Adversarial Machine Learning Threat Analysis and Remediation in Open Radio Access Network (O-Ran)

25 Pages Posted: 17 Apr 2024

See all articles by Edan Habler

Edan Habler

Ben-Gurion University of the Negev

Oleg Brodt

Ben-Gurion University of the Negev

Ron Bitton

Ben-Gurion University of the Negev

Dan Avraham

Ben-Gurion University of the Negev

Eitan Klevansky

Ben-Gurion University of the Negev

Dudu Mimran

Ben-Gurion University of the Negev

Heiko Lehmann

Deutsche Telekom AG - Deutsche Telekom Laboratories

Yuval Elovici

Ben-Gurion University of the Negev

Asaf Shabtai

Ben-Gurion University of the Negev

Multiple version iconThere are 2 versions of this paper

Abstract

O-RAN is a new, open, adaptive, and intelligent RAN architecture. Motivated by the success of artificial intelligence in other domains, O-RAN strives to leverage machine learning (ML) to automatically and efficiently manage network resources in diverse use cases such as traffic steering, quality of experience prediction, and anomaly detection. Unfortunately, it has been shown that ML-based systems are vulnerable to an attack technique referred to as adversarial machine learning (AML). This special kind of attack has already been demonstrated in recent studies and in multiple domains. In this paper, we present a systematic AML threat analysis for O-RAN. We start by reviewing relevant ML use cases and analyzing the different ML workflow deployment scenarios in ORAN. Then, we define the threat model, identifying potential adversaries, enumerating their adversarial capabilities, and analyzing their main goals. Next, we explore the various AML threats associated with ORAN and review a large number of attacks that can be performed to realize these threats and demonstrate an AML attack on a traffic steering model. In addition, we analyze and propose various AML countermeasures for mitigating the identified threats. Finally, based on the identified AML threats and countermeasures, we present a methodology and a tool for performing risk assessment for AML attacks for a specific ML use case in O-RAN.

Keywords: Open radio access networks, Adversarial Machine Learning, Security and Privacy, threat analysis

Suggested Citation

Habler, Edan and Brodt, Oleg and Bitton, Ron and Avraham, Dan and Klevansky, Eitan and Mimran, Dudu and Lehmann, Heiko and Elovici, Yuval and Shabtai, Asaf, Adversarial Machine Learning Threat Analysis and Remediation in Open Radio Access Network (O-Ran). Available at SSRN: https://ssrn.com/abstract=4797633 or http://dx.doi.org/10.2139/ssrn.4797633

Edan Habler

Ben-Gurion University of the Negev ( email )

1 Ben-Gurion Blvd
Beer-Sheba 84105, 84105
Israel

Oleg Brodt

Ben-Gurion University of the Negev ( email )

1 Ben-Gurion Blvd
Beer-Sheba 84105, 84105
Israel

Ron Bitton

Ben-Gurion University of the Negev ( email )

1 Ben-Gurion Blvd
Beer-Sheba 84105, 84105
Israel

Dan Avraham

Ben-Gurion University of the Negev ( email )

1 Ben-Gurion Blvd
Beer-Sheba 84105, 84105
Israel

Eitan Klevansky

Ben-Gurion University of the Negev ( email )

1 Ben-Gurion Blvd
Beer-Sheba 84105, 84105
Israel

Dudu Mimran

Ben-Gurion University of the Negev ( email )

1 Ben-Gurion Blvd
Beer-Sheba 84105, 84105
Israel

Heiko Lehmann

Deutsche Telekom AG - Deutsche Telekom Laboratories ( email )

T-Online-Allee 1
Darmstadt, 64295
United States

Yuval Elovici

Ben-Gurion University of the Negev ( email )

1 Ben-Gurion Blvd
Beer-Sheba 84105, 84105
Israel

Asaf Shabtai (Contact Author)

Ben-Gurion University of the Negev ( email )

1 Ben-Gurion Blvd
Beer-Sheba 84105, 84105
Israel

Do you have a job opening that you would like to promote on SSRN?

Paper statistics

Downloads
6
Abstract Views
51
PlumX Metrics