. VHDRA: A Vertical and Horizontal Intelligent Dataset Reduction Approach for Cyber-Physical Power Aware Intrusion Detection Systems. Available online: https://www.hindawi.com/journals/scn/2019/6816943/ (accessed on 10 December 2020).
  55. Kholidy, H.A. Towards A Scalable Symmetric Key Cryptographic Scheme: Performance Evaluation and Security Analysis. In Proceedings of the 2019 2nd International Conference on Computer Applications & Information Security (ICCAIS), Riyadh, Saudi Arabia, 1–3 May 2019; IEEE: Piscataway Township, NJ, USA, 2019. [Google Scholar]
  56. Kholidy, H.A. Detecting impersonation attacks in cloud computing environments using a centric user profiling approach. Gener. Comput. Syst. 2021, 117, 299–320. [Google Scholar] [CrossRef]
  57. Kholidy, H.A. Correlation-based sequence alignment models for detecting masquerades in cloud computing. IET Inf. Secur. 2020, 14, 39–50. [Google Scholar] [CrossRef]
  58. Kholidy, H.A.; Baiardi, F.; Hariri, S. DDSGA: A Data-Driven Semi-Global Alignment Approach for Detecting Masquerade Attacks. IEEE Trans. Depend. Sec. Comput. 2015, 12, 164–178. [Google Scholar] [CrossRef]
  59. Kholidy, H.A.; Abdelkarim, E. A Cost-Aware Model for Risk Mitigation in Cloud Computing Systems. In Proceedings of the 2015 IEEE/ACS 12th International Conference of Computer Systems and Applications (AICCSA), Marrakech, Morocco, 17–20 November 2015; IEEE: Piscataway Township, NJ, USA, 2015. [Google Scholar]
  60. Debar, H.; Curry, D. The Intrusion Detection Message Exchange Format (IDMEF). Available online: https://datatracker.ietf.org/doc/html/rfc4765 (accessed on 6 August 2021).
  61. OpenStack. Available online: https://www.openstack.org/ (accessed on 1 July 2021).
  62. Open-Source MANO (OSM). Available online: https://osm.etsi.org/ (accessed on 10 December 2021).
  63. FlexRAN (Mosaic5G). Available online: https://mosaic5g.io/flexran/ (accessed on 13 May 2021).
  64. Open5GS. Available online: https://open5gs.org/ (accessed on 10 June 2021).
  65. Bräuning, F.; Koopman, J.S. The dynamic factor network model with an application to international trade. J. Econom. 2019, 216, 494–515. [Google Scholar] [CrossRef]
  66. Common Vulnerability Scoring System (CVSS) Factors. Available online: https://www.first.org/cvss/specification-document (accessed on 8 November 2021).
  67. The Metasploit Framework. Available online: https://www.metasploit (accessed on 2 October 2021).
Figure 1. The HFN for x ∈ [0, 1].
Figure 1. The HFN for x ∈ [0, 1].
Sensors 22 00009 g001
Figure 2. Attack surfaces of the 5G Network.
Figure 2. Attack surfaces of the 5G Network.
Sensors 22 00009 g002
Figure 3. Attack surfaces enabled by the integration of MEC.
Figure 3. Attack surfaces enabled by the integration of MEC.
Sensors 22 00009 g003
Figure 4. Our 5G Edge security testbed and the ASMF Architecture.
Figure 4. Our 5G Edge security testbed and the ASMF Architecture.
Sensors 22 00009 g004
Figure 5. Part of an example of the generated attack Graph.
Figure 5. Part of an example of the generated attack Graph.
Sensors 22 00009 g005
Figure 6. The Hierarchical GG with corresponding factors’ codes.
Figure 6. The Hierarchical GG with corresponding factors’ codes.
Sensors 22 00009 g006
Figure 7. The M pair-wise Matrix.
Figure 7. The M pair-wise Matrix.
Sensors 22 00009 g007
Figure 8. An example of normalized fuzzy weights.
Figure 8. An example of normalized fuzzy weights.
Sensors 22 00009 g008
Figure 9. The 5G Edge-based 3GPP planes in our testbed.
Figure 9. The 5G Edge-based 3GPP planes in our testbed.
Sensors 22 00009 g009
Figure 10. The attack graph with the corresponding factors’ codes.
Figure 10. The attack graph with the corresponding factors’ codes.
Sensors 22 00009 g010
Figure 11. The I, S, and P attack costs and paths.
Figure 11. The I, S, and P attack costs and paths.
Sensors 22 00009 g011
Figure 12. The VEA-bility metric of the VAA and the Nessus.
Figure 12. The VEA-bility metric of the VAA and the Nessus.
Sensors 22 00009 g012
Figure 13. Execution time of the VAA and Nessus.
Figure 13. Execution time of the VAA and Nessus.
Sensors 22 00009 g013
Figure 14. The scalability of the VAA and Nessus using a variant number of UEs.
Figure 14. The scalability of the VAA and Nessus using a variant number of UEs.
Sensors 22 00009 g014
Table 1. Testbed resource capabilities.
Table 1. Testbed resource capabilities.
ComponentSystem Parameters
OSM, OpenStack, and Open5GSOS: UBUNTU 20.04 LTS
GHz
SSD: 3TB(RAID 5)
OpenStack Version: Wallaby.
OAI-CN Version: 1.0
RAM: 128 GB
OSM Version: 9.1.
Open5GS Version: 2.3.
CPU: 32 Cores 2.10
MicroK8s Version: 1.19
FlexRANOS: UBUNTU 20.04 LTS.
GHz
SSD: 2TB(RAID 5)
RAM: 32 GB.CPU: 4 Cores 2.33
SDR USRP B210Frequency Range: 70 MHz–6 GHz Channels: 2TX*2RX
Table 2. Attacker Decision Matrix.
Table 2. Attacker Decision Matrix.
Attacker GoalExploitation Starting Point
CVE-2004-0417CVE-2004-0415CVE-2002-0392
I: disruption for NFVI ServicesA5A5A5
S: illegitimate access to Shared SDNA12A0–A12, A12A12
P: illegitimate access to the RANA2A0–A2, A2A2
Table 3. Pair-wise evaluation matrix of the criteria layer.
Table 3. Pair-wise evaluation matrix of the criteria layer.
001002003004005006007008009011012
0011321/81/91/71/41/61/721/4
0021/713211/51/31/921/61/5
0031/81/911/31/21/31/731/21/42
0041/81/91/211/81/31/421/51/31/4
00531/31/61/511/51/31/51/61/61/9
0061/21/721/31/211/731/21/91/3
0071/6½1/721/31/511/61/81/71/7
0081/241/221/71/31/6131/54
0091/61/531/61/41/61/31/511/34
011311/61/921/21/71/31/511/3
0121/51/91/61/711/821/71/321
Table 4. Attacker cost in three attacking schemes (I, S, P).
Table 4. Attacker cost in three attacking schemes (I, S, P).
Attacker GoalExploitation Starting Point. Action Paths with the Lowest Costs Are Underlined
CVE-2004-0417CVE-2004-0415CVE-2002-0392CVE-2019-15083CVE-2013-0375CVE-2019-16026
I: Exploit mobile backhaul network.5. AtcCost = 0.635. AtcCost = 0.515. AtcCost = 0.59---
S: Access to Shared resources12, 10-17-20-12, 9-17-20-12, 9-20-12, 15-17-20-12, 15-20-12.
AtcCost = 0.43
0-12, 12.
AtcCost = 0.71
12. AtcCost = 0.673-13-11-12, 3-11-12, 3-4-12, 3-13-4-12, 7-8-4-12, 7-11-12, 7-4-12, 8-4-12, 8-11-12, 14-4-12, 14-11-12. AtcCost =1.068-12, 8-4-12, 8-11-12, 19-11-12,
19-4-12, 6-12, 18-4-12, 18-11-12. AtcCost = 0.97
11-12, 4-12,
1-12, 16-12
AtcCost = 0.82
P: Access to the RAN and MEC.2, 22, 10-17-20-22, 10-17-21-22, 10-17-20-2, 10-17-22, 9-17-20-2, 9-17-20-22, 9-17-21-22, 9-17-22, 9-22, 9-20-2, 9-20-12, 9-20-22, 9-21-22, 15-17-20-2, 15-17-20-22, 15-17-21-22, 15-17-22, 15-22, 15-20-2, 15-20-12, 15-20-22, 15-21-22. AtcCost = 0.310-2, 2, 0-22. AtcCost = 0.392, 22, 0-2, 0-22. AtcCost = 0.57---
Table 5. The combinatorial weights of the CVSS and dynamic 5G network factors.
Table 5. The combinatorial weights of the CVSS and dynamic 5G network factors.
Criteria/Indicators/FactorsWiCriteria/Indicators/FactorsWiCriteria/Indicators/FactorsWi
Access Vector 000W0 = 0.03Report Confidence 006W6 = 0.01Speed 012W12 = 0.08
Access Complexity 001W1 = 0.04Collateral Damage 007W7 = 0.06Bandwidth 013W13 = 0.08
Authentication 002W2 = 0.09Target Distribution 008W8 = 0.01Data Size 014W14 = 0.08
Confidentiality impact 003W3 = 0.09Confidentiality req. 009W9 = 0.09Retainability 015W15 = 0.03
Exploitability 004W4 = 0.11Integrity req. 010W10 = 0.09--
Remediation level 005W5 = 0.02Availability req. 011W11 = 0.09--
Table 6. Linguistic terms and their corresponding HFN.
Table 6. Linguistic terms and their corresponding HFN.
Linguistic VariablesHexagonal Fuzzy NumbersLinguistic VariablesHexagonal Fuzzy Numbers
Very low (VL)(1, 2, 3, 4, 5, 6)Medium high (MH)(3, 4, 5, 6, 7, 8)
Low (L)(1.5, 2.5, 3.5, 4.5, 5.5, 6.5)High (H)(3.5, 4.5, 5.5, 6.5, 7.5, 8.5)
Medium low (ML)(2, 3, 4, 5, 6, 7)Very high (VH)(4, 5, 6, 7, 8, 9)
Neutral (N)(2.5, 3.5, 4.5, 5.5, 6.5, 7.5)
Table 7. Rating the alternative attacker’s actions with respect to the weights of the indicators.
Table 7. Rating the alternative attacker’s actions with respect to the weights of the indicators.
𝑊0𝑊1𝑊2𝑊3𝑊4𝑊5𝑊6𝑊7𝑊8𝑊9𝑊10𝑊11𝑊12𝑊13𝑊14𝑊15
A0VHVLVLVLVLVLVLVLVLVLVLVLVLVLVHVH
A1NVLVHVLVLVHVLVLVLVLVHVLVLHHN
A2VLVLLVLVHVHVLVLVLVLVLVLLMHVHVH
A3NVHVLLMLVHVLVLVLVLVLVHVLMHMHN
A4LNLVLLNVLHVLVLVLNLMLMLL
A5VLVLVLVLVLVLVLVLVLVLVLVLVLVHVHVH
A22LLVLVLLNVLVLMLVHVLVLLMLMLH
Table 8. The decision matrix using the HFN.
Table 8. The decision matrix using the HFN.
W0W1W2W3W4W5
A0(4, 5, 6, 7, 8, 9)(1, 2, 3, 4, 5, 6)(1, 2, 3, 4, 5, 6)(1, 2, 3, 4, 5, 6)(1, 2, 3, 4, 5, 6)(1, 2, 3, 4, 5, 6)
A1(2.5, 3.5, 4.5, 5.5, 6.5, 7.5)(1, 2, 3, 4, 5, 6)(4, 5, 6, 7, 8, 9)(1, 2, 3, 4, 5, 6)(1, 2, 3, 4, 5, 6)(4, 5, 6, 7, 8, 9)
A2(1, 2, 3, 4, 5, 6)(1, 2, 3, 4, 5, 6)(1.5, 2.5, 3.5, 4.5, 5.5, 6.5)(1, 2, 3, 4, 5, 6)(4, 5, 6, 7, 8, 9)(4, 5, 6, 7, 8, 9)
A3(2.5, 3.5, 4.5, 5.5, 6.5, 7.5)(4, 5, 6, 7, 8, 9)(1, 2, 3, 4, 5, 6)(1.5, 2.5, 3.5, 4.5, 5.5, 6.5)(2, 3, 4, 5, 6, 7)(4, 5, 6, 7, 8, 9)
A4(1.5, 2.5, 3.5, 4.5, 5.5, 6.5)(2.5, 3.5, 4.5, 5.5, 6.5, 7.5)(1.5, 2.5, 3.5, 4.5, 5.5, 6.5)(1, 2, 3, 4, 5, 6)(1.5, 2.5, 3.5, 4.5, 5.5, 6.5)(2.5, 3.5, 4.5, 5.5, 6.5, 7.5)
A5(1, 2, 3, 4, 5, 6)(1, 2, 3, 4, 5, 6)(1, 2, 3, 4, 5, 6)(1, 2, 3, 4, 5, 6)(1, 2, 3, 4, 5, 6)(1, 2, 3, 4, 5, 6)
A22(1.5, 2.5, 3.5, 4.5, 5.5, 6.5)(1.5, 2.5, 3.5, 4.5, 5.5, 6.5)(1, 2, 3, 4, 5, 6)(1, 2, 3, 4, 5, 6)(1.5, 2.5, 3.5, 4.5, 5.5, 6.5)(2.5, 3.5, 4.5, 5.5, 6.5, 7.5)
Table 9. The normalized decision matrix.
Table 9. The normalized decision matrix.
W0W1W2W3W4W5
A0(0.24, 0.30, 0.36, 0.42, 0.48, 0.54)(0.10, 0.20, 0.31, 0.41, 0.52, 0.62)(0.10, 0.20, 0.31, 0.41, 0.52, 0.62)(0.10, 0.20, 0.31, 0.41, 0.52, 0.62)(0.10, 0.20, 0.31, 0.41, 0.52, 0.62)(0.10, 0.20, 0.31, 0.41, 0.52, 0.62)
A1(0.19, 0.27, 0.34, 0.42, 0.50, 0.57)(0.10, 0.20, 0.31, 0.41, 0.52, 0.62)(0.24, 0.30, 0.36, 0.42, 0.48, 0.54)(0.10, 0.20, 0.31, 0.41, 0.52, 0.62)(0.10, 0.20, 0.31, 0.41, 0.52, 0.62)(0.24, 0.30, 0.36, 0.42, 0.48, 0.54)
A2(0.10, 0.20, 0.31, 0.41, 0.52, 0.62)(0.10, 0.20, 0.31, 0.41, 0.52, 0.62)(0.14, 0.23, 0.32, 0.42, 0.51, 0.61)(0.10, 0.20, 0.31, 0.41, 0.52, 0.62)(0.24, 0.30, 0.36, 0.42, 0.48, 0.54)(0.24, 0.30, 0.36, 0.42, 0.48, 0.54)
A3(0.19, 0.27, 0.34, 0.42, 0.50, 0.57)(0.24, 0.30, 0.36, 0.42, 0.48, 0.54)(0.10, 0.20, 0.31, 0.41, 0.52, 0.62)(0.14, 0.23, 0.32, 0.42, 0.51, 0.61)(0.16, 0.25, 0.33, 0.42, 0.50, 0.59)(0.24, 0.30, 0.36, 0.42, 0.48, 0.54)
A4(0.14, 0.23, 0.32, 0.42, 0.51, 0.61)(0.19, 0.27, 0.34, 0.42, 0.50, 0.57)(0.14, 0.23, 0.32, 0.42, 0.51, 0.61)(0.10, 0.20, 0.31, 0.41, 0.52, 0.62)(0.14, 0.23, 0.32, 0.42, 0.51, 0.61)(0.19, 0.27, 0.34, 0.42, 0.50, 0.57)
A5(0.10, 0.20, 0.31, 0.41, 0.52, 0.62)(0.10, 0.20, 0.31, 0.41, 0.52, 0.62)(0.10, 0.20, 0.31, 0.41, 0.52, 0.62)(0.10, 0.20, 0.31, 0.41, 0.52, 0.62)(0.10, 0.20, 0.31, 0.41, 0.52, 0.62)(0.10, 0.20, 0.31, 0.41, 0.52, 0.62)
A22(0.14, 0.23, 0.32, 0.42, 0.51, 0.61)(0.14, 0.23, 0.32, 0.42, 0.51, 0.61)(0.10, 0.20, 0.31, 0.41, 0.52, 0.62)(0.10, 0.20, 0.31, 0.41, 0.52, 0.62)(0.14, 0.23, 0.32, 0.42, 0.51, 0.61)(0.19, 0.27, 0.34, 0.42, 0.50, 0.57)
Table 10. The weighted normalized decision matrix.
Table 10. The weighted normalized decision matrix.
W0W1W2W3W4W5
A0(0.0072, 0.009, 0.0108, 0.0126, 0.0144, 0.0162)(0.004, 0.008, 0.0124, 0.0164, 0.0208, 0.0248)(0.009, 0.018, 0.0279, 0.0369, 0.0468, 0.0558)(0.009, 0.018, 0.0279, 0.0369, 0.0468, 0.0558)(0.011, 0.022, 0.0341, 0.0451, 0.0572, 0.0682)(0.002, 0.004, 0.0062, 0.0082, 0.0104, 0.0124)
A1(0.0057, 0.0081, 0.0102, 0.0126, 0.015, 0.0171)(0.004, 0.008, 0.0124, 0.0164, 0.0208, 0.0248)(0.0216, 0.027, 0.0324, 0.0378, 0.0432, 0.0486)(0.009, 0.018, 0.0279, 0.0369, 0.0468, 0.0558)(0.011, 0.022, 0.0341, 0.0451, 0.0572, 0.0682)(0.0048, 0.006, 0.0072, 0.0084, 0.0096, 0.0108)
A2(0.003, 0.006, 0.0093, 0.0123, 0.0156, 0.0186)(0.004, 0.008, 0.0124, 0.0164, 0.0208, 0.0248)(0.0126, 0.0207, 0.0288, 0.0378, 0.0459, 0.0549)(0.009, 0.018, 0.0279, 0.0369, 0.0468, 0.0558)(0.0264, 0.033, 0.0396, 0.0462, 0.0528, 0.0594)(0.0048, 0.006, 0.0072, 0.0084, 0.0096, 0.0108)
A3(0.0057, 0.0081, 0.0102, 0.0126, 0.015, 0.0171)(0.0096, 0.012, 0.0144, 0.0168, 0.0192, 0.0216)(0.009, 0.018, 0.0279, 0.0369, 0.0468, 0.0558)(0.0126, 0.0207, 0.0288, 0.0378, 0.0459, 0.0549)(0.0176, 0.0275, 0.0363, 0.0462, 0.055, 0.0649)(0.0048, 0.006, 0.0072, 0.0084, 0.0096, 0.0108)
A4(0.0042, 0.0069, 0.0096, 0.0126, 0.0153, 0.0183)(0.0076, 0.0108, 0.0136, 0.0168, 0.02, 0.0228)(0.0126, 0.0207, 0.0288, 0.0378, 0.0459, 0.0549)(0.009, 0.018, 0.0279, 0.0369, 0.0468, 0.0558)(0.0154, 0.0253, 0.0352, 0.0462, 0.0561, 0.0671)(0.0038, 0.0054, 0.0068, 0.0084, 0.01, 0.0114)
A5(0.003, 0.006, 0.0093, 0.0123, 0.0156, 0.0186)(0.004, 0.008, 0.0124, 0.0164, 0.0208, 0.0248)(0.009, 0.018, 0.0279, 0.0369, 0.0468, 0.0558)(0.009, 0.018, 0.0279, 0.0369, 0.0468, 0.0558)(0.011, 0.022, 0.0341, 0.0451, 0.0572, 0.0682)(0.002, 0.004, 0.0062, 0.0082, 0.0104, 0.0124)
A22(0.0042, 0.0069, 0.0096, 0.0126, 0.0153, 0.0183)(0.0056, 0.0092, 0.0128, 0.0168, 0.0204, 0.0244)(0.009, 0.018, 0.0279, 0.0369, 0.0468, 0.0558)(0.009, 0.018, 0.0279, 0.0369, 0.0468, 0.0558)(0.0154, 0.0253, 0.0352, 0.0462, 0.0561, 0.0671)(0.0038, 0.0054, 0.0068, 0.0084, 0.01, 0.0114)
Table 11. The positive and negative ideal solution.
Table 11. The positive and negative ideal solution.
Positive Ideal SolutionsNegative Ideal Solutions
+0 = (0.0072, 0.009, 0.0108, 0.0126, 0.0144, 0.0162)E˜0 = (0.003, 0.006, 0.0093, 0.0123, 0.0156, 0.0186)
E˜+1 = (0.0096, 0.012, 0.0144, 0.0168, 0.0192, 0.0216)E˜1 = (0.004, 0.008, 0.0124, 0.0164, 0.0208, 0.0248)
E˜+2 = (0.0216, 0.027, 0.0324, 0.0378, 0.0432, 0.0486)E˜2 = (0.009, 0.018, 0.0279, 0.0369, 0.0468, 0.0558)
E˜+3 = (0.0171, 0.0243, 0.0306, 0.0378, 0.04, 0.0513)E˜3 = (0.009, 0.018, 0.0279, 0.0369, 0.0468, 0.0558)
E˜+4 = (0.0264, 0.033, 0.0396, 0.0462, 0.0528, 0.0594)E˜4 = (0.011, 0.022, 0.0341, 0.0451, 0.0572, 0.0682)
E˜+5 = (0.0048, 0.006, 0.0072, 0.0084, 0.0096, 0.0108)E˜5 = (0.002, 0.004, 0.0062, 0.0082, 0.0104, 0.0124)
Table 12. The cost and benefits of the attacker’s actions.
Table 12. The cost and benefits of the attacker’s actions.
ActionDi+DiAtcCost(i)AtcBenefit(i)
A00.01110.00210.15910.8409
A10.00920.00660.41770.5823
A20.00710.00800.52980.4702
A30.00800.00510.38930.6107
A40.00860.00330.27730.7227
A50.011400.00001.0000
A220.00980.00240.19670.8033
Table 13. The cost and benefits of the attack paths for two exploitation starting points.
Table 13. The cost and benefits of the attack paths for two exploitation starting points.
Attacker GoalExploitation Starting Point. Action Paths with the Lowest Costs Are Underlined.
CVE-2004-0415CVE-2002-0392
I: Exploit mobile backhaul network.
I14-A5. AtcCost = 0.025 + 0 = 0.025
I15-A5. AtcCost = 0.031 + 0 = 0.031
S: Access to Shared resources
I14-A0-I5-A12. AtcCost = 0.025 + 0.1591 + 0.1 + 0.6515 = 0.9356
I14-A0-I5-A3-I7-A4-I6-A12, AtcCost = 0.025 + 0.1591 + 0.1 + 0.3893 + 0.175 + 0.2773 + 0.6515 = 1.7772.
I14-A0-I5-A1-I6-A12, AtcCost = 0.025 + 0.1591 + 0.1 + 0.4177 + 0.125 + 0.6515 = 1.4783.
I14-A0-I5-A3-I7-A4-I6-A12, AtcCost = 0.025 + 0.1591 + 0.1 + 0.3893 + 0.175 + 0.2773 + 0.125 + 0.6515 = 1.9022
I14-A0-I5-A6-I6-A12, AtcCost = 0.025 + 0.1591 + 0.1 + 0.2593 + 0.125 + 0.6515 = 1.3199.
I14-I5-A1-I6-A12, AtcCost = 0.025 + 0.1 + 0.4177 + 0.125 + 0.6515 = 1.3192.
I14-I5-A3-I7-A4-I6-A12, AtcCost = 0.025 + 0.1 + 0.3893 + 0.175 + 0.0.2773 + 0.125 + 0.6515 = 1.49353.
I14-I5-A6-I6-A12, AtcCost = 0.025 + 0.1 + 0.2593 + 0.125 + 0.6515 = 1.1608
I15-A12. AtcCost = 0.031 + 0.6515 = 0.6825
I15-A0-I5-A12. AtcCost = 0.031 + 0.1591 + 0.1 + 0.6515 = 0.9416.
I15-A0-I5-A3-I7-A4-I6-A12, AtcCost = 0.031 + 0.1591 + 0.1 + 0.6107 + 0.175 + 0.7227 + 0.125 + 0.6515 = 2.02537
I15-A0-I5-A1-I6-A12, AtcCost = 0.031 + 0.1591 + 0.1 + 0.4177 + 0.125 + 0.6515 = 1.4843.
I15-A0-I5-A3-I7-A4-I6-A12, AtcCost = 0.031 + 0.1591 + 0.1 + 0.3893 + 0.175 + 0.2773 + 0.6515 = 1.7832
I15-A0-I5-A6-I6-A12, AtcCost = 0.031 + 0.1591 + 0.1 + 0.2593 + 0.125 + 0.6515 = 1.3259.
P: Access to the RAN and MEC.
I14-A0-I5-A2, AtcCost = 0.025 + 0.1591 + 0.1 + 0.5298 = 0.8139
I14-A2, AtcCost = 0.025 + 0.5298 = 0.5548
I14-I5-A2, AtcCost = 0.025 + 0.1 + 0.5298 = 0.6548
I14-A0-I5-I9-A22, AtcCost = 0.025 + 0.1591 + 0.1 + 0.11 + 0.1967 = 0.5908
I14-I5-I9-A22. AtcCost = 0.025 + 0.1 + 0.11 + 0.1967 = 0.4317
I15-A2, AtcCost = 0.031 + 0.5298 = 0.5608
I15-A0-I5-A2. AtcCost = 0.031 + 0.1591 + 0.1 + 0.5298 = 0.8199.
I15-I9-A22. AtcCost = 0.031 + 0.11 + 0.1967 = 0.3377
I15-A0-I5-I9-A22. AtcCost = 0.031 + 0.1591 + 0.1 + 0.11 + 0.1967 = 0.5968
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Kholidy, H.A. Multi-Layer Attack Graph Analysis in the 5G Edge Network Using a Dynamic Hexagonal Fuzzy Method. Sensors 2022, 22, 9. https://doi.org/10.3390/s22010009

AMA Style

Kholidy HA. Multi-Layer Attack Graph Analysis in the 5G Edge Network Using a Dynamic Hexagonal Fuzzy Method. Sensors. 2022; 22(1):9. https://doi.org/10.3390/s22010009

Chicago/Turabian Style

Kholidy, Hisham A. 2022. "Multi-Layer Attack Graph Analysis in the 5G Edge Network Using a Dynamic Hexagonal Fuzzy Method" Sensors 22, no. 1: 9. https://doi.org/10.3390/s22010009

APA Style

Kholidy, H. A. (2022). Multi-Layer Attack Graph Analysis in the 5G Edge Network Using a Dynamic Hexagonal Fuzzy Method. Sensors, 22(1), 9. https://doi.org/10.3390/s22010009

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop