5G Network Security Threat: Performing a DDOS Attack with UERANSIM

Tech with Mohit
7 Apr 202310:51

Summary

TLDRThis video tutorial demonstrates how to use UV9 sim to simulate a DDoS attack on an open 5G core network. It explains two potential attack vectors: disrupting the control plane with a signaling storm or choking the user plane after authentication. The presenter uses a single VM setup to illustrate the attack on the control plane, showing how to generate traffic to overwhelm the system, resulting in service disruption. The video concludes with a reminder of the importance of DDoS mitigation strategies in network development.

Takeaways

  • 🚩 The video discusses using UV9 SIM to create a DDoS attack on a 5G core network.
  • 📚 It explains two main ways to disrupt a 5G core network: attacking the control plane or choking the user plane.
  • 🔐 To attack the user plane, an attacker must first be authenticated with the network.
  • 📊 The video uses a diagram to illustrate how a DDoS attack can be implemented.
  • 💻 Due to time constraints, a single VM setup is used, which limits the ability to use ping for data traffic.
  • 📈 The presenter shows how to create a signaling storm by sending a large number of signaling messages.
  • 🔄 The script demonstrates spinning up multiple instances of UEs to simulate a DDoS attack.
  • 📉 The video highlights the impact of the attack on system resources, such as memory and CPU usage.
  • 🚨 It warns that such attacks can cause network components like eNodeB to fail.
  • 🛡️ The presenter emphasizes the importance of having DDoS mitigation capabilities for networks exposed to such attacks.

Q & A

  • What is the main topic of the video?

    -The video discusses how to use UV9 Sim to create a DDoS attack, focusing on the technical aspects and potential scenarios.

  • What is UV9 Sim?

    -UV9 Sim is a tool that can be used to simulate user equipment (UE) in a 5G network, which the video uses to demonstrate how DDoS attacks can be conducted.

  • Why does the presenter use a single VM setup for the demonstration?

    -The presenter uses a single VM setup due to time constraints, but notes that it limits the ability to use ping for data traffic.

  • What are the two components of an open 5G core network mentioned in the video?

    -The two components are the control plane, which handles signaling, and the user plane, which handles user data or UE traffic.

  • How can an attacker disrupt a 5G core network?

    -An attacker can disrupt a 5G core network by either creating a packet storm to overwhelm the control plane or by choking the user plane after authenticating with the network.

  • What is a signaling storm in the context of the video?

    -A signaling storm is a type of DDoS attack where a large number of signaling messages are sent to the network, overwhelming its ability to process signals.

  • What does the presenter mean by 'disruption of the user plane'?

    -Disruption of the user plane refers to flooding the network with data traffic after authentication, which can overwhelm the network's capacity to handle user data.

  • How does the presenter demonstrate the creation of a signaling storm?

    -The presenter demonstrates creating a signaling storm by using UV9 Sim to connect multiple UE instances to the network, causing a high volume of signaling traffic.

  • What is the impact of reducing the VM's memory and CPU on the demonstration?

    -Reducing the VM's memory and CPU shows the limitations of the system when it has reduced capabilities, making it easier to demonstrate the effects of a DDoS attack on the network.

  • What is the presenter's advice for developers regarding network security?

    -The presenter advises developers to implement DDoS mitigation capabilities when creating networks that could be exposed to such attacks.

  • How does the presenter show the effects of a DDoS attack on the eNodeB?

    -The presenter shows the effects by simulating a large number of UE connections, causing the eNodeB to fail due to high CPU usage and memory consumption.

Outlines

00:00

📡 Introduction to DDoS Attacks Using UV9 Sim

The speaker begins by welcoming viewers to the video and introduces the topic of using UV9 Sim to create a Distributed Denial of Service (DDoS) attack. The video aims to explain the concept based on a comment received, focusing on how such an attack can be executed. A diagram is mentioned as a tool to illustrate the process. The speaker clarifies that due to time constraints, they are using a single Virtual Machine (VM) setup, which limits the use of ping for data traffic. The video will demonstrate how to implement a scenario for a DDoS attack on an open 5G core network, explaining the components of the network and the two potential targets for disruption: the control plane and the user plane. The speaker outlines two methods of attack: disrupting the control plane with a packet storm or choking the user plane after authentication. The video will show how to create a signaling storm, which is a type of DDoS attack, and how to use the same UE (User Equipment) for multiple connections after authentication to disrupt the network.

05:01

🔁 Demonstrating DDoS Attack Simulation

In this segment, the speaker demonstrates how to use the UE and Sim tool to spin up multiple instances of eNBs (Evolved Node Bs) to simulate a DDoS attack. The speaker shows the configuration of MC1 through MC10 and how using the '-n' parameter can start multiple instances. The memory usage is monitored, and the speaker then reduces the VM's memory to 1GB and CPU to 1 to illustrate system limitations under stress. The speaker initiates a loop in a shell script to repeatedly attempt connections, which increases memory and CPU usage dramatically, eventually causing the eNodeB to fail. The speaker emphasizes the importance of having DDoS mitigation capabilities when developing networks that could be exposed to such attacks. The demonstration shows how resource constraints can lead to system failure under a simulated DDoS attack.

10:02

🛡️ Importance of DDoS Mitigation in Network Development

The final paragraph summarizes the demonstration and its implications. The speaker notes that instead of taking down the AMF (Access and Mobility Management Function), the attack focused on disrupting the eNodeB. They highlight that similar techniques could be used to disrupt other network components like AMF or UPF (User Plane Function). The speaker advises that when developing networks, especially those exposed to potential DDoS attacks, it's crucial to have mitigation strategies in place. The video concludes with a call to action for viewers to like the video if they found it helpful and signals the end of the presentation.

Mindmap

Keywords

💡DDoS attack

A DDoS attack, or Distributed Denial of Service attack, is a malicious attempt to disrupt the normal traffic of a targeted server, service, or network by overwhelming it with a flood of internet traffic. In the context of the video, the presenter discusses how to use UV9 Sim to create a DDoS attack on a 5G core network by simulating a large number of connections, which can lead to the network being overwhelmed and unable to handle legitimate traffic. The script describes a scenario where the presenter demonstrates creating a signaling storm by spinning up multiple instances of UE (User Equipment) to flood the network with traffic.

💡UV9 Sim

UV9 Sim is a simulation tool used to test and analyze the performance of networks, particularly in the context of 5G and LTE. In the video, the presenter uses UV9 Sim to simulate a DDoS attack by creating multiple UE instances. This tool is crucial to the demonstration as it allows the presenter to generate a high volume of traffic that mimics a real-world DDoS attack, illustrating the potential vulnerabilities of the network under test.

💡5G core network

A 5G core network refers to the central infrastructure of a 5G cellular network, which is responsible for managing data and control traffic. The video's theme revolves around the potential vulnerabilities of such networks to DDoS attacks. The script explains that an attacker can disrupt either the control plane or the user plane of the 5G core network, which are integral to its operation.

💡Control plane

The control plane in a network is responsible for managing and controlling the network's operations. It includes functions like signal processing and routing. In the video, the presenter explains that an attacker can disrupt the control plane by creating a 'packet storm', which is a flood of packets sent to the network, overwhelming its ability to process signals. This is demonstrated in the script by showing how UV9 Sim can be used to simulate this kind of attack.

💡User plane

The user plane in a network is responsible for carrying user data traffic. In the context of the video, the presenter discusses how an attacker, after authenticating with the network, can disrupt the user plane by sending large streams of data. This is shown in the script where the presenter configures multiple instances of UE to send data, simulating a DDoS attack on the user plane.

💡Signaling storm

A signaling storm refers to an excessive amount of signaling traffic that can overwhelm a network, causing it to slow down or become unresponsive. The video script describes how the presenter can create a signaling storm by using UV9 Sim to simulate a large number of connections, which generates a high volume of signaling messages that the network must process.

💡UE (User Equipment)

User Equipment (UE) in a mobile network refers to the devices used by end-users, such as smartphones or tablets, to access the network. In the video, the presenter uses UV9 Sim to simulate multiple UEs to demonstrate how a DDoS attack can be carried out. The script shows how the presenter configures and spins up multiple instances of UE to flood the network with traffic.

💡AMF (Access and Mobility Management Function)

The Access and Mobility Management Function (AMF) is a key component of the 5G core network responsible for managing access and mobility of user devices. The video script mentions that the presenter's demonstration of a DDoS attack can potentially disrupt the AMF, illustrating the impact such an attack can have on network functionality.

💡Multi-VM setup

A multi-VM setup refers to a configuration where multiple virtual machines are used to simulate different parts of a network. The script mentions that for certain operations, such as using Open5GS and UV9 Sim to communicate with the internet, a multi-VM setup is necessary. This setup allows for a more complex and realistic simulation of network behavior.

💡MC (Mobility Management Context)

Mobility Management Context (MC) is a set of parameters that define the state of a user's connection to a mobile network. In the video, the presenter configures MC instances with specific values to simulate UE connections. The script shows how the presenter uses the '-n' parameter in UV9 Sim to spin up multiple MCs, which is part of the demonstration of a DDoS attack.

💡CPU usage

CPU usage refers to the amount of processing power being utilized by a system. In the video script, the presenter monitors CPU usage to demonstrate the impact of the simulated DDoS attack on system resources. The script shows how CPU usage increases dramatically as more UE instances are spun up, indicating the strain on the system's processing capabilities.

Highlights

Introduction to using UV9 sim to create a DDOS attack

Explanation of the scenario for performing a DDOS attack

Limitation of using a single VM setup for DDOS attack simulation

Components of an open 5G core Network and their functions

Two ways to disrupt a 5G core Network: control plane and user plane

Creating a signaling storm to disrupt the control plane

Authentication required to disrupt the user plane

Using UE to create multiple connections to disrupt the user plane

Single VM setup limitations for internet communication

Demonstration of connecting multiple UEs to the network

Impact of memory and CPU usage on the system's capability

Creating a loop to continuously connect UEs

Simulation of a DDOS attack causing the eNodeB to fail

Potential to disrupt AMF, UPF, or PFCP with similar methods

Importance of having DDOS mitigation capabilities in networks

Conclusion and call to action for viewer engagement

Transcripts

play00:00

hey everyone welcome to this video

play00:02

so in this video I am going to talk

play00:04

about how you can use uv9 sim to create

play00:07

a DDOS attack

play00:09

and this is just a kind of a reference

play00:12

that I got one of the comment to explain

play00:15

how it is possible and how we can do so

play00:18

so first let me explain you with help of

play00:20

a diagram how it is possible and what is

play00:24

the scenario that we can Implement to

play00:27

perform this DDOS attack

play00:29

so suppose in case of our installation

play00:31

we have

play00:33

I'm using because I didn't have much of

play00:36

time to set up the 2vm setup so in this

play00:39

case I'm using only single VM and the

play00:42

limitation with single VM is that we

play00:44

will not be able to use ping for the

play00:46

data traffic but I am going to explain

play00:48

how

play00:49

we can implement this

play00:52

scenario

play00:53

now this is just a open 5gs core Network

play00:56

right

play00:57

in the core Network we have two

play00:59

components basically if we think of the

play01:02

related functionality one is the control

play01:04

Pane and the second one is

play01:07

the user type right so the user plane is

play01:10

the part which handles the

play01:13

user data or the UE traffic

play01:17

in case of any core Network

play01:19

if any attacker wants to disrupt it

play01:24

to disrupt this

play01:26

core Network

play01:28

there are two ways to do so first is

play01:31

he can disrupt the control plane

play01:35

by kind of a packet storm so that the

play01:38

signal processing taken care by the

play01:41

network is choked and it's not able to

play01:45

carry out any more signal processing

play01:48

the second one is choking the user pane

play01:52

but for this it needs to be first

play01:54

authenticated with the network

play01:56

this is the description of

play01:59

control pin

play02:01

and the second one is disruption of the

play02:03

user blade

play02:05

now keep in mind with disruption of the

play02:07

control plane there are multiple

play02:09

functions in 5G Network at an attacker

play02:12

you can try to take out any one of it

play02:14

but in this

play02:16

example I will show you how we can

play02:19

create a signal strum we call it a

play02:23

signaling

play02:25

Tom

play02:26

so the second part would be if you are

play02:29

authenticated then you can use the same

play02:33

UE to have multiple connection using UE

play02:35

Lan Sim

play02:37

if you know all the details of that UE

play02:40

and

play02:41

try out

play02:42

multiple streams of data for example

play02:45

you have this MC and you know all these

play02:50

values you can

play02:54

configure it with all these values and

play02:57

then what you can do

play02:58

you have the same you are authenticated

play03:00

with the code Network all right that's

play03:03

good the second part would be what you

play03:05

would do

play03:06

you will just

play03:09

send large streams of data here

play03:13

on the user plane

play03:14

to disrupt it with the same zip

play03:17

and

play03:19

once you are authenticated your

play03:21

signaling is very less

play03:23

you are allowed to do anything in the

play03:25

network and with this this Sim you would

play03:28

be able to have n number of

play03:31

you can say instances running with you

play03:33

and Sim which can disrupt the user plane

play03:37

so in this example I'm going to show you

play03:39

this disruption of the control plane and

play03:42

how it is easily possible

play03:44

just to find 10 Sims here

play03:47

if you want you can Define more all

play03:49

right so um so I'm in my installation

play03:51

and I have a single VM setup so I will

play03:54

just start my G note B so I have only

play03:56

one G note B here defined and as soon as

play03:59

I started you can see it is trying to

play04:01

establish a certification satv is a it's

play04:04

able to contact the AMF so NG setup is

play04:07

okay

play04:09

in the second session I will try to

play04:11

connect one UE

play04:14

and you can see everything is going good

play04:16

or UV signaling is up I will not be able

play04:19

to Ping any IP through this interface

play04:21

because I'm using a single VM setup in

play04:23

case you want to use open 5js and UI and

play04:25

Sim to communicate with the internet you

play04:28

need to use a multi-vm setup now

play04:30

so far so good

play04:32

in here what I can do is

play04:36

I can I will just connect two more

play04:38

sessions so one is tail hyphen f for log

play04:41

amf15ds

play04:44

AMF log so I will see what are the logs

play04:48

going on in the AMF in this session and

play04:51

I'll just do a great SSH

play04:55

and here

play04:57

let me just do an H

play05:01

so I will check the status of my memory

play05:04

usage

play05:05

now just close this connection and what

play05:07

I will do

play05:09

so in UE and Sim so let me just clear it

play05:12

so in UE and Sim there is an option

play05:16

hyphen n where you can spin up multiple

play05:18

number of emcees

play05:20

and it will just replace the emcees in

play05:24

serely so for example if you define MC1

play05:27

here so if I show you the configuration

play05:29

here I have MC1 mc2 and so on till 10.

play05:33

so I have around 10 in C here so if I

play05:36

just pass this parameter hyphen and 10

play05:38

it will start those 10 MCS so you can

play05:41

see 10 MCS are connected and

play05:46

all of them are successful

play05:48

memory usage is not

play05:50

that I would say increased so I'll just

play05:54

power off this machine

play05:55

and what I will do inside my VM

play05:59

I will just reduce the memory to

play06:04

1GB and CPU would be 1.

play06:08

so that I can show you what is the

play06:10

limitation of the the system once it is

play06:14

once it has a reduced capability

play06:18

all right now you can see in the edge

play06:20

top I have around four fifty percent of

play06:23

memory already used

play06:25

and

play06:26

point seven percent off or 1.3 percent

play06:28

of the CPU now my denote weighs up

play06:32

and I'm going to start around 100 us now

play06:37

and let's see only 10 would be able to

play06:39

connect but let's see what would be the

play06:41

impact so if you see here

play06:44

it has increased a shot up to around 80

play06:46

percent

play06:47

but then suddenly the case because none

play06:49

of these UE were able to connect

play06:54

I can form a loop where I can ask it to

play06:58

keep on connecting again and again

play07:01

and then it will try to

play07:05

break

play07:06

so let me just create a loop here so

play07:09

I'll go to mice

play07:12

one more session here

play07:14

to config and I will create a

play07:18

club.sh

play07:20

and

play07:22

this is a shell script so I'll just type

play07:25

bed and Bash

play07:27

for I in

play07:30

1 10 so it will run for 10 times

play07:33

do

play07:36

and I will run

play07:39

what was my command here

play07:41

just run the same command

play07:52

and what I will do I will just

play07:56

give it the executable access clear the

play08:00

screen and

play08:01

let's break my VM

play08:05

so you can see here

play08:08

it's shot up to 94 percent again

play08:11

reduced to 1.4 percent this can create a

play08:16

signal storm here

play08:18

see

play08:20

my e node B actually died up

play08:24

and

play08:28

there's a lot of failure

play08:30

and let us check what is the status of

play08:44

okay AMF is running but

play08:50

the gene would be dried up

play08:55

okay it's going on

play09:03

okay

play09:04

so as you can see my U is still able to

play09:07

connect because the resources are not

play09:09

tied up again so just close this

play09:13

enter the script again

play09:23

so my UE is connected

play09:26

and I'm going to spin up around 400 UVs

play09:30

let's see what happens

play09:32

okay 40 percent and then

play09:39

it has shot up to 100 CPU usage

play09:43

and all right I have by G note B again

play09:46

died

play09:47

and my UV got disconnected

play09:53

so as you can see this is kind of a DDOS

play09:56

attack where

play09:59

the issue is that my G note B is in the

play10:01

C same VM

play10:03

so rather than taking out the AMF

play10:06

it's just breaking down the

play10:10

gene or B

play10:11

but in the same way

play10:13

this can be used to disrupt AMF or UPF

play10:20

or pfcp depending upon what type of

play10:24

system it is targeting so

play10:27

keep in mind whenever you are developing

play10:29

a

play10:31

Network

play10:32

which is exposed to such such sort of

play10:35

reduce attack you need to have Adidas

play10:38

mitigation capabilities in place as well

play10:41

I hope this was relevant to what

play10:45

you guys were looking for and in case

play10:47

you enjoyed this video give it a thumbs

play10:49

up and I will see you in the next one

Rate This

5.0 / 5 (0 votes)

الوسوم ذات الصلة
CybersecurityNetwork TestingDDOS AttackUV9 Simulation5G Core NetworkSignal StormAttack MitigationNetwork DisruptionSecurity TutorialTechnical Analysis
هل تحتاج إلى تلخيص باللغة الإنجليزية؟