SlideShare a Scribd company logo
LTE Network Automation
under Threat
Altaf Shaik
(Technische Universität Berlin & Kaitiaki Labs)
Ravishankar Borgaonkar
(SINTEF Digital & Kaitiaki Labs)
8 August 2018
KAITIAKI
Blackhat USA 2018, Las Vegas
We Do…
• Mobile network and devices security
• Telecommunication protocol and device analysis
• Attacks and defenses
• Secure network building
8 August 2018
KAITIAKI
Overview
• 4G/LTE & SON operations
• Vulnerabilities and exploitation
• Setup and DoS attacks
• Impact and status
• Mitigations
• Takeaways
8 August 2018
Mobile Network Architecture
8 August 2018
• UE: User Equipment
• eNodeB: Evolved NodeB
• X2: New interface connecting
eNodeBs
• P: Propreitary
Recap - Telco Attacks
• IMSI Catchers
8 August 2018
• Man-in-the-middle
• Interception (Passive)
• SS7
• Locate, Track, Manipulate
• DoS (Radio channels & HLR)
Our Focus – Network Automation
• Favorite Target we know ->
• What about attacking base stations ->
• Is it possible?
• Remotely, without detection?
• Base stations can operate automatically (self operated)
• Self Organized Network (SON)
8 August 2018
Self Organized Network (SON)
• New X2 interface in LTE
• Plug & play network elements - Low CAPEX and OPEX
• Base stations - Automatic configure and control
• 3GPP standardized from LTE Rel. 8 (32.500)
• 5G SON : low-latency, end-to-end intelligent, complex networks
8 August 2018
X2
SON
• Software package installed on eNodeB or OAM
• Mix of standards and implementations
• Vendor implementations (UltraSON, Elastic-SON, NGSON, AirSON)
• 90% Operators support SON
• No reported attacks till now..!
8 August 2018
8 August 2018
Background
8 August 2018
SON Operation in Practice
Self-Configuration
Self-Optimization
Self-Healing
Control System
SON Technical Features
• ANR – Automatic Neighbor Relation
• Discover & add new base stations into the network
• PCI Optimization
• Solve adjacent cell ID conflicts
• MRO – Mobility Robustness Optimization
• Control handover settings to adjust coverage
8 August 2018
SON Operation Modes
• Off
• Collect data, no parameter-change
• Manual apply
• Parameter-change with operator confirmation
• Automatic apply
• Automatic parameter change, autonomous operation
8 August 2018
SON Design Issue
information from phones & base stations
8 August 2018
SON logic and
intelligence
Trusted and Unverified
Design Flaw
Key Question
Rogue eNodeB
Real eNodeB
8 August 2018
UE
LTE networkLTE network
Automation in LTE – Vulnerable Points
• Cell configurations
• PCI (Physical Cell ID)
• Neighbor relations
• Discover eNodeBs, share configs - neighbor cells, load info
• Handover analysis
• Performance statistics, success/drop rates
• Coverage enhancements
• Radio Link Failure (RLF) report
8 August 2018
8 August 2018
Design Vulnerabilities
LTE PCI Optimization
8 August 2018
• PCI: Physical Cell ID
• Adjacent cells: unique PCI, same frequency
• Network scanners, UE reports report PCI conflicts
• Same PCI: collision/confusion for UEs
• Handover failures, connection issues
122
PCI = 100
**eNodeB forced to change their config**
155
122
133
129
Automatic Neighbor Relation (ANR)
8 August 2018
• Discover new
eNodeBs
• Connect on X2
interface
X2
Source: 3GPP
Automatic Neighbor Relation (ANR)
8 August 2018
• Neighbor relation table
• No Remove
• NoHo : No Handover
• NoX2
**No attributes to authorize X2 setup** Source: 3GPP
LTE Handover
8 August 2018
• X2 connected handovers
• GSM vs LTE handover
• No neighbor cell list for UE – detect all
• Based on PCI and EARFCN only
**Reported Cells can be real or fake
– No verification**
X2
LTE Handover
8 August 2018
Handover Analysis
• Handover failure types
• Early HO, Late HO, HO to wrong cell
• Identify faults
• RLF reports (UE -> eNodeB)
• HO reports (eNodeB <-> eNodeB)
• Periodic KPI monitoring
• Solve faults, How?
• Adjust coverage settings
**HO blacklist (KPI < HO success threshold)**
8 August 2018
Handover success rate
Handover preparation success rate
Handover execution success rate
Handover problems – solutions
• Increase/decrease coverage
• Change cell index offset
Rogue Data Injection
• Measurement report
• Can contain false information (3GPP 36.331) - for handovers and ANR
• Radio Link Failure (RLF) report
• Can contain false information (3GPP 36.331) - for MRO
• Handover reports
• Reports between eNodeBs about handover failures - for MRO
• Information received from UE - content is not verified
• Attackers can inject rogue data
8 August 2018
Vulnerable Mobile Network Functions
• Cell detection and addition
• Cell ID interference detections
• LTE handover process
• Handover analysis
• Network coverage tuning
8 August 2018
8 August 2018
Exploitation
Rogue eNodeB
• 200 $ setup
• Broadcast channels sufficient
• Spoof cell IDs of a legitimate eNodeB
• No interaction with UE
• Operating range depends on hardware
• 50 meters without amplifiers
• Open source software SRSLTE
• For testing - SON base stations, faraday cage
8 August 2018
122
• Adjacent eNodeBs are connected via X2 (ANR)
• Rogue eNodeB - legitimate PCI and ECGI (133, 272, 112)
• UEs report PCI 133 to eNodeB
• ANR begins to add 133 to NRT
• Problem
• Zero control/authorize for X2 setup
• Effect
• X2 signaling flood when more cells are impersonated
• Handover failures
-> Exploiting X2 Signaling
8 August 2018
133
PCI = 100
133
X2
X2
NR PCI No
Remove
No
HO
No
X2
1 122 √
2 109 √
NR PCI No
Remove
No
HO
No
X2
1 122 √
2 109 √
3 133
200
• Adjacent cells/eNodeBs use unique PCI to avoid collision
• Rogue eNodeB Broadcast legitimate PCIs (100, 200, 300)
• Problem
• Adjacent eNodeBs cannot use same PCI and starts optimization
• Effect
• Restart eNodeB/cell and choose a new PCI
• Restart time roughly 7-8 minutes
• Release the connected UEs to other base stations (2G/3G)
-> Remotely Kill & Restart LTE Base Station
8 August 2018
PCI = 100
100
200
300
300
100
• UE in a voice call and sends periodic measurement reports
• Rogue eNodeB Broadcast legitimate neighboring PCI (100)
• Strong signal from PCI 100 causes handover
• PCI 100 already in neighbor list
• Problem
• Handover with false information
• Effect
• UE connects to rogue eNodeB – Handover hijacked
• RLF– report created against a real eNodeB
• Ongoing calls are dropped
-> Handover Hijacking (Dropping Calls)
8 August 2018
PCI = 200
100
Start X2
Handover
Handover
to PCI=100
Handover
failed
Re-establish
connectionrejectRLF report
Handover
Impact of Handover Hijacking
• Rogue eNodeB calumniates (defames) a real eNodeB
• RLF reports with false data
• Handover failures
• Coverage changes
• KPI drops – HO blacklisted or eNodeB/cell is shutdown
• 1 rogue eNodeB, 5 seconds – drop all cell (call + data) traffic..!
8 August 2018
Impact – Grand Scale
• Detection by operators – no known methods to detect
• Persistent attacks – time needed for SON to heal
• Full Paper : https://dl.acm.org/citation.cfm?id=3212497
8 August 2018
Subscriber Operator
Call and data drops eNodeB maintenance and repairs
Poor network coverage Poor network coverage
UE downgrades to 3G/2G Revenue loss
Customer complaints
8 August 2018
Security Status
Affected Products
• All LTE phones complying to 3GPP 36.331 >= Rel. 8
• 4 basebands vendors (based on tested UEs)
• All network products complying with 32.500 >= Rel.8
• 4 network vendors (based on available product documentation)
8 August 2018
Vulnerability Status
• Disclosed with two operators (SON experts) and GSMA
• Biggest European operators experts confirmed the issues
• Comments from GSMA and operators
• Switch to less automation – reduce risk
• PCI reallocation during maintenance period
• Unplug a defective eNodeB (not really defective)
• Difficulties to detect & add mitigations
• GSMA guidelines document (ongoing) – protection from rogue base stations
8 August 2018
Solutions
• Signed broadcast messages
• Prevent connection to rogue base stations (5G: NO, complicated design)
• Content verification
• Verify measurement reports from UE
• Compatibility issues, power issues, efficiency problems
• Adding actionable intelligence to SON
• Built-in baseband features to detect rogue base stations
• Ongoing work with a vendor
8 August 2018
Takeaways
• SON operate with unverified information from phones
• Current SON techniques cannot deal with Rogue base station attacks
• Lack of appropriate parameters for optimal automation decisions
• Automation lacks data verification and rely on few parameters
• A 200 $ rogue device can modify network configurations and turn it OFF..!
8 August 2018
8 August 2018
Thank you
altaf329@sect.tu-berlin.de
rbbo@kth.se
director@kaitiaki.in

More Related Content

What's hot

15222845 pss7-ans
15222845 pss7-ans15222845 pss7-ans
15222845 pss7-ans
15222845
 
HITCON 2015 - Building Automation and Control: Hacking Subsidized Energy Savi...
HITCON 2015 - Building Automation and Control: Hacking Subsidized Energy Savi...HITCON 2015 - Building Automation and Control: Hacking Subsidized Energy Savi...
HITCON 2015 - Building Automation and Control: Hacking Subsidized Energy Savi...
Philippe Lin
 
15250423 pss7-ans
15250423 pss7-ans15250423 pss7-ans
15250423 pss7-ans
cbb0205
 
RFID Application
RFID ApplicationRFID Application
RFID Application
ngjklmn
 
RFID Application
RFID ApplicationRFID Application
RFID Application
15223515
 
RFID Application
RFID ApplicationRFID Application
RFID Application
vianchow
 
15250385 pss7-ans
15250385 pss7-ans15250385 pss7-ans
15250385 pss7-ans
Hongqin Wang
 
Presentation 15251470 pss7
Presentation 15251470 pss7Presentation 15251470 pss7
Presentation 15251470 pss7
chrisalmighty
 
2010 11 18 Substation Automation Systems By Gin Quesada
2010 11 18  Substation Automation Systems By Gin Quesada2010 11 18  Substation Automation Systems By Gin Quesada
2010 11 18 Substation Automation Systems By Gin Quesadaginquesada
 
15250377 pss7-ans
15250377 pss7-ans15250377 pss7-ans
15250377 pss7-ans
Abby-CHENYiting
 
Aether Engineering, San Diego State Senior Design Fall 2015
Aether Engineering, San Diego State Senior Design Fall 2015Aether Engineering, San Diego State Senior Design Fall 2015
Aether Engineering, San Diego State Senior Design Fall 2015
Lionel Fox
 
RFID Application
RFID ApplicationRFID Application
RFID Application
bqingyuan1997
 
RFID Application
RFID ApplicationRFID Application
RFID Application
erichuieric
 
RFID & ITS APPLICATIONS
RFID & ITS APPLICATIONSRFID & ITS APPLICATIONS
RFID & ITS APPLICATIONS
15250202
 
15219690 pss7-ans
15219690 pss7-ans15219690 pss7-ans
15219690 pss7-ans
GCIT1015
 
14250128-pss7-ans
14250128-pss7-ans14250128-pss7-ans
14250128-pss7-ans
chutingchang
 
15251446 pss7
15251446 pss715251446 pss7
15251446 pss7
宣 曾
 
Taking a closer look at level 0 and level 1 security
Taking a closer look at level 0 and level 1 securityTaking a closer look at level 0 and level 1 security
Taking a closer look at level 0 and level 1 security
Matt Loong
 
4G Mobile Interception (Edecision)
4G Mobile Interception (Edecision)4G Mobile Interception (Edecision)
4G Mobile Interception (Edecision)
Денис Забіяко, BCIP
 

What's hot (20)

15222845 pss7-ans
15222845 pss7-ans15222845 pss7-ans
15222845 pss7-ans
 
HITCON 2015 - Building Automation and Control: Hacking Subsidized Energy Savi...
HITCON 2015 - Building Automation and Control: Hacking Subsidized Energy Savi...HITCON 2015 - Building Automation and Control: Hacking Subsidized Energy Savi...
HITCON 2015 - Building Automation and Control: Hacking Subsidized Energy Savi...
 
15250423 pss7-ans
15250423 pss7-ans15250423 pss7-ans
15250423 pss7-ans
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
15250385 pss7-ans
15250385 pss7-ans15250385 pss7-ans
15250385 pss7-ans
 
Presentation 15251470 pss7
Presentation 15251470 pss7Presentation 15251470 pss7
Presentation 15251470 pss7
 
2010 11 18 Substation Automation Systems By Gin Quesada
2010 11 18  Substation Automation Systems By Gin Quesada2010 11 18  Substation Automation Systems By Gin Quesada
2010 11 18 Substation Automation Systems By Gin Quesada
 
HomeControl
HomeControlHomeControl
HomeControl
 
15250377 pss7-ans
15250377 pss7-ans15250377 pss7-ans
15250377 pss7-ans
 
Aether Engineering, San Diego State Senior Design Fall 2015
Aether Engineering, San Diego State Senior Design Fall 2015Aether Engineering, San Diego State Senior Design Fall 2015
Aether Engineering, San Diego State Senior Design Fall 2015
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
RFID & ITS APPLICATIONS
RFID & ITS APPLICATIONSRFID & ITS APPLICATIONS
RFID & ITS APPLICATIONS
 
15219690 pss7-ans
15219690 pss7-ans15219690 pss7-ans
15219690 pss7-ans
 
14250128-pss7-ans
14250128-pss7-ans14250128-pss7-ans
14250128-pss7-ans
 
15251446 pss7
15251446 pss715251446 pss7
15251446 pss7
 
Taking a closer look at level 0 and level 1 security
Taking a closer look at level 0 and level 1 securityTaking a closer look at level 0 and level 1 security
Taking a closer look at level 0 and level 1 security
 
4G Mobile Interception (Edecision)
4G Mobile Interception (Edecision)4G Mobile Interception (Edecision)
4G Mobile Interception (Edecision)
 

Similar to LTE Network Automation Under Threat

422738668-LTE-Downlink-Throughput-Optimization-Based-on-Performance-Data [Rep...
422738668-LTE-Downlink-Throughput-Optimization-Based-on-Performance-Data [Rep...422738668-LTE-Downlink-Throughput-Optimization-Based-on-Performance-Data [Rep...
422738668-LTE-Downlink-Throughput-Optimization-Based-on-Performance-Data [Rep...
SudheeraIndrajith
 
Practical security testing for lte networks
Practical security testing for lte networksPractical security testing for lte networks
Practical security testing for lte networksPfedya
 
Link Labs LPWA Webinar
Link Labs LPWA WebinarLink Labs LPWA Webinar
Link Labs LPWA Webinar
Brian Ray
 
Implications of 4G Deployments (MEF for MPLS World Congress Ethernet Wholesa...
Implications of 4G Deployments (MEF for MPLS World Congress  Ethernet Wholesa...Implications of 4G Deployments (MEF for MPLS World Congress  Ethernet Wholesa...
Implications of 4G Deployments (MEF for MPLS World Congress Ethernet Wholesa...
Javier Gonzalez
 
UCT IoT Deployment and Challenges
UCT IoT Deployment and ChallengesUCT IoT Deployment and Challenges
UCT IoT Deployment and Challenges
The IOT Academy
 
unit 2.pdf
unit 2.pdfunit 2.pdf
unit 2.pdf
SupratimNandi3
 
Cma5000a gige
Cma5000a   gigeCma5000a   gige
Cma5000a gige
onlinestuden
 
Wireless technologies
Wireless technologiesWireless technologies
Wireless technologies
Sathiya Narayanan
 
Wireless technologies and .11n
Wireless technologies and .11nWireless technologies and .11n
Wireless technologies and .11n
swathi b
 
Device-level AI for 5G and beyond
Device-level AI for 5G and beyondDevice-level AI for 5G and beyond
Device-level AI for 5G and beyond
3G4G
 
IOT, It's the Internet...only bigger
IOT, It's the Internet...only biggerIOT, It's the Internet...only bigger
IOT, It's the Internet...only bigger
APNIC
 
Link labs 2 g 3g cdma transition webinar slides
Link labs 2 g 3g cdma transition webinar slidesLink labs 2 g 3g cdma transition webinar slides
Link labs 2 g 3g cdma transition webinar slides
Brian Ray
 
Link labs 2 g 3g cdma transition webinar slides
Link labs 2 g 3g cdma transition webinar slidesLink labs 2 g 3g cdma transition webinar slides
Link labs 2 g 3g cdma transition webinar slides
Brian Ray
 
Link labs 2G 3G CDMA transition webinar slides
Link labs 2G 3G CDMA transition webinar slidesLink labs 2G 3G CDMA transition webinar slides
Link labs 2G 3G CDMA transition webinar slides
Brian Ray
 
Radio Frequency Identification Technology In IOT
Radio Frequency Identification Technology In IOTRadio Frequency Identification Technology In IOT
Radio Frequency Identification Technology In IOT
Nikhil Patankar
 
Materi seminar 5 g ieee comsoc lecture 5g evolution v2
Materi seminar 5 g ieee comsoc lecture 5g evolution v2Materi seminar 5 g ieee comsoc lecture 5g evolution v2
Materi seminar 5 g ieee comsoc lecture 5g evolution v2
indonesiabelajar
 
Link labs LTE-M NB-IOT Hype Webinar slides
Link labs LTE-M NB-IOT Hype Webinar slidesLink labs LTE-M NB-IOT Hype Webinar slides
Link labs LTE-M NB-IOT Hype Webinar slides
Brian Ray
 
CCNA (R & S) Module 02 - Connecting Networks - Chapter 8
CCNA (R & S) Module 02 - Connecting Networks - Chapter 8CCNA (R & S) Module 02 - Connecting Networks - Chapter 8
CCNA (R & S) Module 02 - Connecting Networks - Chapter 8
Waqas Ahmed Nawaz
 
Mobile IoT Network :Current Status and Future Evolution
Mobile IoT  Network :Current Status and Future EvolutionMobile IoT  Network :Current Status and Future Evolution
Mobile IoT Network :Current Status and Future Evolution
Sivasothy Shanmugalingam
 

Similar to LTE Network Automation Under Threat (20)

422738668-LTE-Downlink-Throughput-Optimization-Based-on-Performance-Data [Rep...
422738668-LTE-Downlink-Throughput-Optimization-Based-on-Performance-Data [Rep...422738668-LTE-Downlink-Throughput-Optimization-Based-on-Performance-Data [Rep...
422738668-LTE-Downlink-Throughput-Optimization-Based-on-Performance-Data [Rep...
 
Practical security testing for lte networks
Practical security testing for lte networksPractical security testing for lte networks
Practical security testing for lte networks
 
Link Labs LPWA Webinar
Link Labs LPWA WebinarLink Labs LPWA Webinar
Link Labs LPWA Webinar
 
Implications of 4G Deployments (MEF for MPLS World Congress Ethernet Wholesa...
Implications of 4G Deployments (MEF for MPLS World Congress  Ethernet Wholesa...Implications of 4G Deployments (MEF for MPLS World Congress  Ethernet Wholesa...
Implications of 4G Deployments (MEF for MPLS World Congress Ethernet Wholesa...
 
UCT IoT Deployment and Challenges
UCT IoT Deployment and ChallengesUCT IoT Deployment and Challenges
UCT IoT Deployment and Challenges
 
unit 2.pdf
unit 2.pdfunit 2.pdf
unit 2.pdf
 
Cma5000a gige
Cma5000a   gigeCma5000a   gige
Cma5000a gige
 
Wireless technologies
Wireless technologiesWireless technologies
Wireless technologies
 
Wireless technologies and .11n
Wireless technologies and .11nWireless technologies and .11n
Wireless technologies and .11n
 
Device-level AI for 5G and beyond
Device-level AI for 5G and beyondDevice-level AI for 5G and beyond
Device-level AI for 5G and beyond
 
IOT, It's the Internet...only bigger
IOT, It's the Internet...only biggerIOT, It's the Internet...only bigger
IOT, It's the Internet...only bigger
 
Link labs 2 g 3g cdma transition webinar slides
Link labs 2 g 3g cdma transition webinar slidesLink labs 2 g 3g cdma transition webinar slides
Link labs 2 g 3g cdma transition webinar slides
 
Link labs 2 g 3g cdma transition webinar slides
Link labs 2 g 3g cdma transition webinar slidesLink labs 2 g 3g cdma transition webinar slides
Link labs 2 g 3g cdma transition webinar slides
 
Link labs 2G 3G CDMA transition webinar slides
Link labs 2G 3G CDMA transition webinar slidesLink labs 2G 3G CDMA transition webinar slides
Link labs 2G 3G CDMA transition webinar slides
 
Radio Frequency Identification Technology In IOT
Radio Frequency Identification Technology In IOTRadio Frequency Identification Technology In IOT
Radio Frequency Identification Technology In IOT
 
Materi seminar 5 g ieee comsoc lecture 5g evolution v2
Materi seminar 5 g ieee comsoc lecture 5g evolution v2Materi seminar 5 g ieee comsoc lecture 5g evolution v2
Materi seminar 5 g ieee comsoc lecture 5g evolution v2
 
Bell4GLTE
Bell4GLTEBell4GLTE
Bell4GLTE
 
Link labs LTE-M NB-IOT Hype Webinar slides
Link labs LTE-M NB-IOT Hype Webinar slidesLink labs LTE-M NB-IOT Hype Webinar slides
Link labs LTE-M NB-IOT Hype Webinar slides
 
CCNA (R & S) Module 02 - Connecting Networks - Chapter 8
CCNA (R & S) Module 02 - Connecting Networks - Chapter 8CCNA (R & S) Module 02 - Connecting Networks - Chapter 8
CCNA (R & S) Module 02 - Connecting Networks - Chapter 8
 
Mobile IoT Network :Current Status and Future Evolution
Mobile IoT  Network :Current Status and Future EvolutionMobile IoT  Network :Current Status and Future Evolution
Mobile IoT Network :Current Status and Future Evolution
 

More from Priyanka Aash

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Priyanka Aash
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdf
Priyanka Aash
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdf
Priyanka Aash
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdf
Priyanka Aash
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdf
Priyanka Aash
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
Priyanka Aash
 
DPDP Act 2023.pdf
DPDP Act 2023.pdfDPDP Act 2023.pdf
DPDP Act 2023.pdf
Priyanka Aash
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Priyanka Aash
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdf
Priyanka Aash
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdf
Priyanka Aash
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdf
Priyanka Aash
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdf
Priyanka Aash
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 Battlefield
Priyanka Aash
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware Attacks
Priyanka Aash
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Priyanka Aash
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Priyanka Aash
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Priyanka Aash
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Priyanka Aash
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
Priyanka Aash
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Priyanka Aash
 

More from Priyanka Aash (20)

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdf
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdf
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdf
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdf
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
 
DPDP Act 2023.pdf
DPDP Act 2023.pdfDPDP Act 2023.pdf
DPDP Act 2023.pdf
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdf
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdf
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdf
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdf
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 Battlefield
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware Attacks
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

Recently uploaded

UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 

Recently uploaded (20)

UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 

LTE Network Automation Under Threat

  • 1. LTE Network Automation under Threat Altaf Shaik (Technische Universität Berlin & Kaitiaki Labs) Ravishankar Borgaonkar (SINTEF Digital & Kaitiaki Labs) 8 August 2018 KAITIAKI Blackhat USA 2018, Las Vegas
  • 2. We Do… • Mobile network and devices security • Telecommunication protocol and device analysis • Attacks and defenses • Secure network building 8 August 2018 KAITIAKI
  • 3. Overview • 4G/LTE & SON operations • Vulnerabilities and exploitation • Setup and DoS attacks • Impact and status • Mitigations • Takeaways 8 August 2018
  • 4. Mobile Network Architecture 8 August 2018 • UE: User Equipment • eNodeB: Evolved NodeB • X2: New interface connecting eNodeBs • P: Propreitary
  • 5. Recap - Telco Attacks • IMSI Catchers 8 August 2018 • Man-in-the-middle • Interception (Passive) • SS7 • Locate, Track, Manipulate • DoS (Radio channels & HLR)
  • 6. Our Focus – Network Automation • Favorite Target we know -> • What about attacking base stations -> • Is it possible? • Remotely, without detection? • Base stations can operate automatically (self operated) • Self Organized Network (SON) 8 August 2018
  • 7. Self Organized Network (SON) • New X2 interface in LTE • Plug & play network elements - Low CAPEX and OPEX • Base stations - Automatic configure and control • 3GPP standardized from LTE Rel. 8 (32.500) • 5G SON : low-latency, end-to-end intelligent, complex networks 8 August 2018 X2
  • 8. SON • Software package installed on eNodeB or OAM • Mix of standards and implementations • Vendor implementations (UltraSON, Elastic-SON, NGSON, AirSON) • 90% Operators support SON • No reported attacks till now..! 8 August 2018
  • 10. 8 August 2018 SON Operation in Practice Self-Configuration Self-Optimization Self-Healing Control System
  • 11. SON Technical Features • ANR – Automatic Neighbor Relation • Discover & add new base stations into the network • PCI Optimization • Solve adjacent cell ID conflicts • MRO – Mobility Robustness Optimization • Control handover settings to adjust coverage 8 August 2018
  • 12. SON Operation Modes • Off • Collect data, no parameter-change • Manual apply • Parameter-change with operator confirmation • Automatic apply • Automatic parameter change, autonomous operation 8 August 2018
  • 13. SON Design Issue information from phones & base stations 8 August 2018 SON logic and intelligence Trusted and Unverified Design Flaw
  • 14. Key Question Rogue eNodeB Real eNodeB 8 August 2018 UE LTE networkLTE network
  • 15. Automation in LTE – Vulnerable Points • Cell configurations • PCI (Physical Cell ID) • Neighbor relations • Discover eNodeBs, share configs - neighbor cells, load info • Handover analysis • Performance statistics, success/drop rates • Coverage enhancements • Radio Link Failure (RLF) report 8 August 2018
  • 16. 8 August 2018 Design Vulnerabilities
  • 17. LTE PCI Optimization 8 August 2018 • PCI: Physical Cell ID • Adjacent cells: unique PCI, same frequency • Network scanners, UE reports report PCI conflicts • Same PCI: collision/confusion for UEs • Handover failures, connection issues 122 PCI = 100 **eNodeB forced to change their config** 155 122 133 129
  • 18. Automatic Neighbor Relation (ANR) 8 August 2018 • Discover new eNodeBs • Connect on X2 interface X2 Source: 3GPP
  • 19. Automatic Neighbor Relation (ANR) 8 August 2018 • Neighbor relation table • No Remove • NoHo : No Handover • NoX2 **No attributes to authorize X2 setup** Source: 3GPP
  • 20. LTE Handover 8 August 2018 • X2 connected handovers • GSM vs LTE handover • No neighbor cell list for UE – detect all • Based on PCI and EARFCN only **Reported Cells can be real or fake – No verification** X2
  • 22. Handover Analysis • Handover failure types • Early HO, Late HO, HO to wrong cell • Identify faults • RLF reports (UE -> eNodeB) • HO reports (eNodeB <-> eNodeB) • Periodic KPI monitoring • Solve faults, How? • Adjust coverage settings **HO blacklist (KPI < HO success threshold)** 8 August 2018 Handover success rate Handover preparation success rate Handover execution success rate Handover problems – solutions • Increase/decrease coverage • Change cell index offset
  • 23. Rogue Data Injection • Measurement report • Can contain false information (3GPP 36.331) - for handovers and ANR • Radio Link Failure (RLF) report • Can contain false information (3GPP 36.331) - for MRO • Handover reports • Reports between eNodeBs about handover failures - for MRO • Information received from UE - content is not verified • Attackers can inject rogue data 8 August 2018
  • 24. Vulnerable Mobile Network Functions • Cell detection and addition • Cell ID interference detections • LTE handover process • Handover analysis • Network coverage tuning 8 August 2018
  • 26. Rogue eNodeB • 200 $ setup • Broadcast channels sufficient • Spoof cell IDs of a legitimate eNodeB • No interaction with UE • Operating range depends on hardware • 50 meters without amplifiers • Open source software SRSLTE • For testing - SON base stations, faraday cage 8 August 2018
  • 27. 122 • Adjacent eNodeBs are connected via X2 (ANR) • Rogue eNodeB - legitimate PCI and ECGI (133, 272, 112) • UEs report PCI 133 to eNodeB • ANR begins to add 133 to NRT • Problem • Zero control/authorize for X2 setup • Effect • X2 signaling flood when more cells are impersonated • Handover failures -> Exploiting X2 Signaling 8 August 2018 133 PCI = 100 133 X2 X2 NR PCI No Remove No HO No X2 1 122 √ 2 109 √ NR PCI No Remove No HO No X2 1 122 √ 2 109 √ 3 133
  • 28. 200 • Adjacent cells/eNodeBs use unique PCI to avoid collision • Rogue eNodeB Broadcast legitimate PCIs (100, 200, 300) • Problem • Adjacent eNodeBs cannot use same PCI and starts optimization • Effect • Restart eNodeB/cell and choose a new PCI • Restart time roughly 7-8 minutes • Release the connected UEs to other base stations (2G/3G) -> Remotely Kill & Restart LTE Base Station 8 August 2018 PCI = 100 100 200 300 300
  • 29. 100 • UE in a voice call and sends periodic measurement reports • Rogue eNodeB Broadcast legitimate neighboring PCI (100) • Strong signal from PCI 100 causes handover • PCI 100 already in neighbor list • Problem • Handover with false information • Effect • UE connects to rogue eNodeB – Handover hijacked • RLF– report created against a real eNodeB • Ongoing calls are dropped -> Handover Hijacking (Dropping Calls) 8 August 2018 PCI = 200 100 Start X2 Handover Handover to PCI=100 Handover failed Re-establish connectionrejectRLF report Handover
  • 30. Impact of Handover Hijacking • Rogue eNodeB calumniates (defames) a real eNodeB • RLF reports with false data • Handover failures • Coverage changes • KPI drops – HO blacklisted or eNodeB/cell is shutdown • 1 rogue eNodeB, 5 seconds – drop all cell (call + data) traffic..! 8 August 2018
  • 31. Impact – Grand Scale • Detection by operators – no known methods to detect • Persistent attacks – time needed for SON to heal • Full Paper : https://dl.acm.org/citation.cfm?id=3212497 8 August 2018 Subscriber Operator Call and data drops eNodeB maintenance and repairs Poor network coverage Poor network coverage UE downgrades to 3G/2G Revenue loss Customer complaints
  • 33. Affected Products • All LTE phones complying to 3GPP 36.331 >= Rel. 8 • 4 basebands vendors (based on tested UEs) • All network products complying with 32.500 >= Rel.8 • 4 network vendors (based on available product documentation) 8 August 2018
  • 34. Vulnerability Status • Disclosed with two operators (SON experts) and GSMA • Biggest European operators experts confirmed the issues • Comments from GSMA and operators • Switch to less automation – reduce risk • PCI reallocation during maintenance period • Unplug a defective eNodeB (not really defective) • Difficulties to detect & add mitigations • GSMA guidelines document (ongoing) – protection from rogue base stations 8 August 2018
  • 35. Solutions • Signed broadcast messages • Prevent connection to rogue base stations (5G: NO, complicated design) • Content verification • Verify measurement reports from UE • Compatibility issues, power issues, efficiency problems • Adding actionable intelligence to SON • Built-in baseband features to detect rogue base stations • Ongoing work with a vendor 8 August 2018
  • 36. Takeaways • SON operate with unverified information from phones • Current SON techniques cannot deal with Rogue base station attacks • Lack of appropriate parameters for optimal automation decisions • Automation lacks data verification and rely on few parameters • A 200 $ rogue device can modify network configurations and turn it OFF..! 8 August 2018
  • 37. 8 August 2018 Thank you altaf329@sect.tu-berlin.de rbbo@kth.se director@kaitiaki.in