Skip to content

Commit b984cd1

Browse files
Mostly done
1 parent 1e64f3f commit b984cd1

File tree

3 files changed

+2
-2
lines changed

3 files changed

+2
-2
lines changed

_pages/home.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: "SysNetS Lab - Home"
33
layout: homelay
4-
excerpt: "SysNetS Lab @ UMass Amherst."
4+
excerpt: "SysNetS Lab @ UTD"
55
sitemap: true
66
permalink: /
77
---

_pages/research.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ To reduce such manual effort, in this paper, we curate SPEC5G the first-ever pub
3131
### TIMESAFE: Timing Interruption Monitoring and Security Assessment for Fronthaul Environments (arXiv 2024)
3232

3333
5G and beyond cellular systems embrace the disaggregation of Radio Access Network (RAN) components, exemplified by the evolution of the fronthual (FH) connection between cellular baseband and radio unit equipment. Crucially, synchronization over the FH is pivotal for reliable 5G services. In recent years, there has been a push to move these links to an Ethernet-based packet network topology, leveraging existing standards and ongoing research for Time-Sensitive Networking (TSN). However, TSN standards, such as Precision Time Protocol (PTP), focus on performance with little to no concern for security. This increases the exposure of the open FH to security risks. Attacks targeting synchronization mechanisms pose significant threats, potentially disrupting 5G networks and impairing connectivity.
34-
34+
![]({{ site.url }}{{ site.baseurl }}/images/respic/timesafe.png){: style="width: 450px; float: left; margin: 5px 15px 0px 0px;"}
3535
In this paper, we demonstrate the impact of successful spoofing and replay attacks against PTP synchronization. We show how a spoofing attack is able to cause a production-ready O-RAN and 5G-compliant private cellular base station to catastrophically fail within 2 seconds of the attack, necessitating manual intervention to restore full network operations. To counter this, we design a Machine Learning (ML)-based monitoring solution capable of detecting various malicious attacks with over 97.5% accuracy.
3636

3737
**Protocol noncompliance checking**

images/respic/timesafe.png

188 KB
Loading

0 commit comments

Comments
 (0)