Authors:Zujany Salazar1;Fatiha Zaidi2;Wissam Mallouli1;Ana Rosa Cavalli1;Huu Nghia Nguyen1 andEdgardo Montes De Oca1
Affiliations:1Montimage EURL, Paris, France;2Université Paris-Saclay, CNRS, ENS Paris-Saclay, Laboratoire Méthodes Formelles, 91190, Gif-sur-Yvette, France
Keyword(s):Formal Approach, Mutation Technique, Network Traffic, 5G Networks, Fuzzing Techniques.
Abstract:We present a formal approach based on mutation techniques for the modelling of cybersecurity attacks and its application to 5G networks. We introduce formal definitions of the main concepts of network protocols, mutation operators, flow of network packets and network traffic. We design a formal approach based on different mutation operators that allows to design models that can be assimilated with known and unknown attacks. This approach has been implemented in our open source 5G network traffic fuzzer, 5Greplay, and has been applied to two use cases that are representative of attacks against 5G networks.