| 5G network provides very fast access with very low delay,which has penetrated into many vertical industries,including medical,industrial,military and so on.At the same time,it is also widely used in people’s daily life,so its security is also of great significance.As the control center of 5Gnetwork,the core network may bring new security challenges due to the introduction of new technologies including NFV,SDN and network slicing.First of all,5G vulnerability analysis has many attack schemes and few comprehensive attack schemes,and the attack prediction based on this is not perfect;Secondly,5G lacks customized testing methods for specific protocols.This paper analyzes the vulnerability of 5G core network from two aspects:attack prediction and vulnerability testing methods.The main work is as follows:1.Proposed a 5G core network attack prediction method based on attack graph and machine learning is proposed.First,this paper constructs an attack graph by collecting the 5G core network attacks proposed in recent years and the continuation of 4G LTE attacks,briefly representing 112 exploitable attack paths in the deployment phase and application phase,connecting the existing attack graphs.node to obtain new potential attack paths.Secondly,the machine learning model is applied to the attack graph for classification prediction,which verifies that the machine learning framework can be used to predict new attacks when the nodes in the attack graph increase.Experiments show that the efficiency is much h igher than that of manual analysis.2.Proposed a fuzzing algorithm for PFCP protocol.This paper takes the PFCP protocol that plays an important role in the N4 port in the 5G core network as an example to focus on the analysis.According to the characteristics of the fuzzing method,the characteristics of the PFCP protocol in the 5G core network are studied and summarized,and relatedFinally,a fuzzing test packet generation algorithm for the PFCP protocol in the 5G core network is proposed,and the algorithm is more efficient than the fully random method.3.Design and implement a fuzzing framework for PFCP protocol.For the designed fuzzing algorithm,this paper chooses to build an open source 5G system free5GC,in which the effect of the algorithm is verified,and a fuzzing framework for the core network PFCP protocol is designed and completed.The network element was fuzzed and multiple vulnerabilities were discovered.The effectiveness of the fuzzing test method for vulnerability analysis of 5G core network is verified.And based on this platform,the test method in this paper is compared with the traditional fuzzing test method,which proves that the proposed test method improves the efficiency of fuzzing test. |