One-Class Classification as GLRT for Jamming Detection in Private 5G Networks

Read original: arXiv:2405.09565 - Published 5/17/2024 by Matteo Varotto, Stefan Valentin, Francesco Ardizzon, Samuele Marzotto, Stefano Tomasin
Total Score

0

One-Class Classification as GLRT for Jamming Detection in Private 5G Networks

Sign in to get full access

or

If you already have an account, we'll log you in

Overview

  • This paper proposes using one-class classification as a generalized likelihood ratio test (GLRT) for detecting jamming attacks in private 5G networks.
  • The research was partially funded by the German Federal Office for Information Security and the European Commission's Horizon Europe/JU SNS project ROBUST-6G.
  • The corresponding author is Matteo Varotto from the University of Applied Sciences Darmstadt.

Plain English Explanation

In this paper, the researchers explore a method for detecting when a 5G network is under attack from jamming. Jamming is a type of cyber attack where an attacker tries to disrupt or interfere with the network's communication signals.

The researchers propose using a one-class classification approach as a generalized likelihood ratio test (GLRT) to identify when the 5G network is experiencing a jamming attack. One-class classification is a machine learning technique that can identify anomalies or outliers in data, which in this case would be the presence of a jamming attack.

The GLRT is a statistical tool that can be used to decide whether the observed data is consistent with a particular hypothesis (in this case, the hypothesis that the network is under a jamming attack). By combining one-class classification with the GLRT, the researchers aim to develop an effective way to detect and mitigate jamming attacks in private 5G networks.

Technical Explanation

The paper presents a one-class classification approach as a generalized likelihood ratio test (GLRT) for jamming detection in private 5G networks. The researchers first collect data on normal network operation, which serves as the "positive" class for the one-class classifier. They then use this data to train a support vector data description (SVDD) model, a type of one-class classifier.

During operation, the SVDD model is used as a GLRT to determine whether the current network observations are consistent with the normal operation data (the "null hypothesis") or indicate a jamming attack (the "alternative hypothesis"). If the GLRT statistic exceeds a certain threshold, the system raises an alarm, indicating a potential jamming attack.

The researchers evaluate their approach using both simulation and real-world experiments. In the simulation, they model various jamming attack scenarios and demonstrate the effectiveness of the one-class GLRT approach in detecting the attacks. In the real-world experiments, they implement the system on Software-Defined Radio (SDR) platforms and validate its performance in a private 5G network testbed.

Critical Analysis

The paper presents a promising approach for detecting jamming attacks in private 5G networks. The use of one-class classification and the GLRT provides a robust and flexible framework for identifying anomalies in the network data that may indicate the presence of a jamming attack.

However, the paper does not address some potential limitations of the approach. For example, the researchers do not discuss how the system might perform under more sophisticated or adaptive jamming attacks, where the attacker tries to mimic the normal network traffic patterns. Additionally, the real-world experiments are conducted in a controlled testbed environment, and the performance of the system in a large-scale, real-world deployment is not evaluated.

Further research could explore the robustness of the one-class GLRT approach to more advanced jamming techniques, as well as its scalability and performance in realistic 5G network deployments. Additionally, the integration of the jamming detection system with other security and network management mechanisms could be an area for future work.

Conclusion

This paper presents a novel approach for detecting jamming attacks in private 5G networks using one-class classification as a GLRT. The researchers demonstrate the effectiveness of their method through simulation and real-world experiments, showing the potential of this technique to enhance the security and resilience of 5G networks.

The proposed solution could be a valuable tool for network operators and security professionals looking to protect their private 5G networks from jamming attacks, which can disrupt critical communications and services. Further development and real-world testing could lead to the widespread adoption of this approach, contributing to the overall security and reliability of 5G technology.



This summary was produced with help from an AI and may contain inaccuracies - check out the links to read the original source documents!

Follow @aimodelsfyi on 𝕏 →

Related Papers

One-Class Classification as GLRT for Jamming Detection in Private 5G Networks
Total Score

0

One-Class Classification as GLRT for Jamming Detection in Private 5G Networks

Matteo Varotto, Stefan Valentin, Francesco Ardizzon, Samuele Marzotto, Stefano Tomasin

5G mobile networks are vulnerable to jamming attacks that may jeopardize valuable applications such as industry automation. In this paper, we propose to analyze radio signals with a dedicated device to detect jamming attacks. We pursue a learning approach, with the detector being a CNN implementing a GLRT. To this end, the CNN is trained as a two-class classifier using two datasets: one of real legitimate signals and another generated artificially so that the resulting classifier implements the GLRT. The artificial dataset is generated mimicking different types of jamming signals. We evaluate the performance of this detector using experimental data obtained from a private 5G network and several jamming signals, showing the technique's effectiveness in detecting the attacks.

Read more

5/17/2024

Detecting 5G Narrowband Jammers with CNN, k-nearest Neighbors, and Support Vector Machines
Total Score

0

Detecting 5G Narrowband Jammers with CNN, k-nearest Neighbors, and Support Vector Machines

Matteo Varotto, Florian Heinrichs, Timo Schuerg, Stefano Tomasin, Stefan Valentin

5G cellular networks are particularly vulnerable against narrowband jammers that target specific control sub-channels in the radio signal. One mitigation approach is to detect such jamming attacks with an online observation system, based on machine learning. We propose to detect jamming at the physical layer with a pre-trained machine learning model that performs binary classification. Based on data from an experimental 5G network, we study the performance of different classification models. A convolutional neural network will be compared to support vector machines and k-nearest neighbors, where the last two methods are combined with principal component analysis. The obtained results show substantial differences in terms of classification accuracy and computation time.

Read more

9/12/2024

Evaluating ML Robustness in GNSS Interference Classification, Characterization & Localization
Total Score

0

Evaluating ML Robustness in GNSS Interference Classification, Characterization & Localization

Lucas Heublein, Tobias Feigl, Thorsten Nowak, Alexander Rugamer, Christopher Mutschler, Felix Ott

Jamming devices present a significant threat by disrupting signals from the global navigation satellite system (GNSS), compromising the robustness of accurate positioning. The detection of anomalies within frequency snapshots is crucial to counteract these interferences effectively. A critical preliminary measure involves the reliable classification of interferences and characterization and localization of jamming devices. This paper introduces an extensive dataset compromising snapshots obtained from a low-frequency antenna, capturing diverse generated interferences within a large-scale environment including controlled multipath effects. Our objective is to assess the resilience of ML models against environmental changes, such as multipath effects, variations in interference attributes, such as the interference class, bandwidth, and signal-to-noise ratio, the accuracy jamming device localization, and the constraints imposed by snapshot input lengths. By analyzing the aleatoric and epistemic uncertainties, we demonstrate the adaptness of our model in generalizing across diverse facets, thus establishing its suitability for real-world applications. https://gitlab.cc-asp.fraunhofer.de/darcy_gnss/controlled_low_frequency

Read more

9/24/2024

Few-Shot Learning with Uncertainty-based Quadruplet Selection for Interference Classification in GNSS Data
Total Score

0

Few-Shot Learning with Uncertainty-based Quadruplet Selection for Interference Classification in GNSS Data

Felix Ott, Lucas Heublein, Nisha Lakshmana Raichur, Tobias Feigl, Jonathan Hansen, Alexander Rugamer, Christopher Mutschler

Jamming devices pose a significant threat by disrupting signals from the global navigation satellite system (GNSS), compromising the robustness of accurate positioning. Detecting anomalies in frequency snapshots is crucial to counteract these interferences effectively. The ability to adapt to diverse, unseen interference characteristics is essential for ensuring the reliability of GNSS in real-world applications. In this paper, we propose a few-shot learning (FSL) approach to adapt to new interference classes. Our method employs quadruplet selection for the model to learn representations using various positive and negative interference classes. Furthermore, our quadruplet variant selects pairs based on the aleatoric and epistemic uncertainty to differentiate between similar classes. We recorded a dataset at a motorway with eight interference classes on which our FSL method with quadruplet loss outperforms other FSL techniques in jammer classification accuracy with 97.66%. Dataset available at: https://gitlab.cc-asp.fraunhofer.de/darcy_gnss/FIOT_highway

Read more

5/3/2024