Scroll Top

CRAT software Agents for Intrusion Detection for OMNET++ (v.5.3)

The solution changes the behaviour of the UE nodes to implement the following features [1]:

  • Change the behaviour of a node to be malicious and vice-versa. This will enable a node (victim) to start executing attacks.
  • Add the capability to infect nodes and to propagate the attack using LTE D2D communications. Using this feature it is possible to analyse the propagation of an attack in the capillary network.
  • Be able for analysing the effect in the communication infrastructure. The solution enables the evaluation of those attacks that finally affect the communication infrastructure.

The paper in which this solution is described will be presented in the conference DASC2018. The link for download the source code for OMNET++ will be available soon. Please, do not hesitate to contact the authors for future questions or feedback.

References

  1. Ana Nieto and Antonio Acien and Javier Lopez (2018): Capture the RAT: Proximity-based Attacks in 5G using the Routine Activity Theory. In: The 16th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC 2018), pp. 520-527, IEEE IEEE, Athens, Greece, 2018, ISBN: 978-1-5386-7518-2.