SlideShare a Scribd company logo
Network Infrastructure SecurityNetwork Infrastructure Security
in Cellular Data Networks: Anin Cellular Data Networks: An
Initial InvestigationInitial Investigation
Kavita Barapatre, Nirlesh Koshta, Vishal Sharma
IIT Bombay, Mumbai, India
and
Fabio Ricciato
Forschungszentrum Telekommunikation Wien (FTW), Vienna, Austria
© Copyright 2005-06
All Rights Reserved
©Copyright 2005-06
All Rights Reserved APRICOT’06, Perth, Australia, 1-2 March 2006 2
Outline of the Talk
 Motivation – why worry about infrastructure security?
 GSM /GPRS network architecture & critical interfaces
 Attacks exploiting security loopholes in GSM/GPRS
 Impact of unwanted traffic: viruses, worms, trojans, …
 Testbed setup and testing scenarios
 Methodology: nature of tests possible, what else is needed
 Tools for investigating network security
©Copyright 2005-06
All Rights Reserved APRICOT’06, Perth, Australia, 1-2 March 2006 3
Outline of the Talk
 Motivation – why worry about infrastructure security?
 GSM /GPRS network architecture & critical interfaces
 Attacks exploiting security loopholes in GSM/GPRS
 Impact of unwanted traffic: viruses, worms, trojans, …
 Testbed setup and testing scenarios
 Methodology: nature of tests possible, what else is needed
 Tools for investigating network security
©Copyright 2005-06
All Rights Reserved APRICOT’06, Perth, Australia, 1-2 March 2006 4
Why Infrastructure Security ?
Network Security
Information Security Infrastructure Security
- Keeping user’s info. protected
- Subject of cryptography
- Not subject of this talk
- Sustaining ability of network
elements to provide connectivity
between communicating entities
- Subject of this talk
Cellular GSM/CDMA networks moving to an IP core …
 Network increasingly open
 Control/data segregation inherently less stringent
 Increased threats! … Exposure to wireline-like security risks
©Copyright 2005-06
All Rights Reserved APRICOT’06, Perth, Australia, 1-2 March 2006 5
Motivation (contd)
 Interplay of IP and complex structure of cellular networks
⇒ Gives rise to subtle phenomena …
… that may not be easily conceived
⇒ Need to be found empirically via intelligent experimentation
 Provider infrastructure security becomes key, imperative to …
 Investigate susceptibilities and risks
 Evaluate options, fixes, and solutions
 Propose techniques and tools for proactive/reactive action
©Copyright 2005-06
All Rights Reserved APRICOT’06, Perth, Australia, 1-2 March 2006 6
Outline of the Talk
 Motivation – why worry about infrastructure security?
 GSM /GPRS network architecture & critical interfaces
 Attacks exploiting security loopholes in GSM/GPRS
 Impact of unwanted traffic: viruses, worms, trojans, …
 Testbed setup and testing scenarios
 Methodology: nature of tests possible, what else is needed
 Tools for investigating network security
©Copyright 2005-06
All Rights Reserved APRICOT’06, Perth, Australia, 1-2 March 2006 7
GSM Network Architecture
©Copyright 2005-06
All Rights Reserved APRICOT’06, Perth, Australia, 1-2 March 2006 9
A Signaling Channel DoS Attack
in GSM
BSC MSC
Channel Required
Immediate Assign
Air Interface Abis Interface A Intf.
MS
BTS
Channel Request
RACH
Channel Active AGCH
Immediate Assign
Command
SDCCH
Malicious MS now
repeats exercise
Signaling channels end
up assigned & “lockout”
genuine MSs
Channel Active ACK SDCCH
©Copyright 2005-06
All Rights Reserved APRICOT’06, Perth, Australia, 1-2 March 2006 10
GPRS Network Architecture
©Copyright 2005-06
All Rights Reserved APRICOT’06, Perth, Australia, 1-2 March 2006 12
A DCH “Lockout” Attack in GPRS
2.5G/3G
Provider’s
Core Network
2.5G/3G
Provider’s
Core Network
Internet
BG
Other
2.5G/3G
CN
Other
2.5G/3G
CN
MS with open PDP
context & IP address
Small IP pkt. at
rate R > 1/T
DCH never
released!
External
Agent
T = DCH release/dynamic
reassignment timeout
GSM/GPRS RAN
UMTS RAN
With multiple DCHs occupied,
logical radio resources wasted
 Congestion in cell
 Lockout of genuine MSs
©Copyright 2005-06
All Rights Reserved APRICOT’06, Perth, Australia, 1-2 March 2006 13
Impact of Unwanted Traffic: Viruses,
worms, trojans, …
2.5G/3G
Provider’s
Core Network
2.5G/3G
Provider’s
Core Network
Internet
Gi Firewall
Internet
BG
Other
2.5G/3G
CN
Other
2.5G/3G
CN
External
Agent
GSM/GPRS RAN
UMTS RAN
- Attacker can be inside your n/w!
- Consider effect of large infections!
- Viruses/worms from Internet
detected in 3G core networks
©Copyright 2005-06
All Rights Reserved APRICOT’06, Perth, Australia, 1-2 March 2006 14
Outline of the Talk
 Motivation – why worry about infrastructure security?
 GSM /GPRS network architecture & critical interfaces
 Attacks exploiting security loopholes in GSM/GPRS
 Impact of unwanted traffic: viruses, worms, trojans, …
 Testbed setup and testing scenarios
 Methodology: nature of tests possible, what else is needed
 Tools for investigating network security
©Copyright 2005-06
All Rights Reserved APRICOT’06, Perth, Australia, 1-2 March 2006 15
Experimental Test-bed Setup &
Testing Scenarios
Testing can be:
 Intra-provider
 Inter-provider (CDMA-GSM)
 Wireless-wireline
©Copyright 2005-06
All Rights Reserved APRICOT’06, Perth, Australia, 1-2 March 2006 16
Outline of the Talk
 Motivation – why worry about infrastructure security?
 GSM /GPRS network architecture & critical interfaces
 Attacks exploiting security loopholes in GSM/GPRS
 Impact of unwanted traffic: viruses, worms, trojans, …
 Testbed setup and testing scenarios
 Methodology: nature of tests possible, what else is needed
 Tools for investigating network security
©Copyright 2005-06
All Rights Reserved APRICOT’06, Perth, Australia, 1-2 March 2006 17
Testing Methodology
Active Probing
Direct malicious generated traffic
to SP’s network or to a remote m/c on
network. E.g.
 SYN attack
 Tear-drop attack
 Smurf attack
Exploit various types of commun.
 Port-to-port
 IP address spoofing
Infer network parameters: RTT, buffers
Passive Listening
Provoke remote attacker(s) to
attack m/c under observation
Invoke attacks, HoneyD as “bait”
 Run intrusion detection systems
on attacked m/c
 Apply intelligent algorithms for
proactive threat inference
Taxonomy of Tests
©Copyright 2005-06
All Rights Reserved APRICOT’06, Perth, Australia, 1-2 March 2006 18
Outline of the Talk
 Motivation – why worry about infrastructure security?
 GSM /GPRS network architecture & critical interfaces
 Attacks exploiting security loopholes in GSM/GPRS
 Impact of unwanted traffic: viruses, worms, trojans, …
 Testbed setup and testing scenarios
 Methodology: nature of tests possible, what else is needed
 Tools for investigating network security
©Copyright 2005-06
All Rights Reserved APRICOT’06, Perth, Australia, 1-2 March 2006 19
Network Security Investigation
Investigative Tools
Detect Exploit Analyze
 NMAP
 Netcat
 Honeyd
 PackEth
 Snort
 NTOP
©Copyright 2005-06
All Rights Reserved APRICOT’06, Perth, Australia, 1-2 March 2006 21
Tools for Exploiting Vulnerabilities
 HoneyD:
 Creates virtual machines (VMs)
 VMs have unique IP addresses
 Lure attackers to themselves
 Can be Windows or Linux
 PackETH
 Packet generator
 Generates packets of any
protocol - ARP, TCP, UDP, ...
 User configurable pkt. profiles
1
10.129.22.1
Honeypot on
“Windows”
10.129.22.2
Honeypot
on “Linux”
10.129.22.3
Honeypot
on “Solaris”
10.129.22.16
Honeyd
daemon
Attacker
Internet
©Copyright 2005-06
All Rights Reserved APRICOT’06, Perth, Australia, 1-2 March 2006 23
NTOP at Work
Traffic breakdown by hosts seen
Packet size distribution
TCP/UDP distribution by major protocols
©Copyright 2005-06
All Rights Reserved APRICOT’06, Perth, Australia, 1-2 March 2006 24
NMAP and Snort Working in
Conjunction
Attacking m/c: scans using NMAP Exposed m/c: performs analysis via Snort
©Copyright 2005-06
All Rights Reserved APRICOT’06, Perth, Australia, 1-2 March 2006 25
What More is Needed
PS-CN
of other
carrier
Gp
BTS
RNC
RNS
BTS
BSC
BSS
GSM/GPRS
RAN
CS-CN
PS-CNGb
IuPS
BG
…
GGSN
Gn
…
Application
Servers & Proxies
Gi
Internet
Radio Access Network (RAN) Core Network (CN)
Information
Servers
Monitoring pointsUTRAN
SGSN
…
©Copyright 2005-06
All Rights Reserved APRICOT’06, Perth, Australia, 1-2 March 2006 26
Summary
 Cellular infrastructure security … critically important in future
 Analyzed GSM /GPRS from a vulnerability standpoint
 Highlighted key aspects, such as
 Critical interfaces
 Sample attacks
 Effects of unwanted traffic!
 Presented our testbed setup and testing scenarios
 Focused on nature and types of test portfolio
 Reviewed tools and techniques to assess security
©Copyright 2005-06
All Rights Reserved APRICOT’06, Perth, Australia, 1-2 March 2006 28
Glossary (contd.)
PCU Packet Control Unit
PDN Packet Data Network
PSTN Public Switched Telephone Network
RACH Random Access Channel
RAN Radio Access Network
RTT Round Trip Time
SDCCH Slow Dedicated Control Channel
SGSN Serving GPRS Support Node
SMSC Short Messaging Service Center
UMTS Universal Mobile Telecommunication System
UTRAN UMTS Terrestial Radio Access Network
©Copyright 2005-06
All Rights Reserved APRICOT’06, Perth, Australia, 1-2 March 2006 29
Suggested Readings
 H. Yang, F. Ricciato, S. Lu, L. Zhang, “Securing a Wireless World”, Proceedings of the IEEE.
Volume: 94, Issue: 2, pp. 442-454, Feb 2006.
Available: http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1580512
 F. Vacirca, F. Ricciato, R. Pliz, “Large-Scale RTT Measurements from an Operational
UMTS/GPRS Network.”
Available: http://userver.ftw.at/~ricciato/darwin/wicon05-ricciato-metawin.pdf
 Netscreen Technologies Inc,.“GPRS Security Threats and Solutions”, Whitepaper, March
2002.
Available: www.juniper.net/solutions/literature/white-papers/200074.pdf
 W. Enck, P. Traynor, P. McDaniel, T. Porta, ''Exploiting Open Functionality in SMS-Capable
Cellular Networks'', 12th
ACM Conference on Computer and Communications Security, Nov
2005.
Available: www.smsanalysis.org/smsanalysis.pdf
©Copyright 2005-06
All Rights Reserved APRICOT’06, Perth, Australia, 1-2 March 2006 30
Suggested Readings (Contd.)
 E. Barken, E. Biham, N. Keller, ''Instant Ciphertext-Only Cryptanalysis of GSM Encrypted
Communication'', Technion, Computer Science Department, Technical Report CS-2003-05.
Available: http://citeseer.ist.psu.edu/663139.html
 V. Bocan, V. Cretu, ''Security and Denial of Service Threats in GSM Networks'', Periodica
Politechnica, Transactions on Automatic Control and Computer Science, Vol 49 (63), 2004.
Available: www.dataman.ro/phd/conti2004-2.pdf
 P. Stuckman, ''The GSM Evolution'', John Wiley and Sons, 2003, ISBN 0-470-84855.

More Related Content

What's hot

iotmaship - Webinos iot and m2m - allott
iotmaship - Webinos iot and m2m - allottiotmaship - Webinos iot and m2m - allott
iotmaship - Webinos iot and m2m - allottwebinos project
 
Self interference cancellation of full duplex technology in 5G
Self interference cancellation of full duplex technology in 5GSelf interference cancellation of full duplex technology in 5G
Self interference cancellation of full duplex technology in 5G
Rumana Afrose
 
5G Security Briefing
5G Security Briefing5G Security Briefing
5G Security Briefing
3G4G
 
01. Critical Information Infrastructure Protection
01. Critical Information Infrastructure Protection01. Critical Information Infrastructure Protection
01. Critical Information Infrastructure Protection
Directorate of Information Security | Ditjen Aptika
 
5G Security Training
5G Security Training5G Security Training
5G Security Training
Tonex
 
Denial of service attack
Denial of service attackDenial of service attack
Denial of service attack
Rashi Dhagat
 
Securing Critical Iot Infrastructure, IoT Israel 2014
Securing Critical Iot Infrastructure, IoT Israel 2014Securing Critical Iot Infrastructure, IoT Israel 2014
Securing Critical Iot Infrastructure, IoT Israel 2014
iotisrael
 
Building the foundations of Ultra-RELIABLE and Low-LATENCY Wireless Communica...
Building the foundations of Ultra-RELIABLE and Low-LATENCY Wireless Communica...Building the foundations of Ultra-RELIABLE and Low-LATENCY Wireless Communica...
Building the foundations of Ultra-RELIABLE and Low-LATENCY Wireless Communica...
3G4G
 
wireless communication security PPT, presentation
wireless communication security PPT, presentationwireless communication security PPT, presentation
wireless communication security PPT, presentation
Nitesh Dubey
 
Telecom incidents investigation: daily work behind the scenes
Telecom incidents investigation: daily work behind the scenesTelecom incidents investigation: daily work behind the scenes
Telecom incidents investigation: daily work behind the scenes
PositiveTechnologies
 
ADVA launches new aPNT+™ platform to protect critical network infrastructure
ADVA launches new aPNT+™ platform to protect critical network infrastructureADVA launches new aPNT+™ platform to protect critical network infrastructure
ADVA launches new aPNT+™ platform to protect critical network infrastructure
ADVA
 
Alcatel Wimax Whitepaper (quantumwimax.com)
Alcatel Wimax Whitepaper (quantumwimax.com)Alcatel Wimax Whitepaper (quantumwimax.com)
Alcatel Wimax Whitepaper (quantumwimax.com)
Ari Zoldan
 
Drexel 2012 signal analysis using low cost tools - masint v3
Drexel 2012   signal analysis using low cost tools - masint v3Drexel 2012   signal analysis using low cost tools - masint v3
Drexel 2012 signal analysis using low cost tools - masint v3
warezjoe
 
Etsi wp24 mec_deployment_in_4_g_5g_final
Etsi wp24 mec_deployment_in_4_g_5g_finalEtsi wp24 mec_deployment_in_4_g_5g_final
Etsi wp24 mec_deployment_in_4_g_5g_final
Saurabh Verma
 
[CLASS 2014] Palestra Técnica - Delfin Rodillas
[CLASS 2014] Palestra Técnica - Delfin Rodillas[CLASS 2014] Palestra Técnica - Delfin Rodillas
[CLASS 2014] Palestra Técnica - Delfin Rodillas
TI Safe
 
Synchronisation and Time Distribution in Modern Telecommunications Networks
Synchronisation and Time Distribution in Modern Telecommunications NetworksSynchronisation and Time Distribution in Modern Telecommunications Networks
Synchronisation and Time Distribution in Modern Telecommunications Networks
3G4G
 
Grant free iot
Grant free iotGrant free iot
Grant free iot
amin azari
 
Privacy & Security Aspects in Mobile Networks
Privacy & Security Aspects in Mobile NetworksPrivacy & Security Aspects in Mobile Networks
Privacy & Security Aspects in Mobile Networks
DefCamp
 
Fortigate Modelo 90d
Fortigate Modelo 90dFortigate Modelo 90d
Fortigate Modelo 90d
robertogarciargh
 
PhD proposal in KTH, By Amin Azari
PhD proposal in KTH, By Amin AzariPhD proposal in KTH, By Amin Azari
PhD proposal in KTH, By Amin Azari
amin azari
 

What's hot (20)

iotmaship - Webinos iot and m2m - allott
iotmaship - Webinos iot and m2m - allottiotmaship - Webinos iot and m2m - allott
iotmaship - Webinos iot and m2m - allott
 
Self interference cancellation of full duplex technology in 5G
Self interference cancellation of full duplex technology in 5GSelf interference cancellation of full duplex technology in 5G
Self interference cancellation of full duplex technology in 5G
 
5G Security Briefing
5G Security Briefing5G Security Briefing
5G Security Briefing
 
01. Critical Information Infrastructure Protection
01. Critical Information Infrastructure Protection01. Critical Information Infrastructure Protection
01. Critical Information Infrastructure Protection
 
5G Security Training
5G Security Training5G Security Training
5G Security Training
 
Denial of service attack
Denial of service attackDenial of service attack
Denial of service attack
 
Securing Critical Iot Infrastructure, IoT Israel 2014
Securing Critical Iot Infrastructure, IoT Israel 2014Securing Critical Iot Infrastructure, IoT Israel 2014
Securing Critical Iot Infrastructure, IoT Israel 2014
 
Building the foundations of Ultra-RELIABLE and Low-LATENCY Wireless Communica...
Building the foundations of Ultra-RELIABLE and Low-LATENCY Wireless Communica...Building the foundations of Ultra-RELIABLE and Low-LATENCY Wireless Communica...
Building the foundations of Ultra-RELIABLE and Low-LATENCY Wireless Communica...
 
wireless communication security PPT, presentation
wireless communication security PPT, presentationwireless communication security PPT, presentation
wireless communication security PPT, presentation
 
Telecom incidents investigation: daily work behind the scenes
Telecom incidents investigation: daily work behind the scenesTelecom incidents investigation: daily work behind the scenes
Telecom incidents investigation: daily work behind the scenes
 
ADVA launches new aPNT+™ platform to protect critical network infrastructure
ADVA launches new aPNT+™ platform to protect critical network infrastructureADVA launches new aPNT+™ platform to protect critical network infrastructure
ADVA launches new aPNT+™ platform to protect critical network infrastructure
 
Alcatel Wimax Whitepaper (quantumwimax.com)
Alcatel Wimax Whitepaper (quantumwimax.com)Alcatel Wimax Whitepaper (quantumwimax.com)
Alcatel Wimax Whitepaper (quantumwimax.com)
 
Drexel 2012 signal analysis using low cost tools - masint v3
Drexel 2012   signal analysis using low cost tools - masint v3Drexel 2012   signal analysis using low cost tools - masint v3
Drexel 2012 signal analysis using low cost tools - masint v3
 
Etsi wp24 mec_deployment_in_4_g_5g_final
Etsi wp24 mec_deployment_in_4_g_5g_finalEtsi wp24 mec_deployment_in_4_g_5g_final
Etsi wp24 mec_deployment_in_4_g_5g_final
 
[CLASS 2014] Palestra Técnica - Delfin Rodillas
[CLASS 2014] Palestra Técnica - Delfin Rodillas[CLASS 2014] Palestra Técnica - Delfin Rodillas
[CLASS 2014] Palestra Técnica - Delfin Rodillas
 
Synchronisation and Time Distribution in Modern Telecommunications Networks
Synchronisation and Time Distribution in Modern Telecommunications NetworksSynchronisation and Time Distribution in Modern Telecommunications Networks
Synchronisation and Time Distribution in Modern Telecommunications Networks
 
Grant free iot
Grant free iotGrant free iot
Grant free iot
 
Privacy & Security Aspects in Mobile Networks
Privacy & Security Aspects in Mobile NetworksPrivacy & Security Aspects in Mobile Networks
Privacy & Security Aspects in Mobile Networks
 
Fortigate Modelo 90d
Fortigate Modelo 90dFortigate Modelo 90d
Fortigate Modelo 90d
 
PhD proposal in KTH, By Amin Azari
PhD proposal in KTH, By Amin AzariPhD proposal in KTH, By Amin Azari
PhD proposal in KTH, By Amin Azari
 

Similar to Network Infrastructure Security in Cellular Data Networks: An Initial Investigation

SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATIONSECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
Editor IJMTER
 
IRJET- Gray-Hole Attack Minimization based on contradiction for ad-hoc networks
IRJET- Gray-Hole Attack Minimization based on contradiction for ad-hoc networksIRJET- Gray-Hole Attack Minimization based on contradiction for ad-hoc networks
IRJET- Gray-Hole Attack Minimization based on contradiction for ad-hoc networks
IRJET Journal
 
Passive monitoring to build Situational Awareness
Passive monitoring to build Situational AwarenessPassive monitoring to build Situational Awareness
Passive monitoring to build Situational AwarenessDavid Sweigert
 
Enhancing Data Transmission and Protection in Wireless Sensor Node- A Review
Enhancing Data Transmission and Protection in Wireless Sensor Node- A ReviewEnhancing Data Transmission and Protection in Wireless Sensor Node- A Review
Enhancing Data Transmission and Protection in Wireless Sensor Node- A Review
IRJET Journal
 
IRJET- Security Analysis and Improvements to IoT Communication Protocols ...
IRJET-  	  Security Analysis and Improvements to IoT Communication Protocols ...IRJET-  	  Security Analysis and Improvements to IoT Communication Protocols ...
IRJET- Security Analysis and Improvements to IoT Communication Protocols ...
IRJET Journal
 
Protocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its SecurityProtocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its Security
IJERA Editor
 
A Survey Paper on Jamming Attacks and its Countermeasures in Wireless Networks
A Survey Paper on Jamming Attacks and its Countermeasures in Wireless NetworksA Survey Paper on Jamming Attacks and its Countermeasures in Wireless Networks
A Survey Paper on Jamming Attacks and its Countermeasures in Wireless Networks
IRJET Journal
 
A-SURVEY SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORK
A-SURVEY SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKA-SURVEY SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORK
A-SURVEY SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORK
Editor IJMTER
 
Widyatama Lecture Applied Networking IV Week06 Mobile Security 2
Widyatama Lecture Applied Networking IV Week06 Mobile Security 2Widyatama Lecture Applied Networking IV Week06 Mobile Security 2
Widyatama Lecture Applied Networking IV Week06 Mobile Security 2
Djadja Sardjana
 
EVALUATION OF SECURITY ATTACKS ON UMTS AUTHENTICATION MECHANISM
EVALUATION OF SECURITY ATTACKS ON UMTS AUTHENTICATION MECHANISMEVALUATION OF SECURITY ATTACKS ON UMTS AUTHENTICATION MECHANISM
EVALUATION OF SECURITY ATTACKS ON UMTS AUTHENTICATION MECHANISM
IJNSA Journal
 
LTE protocol exploits – IMSI catchers, blocking devices and location leaks - ...
LTE protocol exploits – IMSI catchers, blocking devices and location leaks - ...LTE protocol exploits – IMSI catchers, blocking devices and location leaks - ...
LTE protocol exploits – IMSI catchers, blocking devices and location leaks - ...
EC-Council
 
A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless N...
A Rouge Relay Node Attack Detection and Prevention  in 4G Multihop Wireless N...A Rouge Relay Node Attack Detection and Prevention  in 4G Multihop Wireless N...
A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless N...
IRJET Journal
 
CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...
CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...
CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...
TI Safe
 
EWSN'15 Industry Session - Francesco Flammini (Ansaldo STS)
EWSN'15 Industry Session - Francesco Flammini (Ansaldo STS)EWSN'15 Industry Session - Francesco Flammini (Ansaldo STS)
EWSN'15 Industry Session - Francesco Flammini (Ansaldo STS)
Francesco Flammini
 
Fundamentals of ethernet ip osi and cip
Fundamentals of ethernet ip osi and cipFundamentals of ethernet ip osi and cip
Fundamentals of ethernet ip osi and cipRoutecoMarketing
 
Analyze and Detect Packet Loss for Data Transmission in WSN
Analyze and Detect Packet Loss for Data Transmission in WSNAnalyze and Detect Packet Loss for Data Transmission in WSN
Analyze and Detect Packet Loss for Data Transmission in WSN
IJERA Editor
 
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKS
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKSCOMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKS
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKS
IJNSA Journal
 
7215nsa05
7215nsa057215nsa05
Security course: exclusive 5G SA pitfalls and new changes to legislation
Security course: exclusive 5G SA pitfalls and new changes to legislationSecurity course: exclusive 5G SA pitfalls and new changes to legislation
Security course: exclusive 5G SA pitfalls and new changes to legislation
PositiveTechnologies
 
Comprehensive survey of possible
Comprehensive survey of possibleComprehensive survey of possible
Comprehensive survey of possible
IJNSA Journal
 

Similar to Network Infrastructure Security in Cellular Data Networks: An Initial Investigation (20)

SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATIONSECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
 
IRJET- Gray-Hole Attack Minimization based on contradiction for ad-hoc networks
IRJET- Gray-Hole Attack Minimization based on contradiction for ad-hoc networksIRJET- Gray-Hole Attack Minimization based on contradiction for ad-hoc networks
IRJET- Gray-Hole Attack Minimization based on contradiction for ad-hoc networks
 
Passive monitoring to build Situational Awareness
Passive monitoring to build Situational AwarenessPassive monitoring to build Situational Awareness
Passive monitoring to build Situational Awareness
 
Enhancing Data Transmission and Protection in Wireless Sensor Node- A Review
Enhancing Data Transmission and Protection in Wireless Sensor Node- A ReviewEnhancing Data Transmission and Protection in Wireless Sensor Node- A Review
Enhancing Data Transmission and Protection in Wireless Sensor Node- A Review
 
IRJET- Security Analysis and Improvements to IoT Communication Protocols ...
IRJET-  	  Security Analysis and Improvements to IoT Communication Protocols ...IRJET-  	  Security Analysis and Improvements to IoT Communication Protocols ...
IRJET- Security Analysis and Improvements to IoT Communication Protocols ...
 
Protocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its SecurityProtocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its Security
 
A Survey Paper on Jamming Attacks and its Countermeasures in Wireless Networks
A Survey Paper on Jamming Attacks and its Countermeasures in Wireless NetworksA Survey Paper on Jamming Attacks and its Countermeasures in Wireless Networks
A Survey Paper on Jamming Attacks and its Countermeasures in Wireless Networks
 
A-SURVEY SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORK
A-SURVEY SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKA-SURVEY SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORK
A-SURVEY SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORK
 
Widyatama Lecture Applied Networking IV Week06 Mobile Security 2
Widyatama Lecture Applied Networking IV Week06 Mobile Security 2Widyatama Lecture Applied Networking IV Week06 Mobile Security 2
Widyatama Lecture Applied Networking IV Week06 Mobile Security 2
 
EVALUATION OF SECURITY ATTACKS ON UMTS AUTHENTICATION MECHANISM
EVALUATION OF SECURITY ATTACKS ON UMTS AUTHENTICATION MECHANISMEVALUATION OF SECURITY ATTACKS ON UMTS AUTHENTICATION MECHANISM
EVALUATION OF SECURITY ATTACKS ON UMTS AUTHENTICATION MECHANISM
 
LTE protocol exploits – IMSI catchers, blocking devices and location leaks - ...
LTE protocol exploits – IMSI catchers, blocking devices and location leaks - ...LTE protocol exploits – IMSI catchers, blocking devices and location leaks - ...
LTE protocol exploits – IMSI catchers, blocking devices and location leaks - ...
 
A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless N...
A Rouge Relay Node Attack Detection and Prevention  in 4G Multihop Wireless N...A Rouge Relay Node Attack Detection and Prevention  in 4G Multihop Wireless N...
A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless N...
 
CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...
CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...
CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...
 
EWSN'15 Industry Session - Francesco Flammini (Ansaldo STS)
EWSN'15 Industry Session - Francesco Flammini (Ansaldo STS)EWSN'15 Industry Session - Francesco Flammini (Ansaldo STS)
EWSN'15 Industry Session - Francesco Flammini (Ansaldo STS)
 
Fundamentals of ethernet ip osi and cip
Fundamentals of ethernet ip osi and cipFundamentals of ethernet ip osi and cip
Fundamentals of ethernet ip osi and cip
 
Analyze and Detect Packet Loss for Data Transmission in WSN
Analyze and Detect Packet Loss for Data Transmission in WSNAnalyze and Detect Packet Loss for Data Transmission in WSN
Analyze and Detect Packet Loss for Data Transmission in WSN
 
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKS
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKSCOMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKS
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKS
 
7215nsa05
7215nsa057215nsa05
7215nsa05
 
Security course: exclusive 5G SA pitfalls and new changes to legislation
Security course: exclusive 5G SA pitfalls and new changes to legislationSecurity course: exclusive 5G SA pitfalls and new changes to legislation
Security course: exclusive 5G SA pitfalls and new changes to legislation
 
Comprehensive survey of possible
Comprehensive survey of possibleComprehensive survey of possible
Comprehensive survey of possible
 

More from Vishal Sharma, Ph.D.

Intellectual Property Challenges and IoT
Intellectual Property Challenges and IoTIntellectual Property Challenges and IoT
Intellectual Property Challenges and IoT
Vishal Sharma, Ph.D.
 
7 Keys to Accelerate Profits by Partnering with Metanoia, Inc.
7 Keys to Accelerate Profits by Partnering with Metanoia, Inc.7 Keys to Accelerate Profits by Partnering with Metanoia, Inc.
7 Keys to Accelerate Profits by Partnering with Metanoia, Inc.Vishal Sharma, Ph.D.
 
A New Analysis for Wavelength Translation in Regular WDM Networks
A New Analysis for Wavelength Translation in Regular WDM NetworksA New Analysis for Wavelength Translation in Regular WDM Networks
A New Analysis for Wavelength Translation in Regular WDM Networks
Vishal Sharma, Ph.D.
 
Architectural Options for Metro Carrier-Ethernet Network Buildout: Analysis &...
Architectural Options for Metro Carrier-Ethernet Network Buildout: Analysis &...Architectural Options for Metro Carrier-Ethernet Network Buildout: Analysis &...
Architectural Options for Metro Carrier-Ethernet Network Buildout: Analysis &...
Vishal Sharma, Ph.D.
 
Nanog panel carrier-network-health_vishal_8-5-12
Nanog panel carrier-network-health_vishal_8-5-12Nanog panel carrier-network-health_vishal_8-5-12
Nanog panel carrier-network-health_vishal_8-5-12
Vishal Sharma, Ph.D.
 
Capacity Planning Panel - Operator and Eco-System Player Discourse
Capacity Planning Panel - Operator and Eco-System Player DiscourseCapacity Planning Panel - Operator and Eco-System Player Discourse
Capacity Planning Panel - Operator and Eco-System Player Discourse
Vishal Sharma, Ph.D.
 
Illuminating Optical Ethernet Networks!
Illuminating Optical Ethernet Networks!Illuminating Optical Ethernet Networks!
Illuminating Optical Ethernet Networks!
Vishal Sharma, Ph.D.
 
Internet Routing Protocols: Fundamental Concepts of Distance-Vector and Link-...
Internet Routing Protocols: Fundamental Concepts of Distance-Vector and Link-...Internet Routing Protocols: Fundamental Concepts of Distance-Vector and Link-...
Internet Routing Protocols: Fundamental Concepts of Distance-Vector and Link-...
Vishal Sharma, Ph.D.
 
Modern Carrier Strategies for Traffic Engineering
Modern Carrier Strategies for Traffic EngineeringModern Carrier Strategies for Traffic Engineering
Modern Carrier Strategies for Traffic Engineering
Vishal Sharma, Ph.D.
 
Approaches to Designing a High-Performance Switch Router
Approaches to Designing a High-Performance Switch RouterApproaches to Designing a High-Performance Switch Router
Approaches to Designing a High-Performance Switch Router
Vishal Sharma, Ph.D.
 
Multi-Protocol Lambda Switching: The Role of IP Technologies in Controlling a...
Multi-Protocol Lambda Switching: The Role of IP Technologies in Controlling a...Multi-Protocol Lambda Switching: The Role of IP Technologies in Controlling a...
Multi-Protocol Lambda Switching: The Role of IP Technologies in Controlling a...
Vishal Sharma, Ph.D.
 
Design Considerations for Converged Optical Ethernet Networks
Design Considerations for Converged Optical Ethernet NetworksDesign Considerations for Converged Optical Ethernet Networks
Design Considerations for Converged Optical Ethernet Networks
Vishal Sharma, Ph.D.
 
Elements of Cross-Layer System & Network Design for QoS-Enabled Wi-Max Networks
Elements of Cross-Layer System & Network Design for QoS-Enabled Wi-Max Networks Elements of Cross-Layer System & Network Design for QoS-Enabled Wi-Max Networks
Elements of Cross-Layer System & Network Design for QoS-Enabled Wi-Max Networks
Vishal Sharma, Ph.D.
 
Metro ethernet metanoiainc-next-gen-workshop_2007-07-17
Metro ethernet metanoiainc-next-gen-workshop_2007-07-17Metro ethernet metanoiainc-next-gen-workshop_2007-07-17
Metro ethernet metanoiainc-next-gen-workshop_2007-07-17
Vishal Sharma, Ph.D.
 
Pbt article packet-optical-integration_vishal_05-08-12
Pbt article packet-optical-integration_vishal_05-08-12Pbt article packet-optical-integration_vishal_05-08-12
Pbt article packet-optical-integration_vishal_05-08-12
Vishal Sharma, Ph.D.
 
Packet-Optical Integration: The Key to Evolving Towards Packet Enabled Agile ...
Packet-Optical Integration: The Key to Evolving Towards Packet Enabled Agile ...Packet-Optical Integration: The Key to Evolving Towards Packet Enabled Agile ...
Packet-Optical Integration: The Key to Evolving Towards Packet Enabled Agile ...
Vishal Sharma, Ph.D.
 
Understanding Intelligent Military-Grade Optical Ethernet Networks: A Versati...
Understanding Intelligent Military-Grade Optical Ethernet Networks: A Versati...Understanding Intelligent Military-Grade Optical Ethernet Networks: A Versati...
Understanding Intelligent Military-Grade Optical Ethernet Networks: A Versati...
Vishal Sharma, Ph.D.
 
Demystifying optical ethernet networks
Demystifying optical ethernet networksDemystifying optical ethernet networks
Demystifying optical ethernet networksVishal Sharma, Ph.D.
 
A Survey of Recent Advances in Network Planning/Traffic Engineering (TE) Tools
A Survey of Recent Advances in Network Planning/Traffic Engineering (TE) ToolsA Survey of Recent Advances in Network Planning/Traffic Engineering (TE) Tools
A Survey of Recent Advances in Network Planning/Traffic Engineering (TE) Tools
Vishal Sharma, Ph.D.
 
Carrier Strategies for Backbone Traffic Engineering and QoS
Carrier Strategies for Backbone Traffic Engineering and QoSCarrier Strategies for Backbone Traffic Engineering and QoS
Carrier Strategies for Backbone Traffic Engineering and QoS
Vishal Sharma, Ph.D.
 

More from Vishal Sharma, Ph.D. (20)

Intellectual Property Challenges and IoT
Intellectual Property Challenges and IoTIntellectual Property Challenges and IoT
Intellectual Property Challenges and IoT
 
7 Keys to Accelerate Profits by Partnering with Metanoia, Inc.
7 Keys to Accelerate Profits by Partnering with Metanoia, Inc.7 Keys to Accelerate Profits by Partnering with Metanoia, Inc.
7 Keys to Accelerate Profits by Partnering with Metanoia, Inc.
 
A New Analysis for Wavelength Translation in Regular WDM Networks
A New Analysis for Wavelength Translation in Regular WDM NetworksA New Analysis for Wavelength Translation in Regular WDM Networks
A New Analysis for Wavelength Translation in Regular WDM Networks
 
Architectural Options for Metro Carrier-Ethernet Network Buildout: Analysis &...
Architectural Options for Metro Carrier-Ethernet Network Buildout: Analysis &...Architectural Options for Metro Carrier-Ethernet Network Buildout: Analysis &...
Architectural Options for Metro Carrier-Ethernet Network Buildout: Analysis &...
 
Nanog panel carrier-network-health_vishal_8-5-12
Nanog panel carrier-network-health_vishal_8-5-12Nanog panel carrier-network-health_vishal_8-5-12
Nanog panel carrier-network-health_vishal_8-5-12
 
Capacity Planning Panel - Operator and Eco-System Player Discourse
Capacity Planning Panel - Operator and Eco-System Player DiscourseCapacity Planning Panel - Operator and Eco-System Player Discourse
Capacity Planning Panel - Operator and Eco-System Player Discourse
 
Illuminating Optical Ethernet Networks!
Illuminating Optical Ethernet Networks!Illuminating Optical Ethernet Networks!
Illuminating Optical Ethernet Networks!
 
Internet Routing Protocols: Fundamental Concepts of Distance-Vector and Link-...
Internet Routing Protocols: Fundamental Concepts of Distance-Vector and Link-...Internet Routing Protocols: Fundamental Concepts of Distance-Vector and Link-...
Internet Routing Protocols: Fundamental Concepts of Distance-Vector and Link-...
 
Modern Carrier Strategies for Traffic Engineering
Modern Carrier Strategies for Traffic EngineeringModern Carrier Strategies for Traffic Engineering
Modern Carrier Strategies for Traffic Engineering
 
Approaches to Designing a High-Performance Switch Router
Approaches to Designing a High-Performance Switch RouterApproaches to Designing a High-Performance Switch Router
Approaches to Designing a High-Performance Switch Router
 
Multi-Protocol Lambda Switching: The Role of IP Technologies in Controlling a...
Multi-Protocol Lambda Switching: The Role of IP Technologies in Controlling a...Multi-Protocol Lambda Switching: The Role of IP Technologies in Controlling a...
Multi-Protocol Lambda Switching: The Role of IP Technologies in Controlling a...
 
Design Considerations for Converged Optical Ethernet Networks
Design Considerations for Converged Optical Ethernet NetworksDesign Considerations for Converged Optical Ethernet Networks
Design Considerations for Converged Optical Ethernet Networks
 
Elements of Cross-Layer System & Network Design for QoS-Enabled Wi-Max Networks
Elements of Cross-Layer System & Network Design for QoS-Enabled Wi-Max Networks Elements of Cross-Layer System & Network Design for QoS-Enabled Wi-Max Networks
Elements of Cross-Layer System & Network Design for QoS-Enabled Wi-Max Networks
 
Metro ethernet metanoiainc-next-gen-workshop_2007-07-17
Metro ethernet metanoiainc-next-gen-workshop_2007-07-17Metro ethernet metanoiainc-next-gen-workshop_2007-07-17
Metro ethernet metanoiainc-next-gen-workshop_2007-07-17
 
Pbt article packet-optical-integration_vishal_05-08-12
Pbt article packet-optical-integration_vishal_05-08-12Pbt article packet-optical-integration_vishal_05-08-12
Pbt article packet-optical-integration_vishal_05-08-12
 
Packet-Optical Integration: The Key to Evolving Towards Packet Enabled Agile ...
Packet-Optical Integration: The Key to Evolving Towards Packet Enabled Agile ...Packet-Optical Integration: The Key to Evolving Towards Packet Enabled Agile ...
Packet-Optical Integration: The Key to Evolving Towards Packet Enabled Agile ...
 
Understanding Intelligent Military-Grade Optical Ethernet Networks: A Versati...
Understanding Intelligent Military-Grade Optical Ethernet Networks: A Versati...Understanding Intelligent Military-Grade Optical Ethernet Networks: A Versati...
Understanding Intelligent Military-Grade Optical Ethernet Networks: A Versati...
 
Demystifying optical ethernet networks
Demystifying optical ethernet networksDemystifying optical ethernet networks
Demystifying optical ethernet networks
 
A Survey of Recent Advances in Network Planning/Traffic Engineering (TE) Tools
A Survey of Recent Advances in Network Planning/Traffic Engineering (TE) ToolsA Survey of Recent Advances in Network Planning/Traffic Engineering (TE) Tools
A Survey of Recent Advances in Network Planning/Traffic Engineering (TE) Tools
 
Carrier Strategies for Backbone Traffic Engineering and QoS
Carrier Strategies for Backbone Traffic Engineering and QoSCarrier Strategies for Backbone Traffic Engineering and QoS
Carrier Strategies for Backbone Traffic Engineering and QoS
 

Recently uploaded

Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 

Recently uploaded (20)

Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 

Network Infrastructure Security in Cellular Data Networks: An Initial Investigation

  • 1. Network Infrastructure SecurityNetwork Infrastructure Security in Cellular Data Networks: Anin Cellular Data Networks: An Initial InvestigationInitial Investigation Kavita Barapatre, Nirlesh Koshta, Vishal Sharma IIT Bombay, Mumbai, India and Fabio Ricciato Forschungszentrum Telekommunikation Wien (FTW), Vienna, Austria © Copyright 2005-06 All Rights Reserved
  • 2. ©Copyright 2005-06 All Rights Reserved APRICOT’06, Perth, Australia, 1-2 March 2006 2 Outline of the Talk  Motivation – why worry about infrastructure security?  GSM /GPRS network architecture & critical interfaces  Attacks exploiting security loopholes in GSM/GPRS  Impact of unwanted traffic: viruses, worms, trojans, …  Testbed setup and testing scenarios  Methodology: nature of tests possible, what else is needed  Tools for investigating network security
  • 3. ©Copyright 2005-06 All Rights Reserved APRICOT’06, Perth, Australia, 1-2 March 2006 3 Outline of the Talk  Motivation – why worry about infrastructure security?  GSM /GPRS network architecture & critical interfaces  Attacks exploiting security loopholes in GSM/GPRS  Impact of unwanted traffic: viruses, worms, trojans, …  Testbed setup and testing scenarios  Methodology: nature of tests possible, what else is needed  Tools for investigating network security
  • 4. ©Copyright 2005-06 All Rights Reserved APRICOT’06, Perth, Australia, 1-2 March 2006 4 Why Infrastructure Security ? Network Security Information Security Infrastructure Security - Keeping user’s info. protected - Subject of cryptography - Not subject of this talk - Sustaining ability of network elements to provide connectivity between communicating entities - Subject of this talk Cellular GSM/CDMA networks moving to an IP core …  Network increasingly open  Control/data segregation inherently less stringent  Increased threats! … Exposure to wireline-like security risks
  • 5. ©Copyright 2005-06 All Rights Reserved APRICOT’06, Perth, Australia, 1-2 March 2006 5 Motivation (contd)  Interplay of IP and complex structure of cellular networks ⇒ Gives rise to subtle phenomena … … that may not be easily conceived ⇒ Need to be found empirically via intelligent experimentation  Provider infrastructure security becomes key, imperative to …  Investigate susceptibilities and risks  Evaluate options, fixes, and solutions  Propose techniques and tools for proactive/reactive action
  • 6. ©Copyright 2005-06 All Rights Reserved APRICOT’06, Perth, Australia, 1-2 March 2006 6 Outline of the Talk  Motivation – why worry about infrastructure security?  GSM /GPRS network architecture & critical interfaces  Attacks exploiting security loopholes in GSM/GPRS  Impact of unwanted traffic: viruses, worms, trojans, …  Testbed setup and testing scenarios  Methodology: nature of tests possible, what else is needed  Tools for investigating network security
  • 7. ©Copyright 2005-06 All Rights Reserved APRICOT’06, Perth, Australia, 1-2 March 2006 7 GSM Network Architecture
  • 8. ©Copyright 2005-06 All Rights Reserved APRICOT’06, Perth, Australia, 1-2 March 2006 9 A Signaling Channel DoS Attack in GSM BSC MSC Channel Required Immediate Assign Air Interface Abis Interface A Intf. MS BTS Channel Request RACH Channel Active AGCH Immediate Assign Command SDCCH Malicious MS now repeats exercise Signaling channels end up assigned & “lockout” genuine MSs Channel Active ACK SDCCH
  • 9. ©Copyright 2005-06 All Rights Reserved APRICOT’06, Perth, Australia, 1-2 March 2006 10 GPRS Network Architecture
  • 10. ©Copyright 2005-06 All Rights Reserved APRICOT’06, Perth, Australia, 1-2 March 2006 12 A DCH “Lockout” Attack in GPRS 2.5G/3G Provider’s Core Network 2.5G/3G Provider’s Core Network Internet BG Other 2.5G/3G CN Other 2.5G/3G CN MS with open PDP context & IP address Small IP pkt. at rate R > 1/T DCH never released! External Agent T = DCH release/dynamic reassignment timeout GSM/GPRS RAN UMTS RAN With multiple DCHs occupied, logical radio resources wasted  Congestion in cell  Lockout of genuine MSs
  • 11. ©Copyright 2005-06 All Rights Reserved APRICOT’06, Perth, Australia, 1-2 March 2006 13 Impact of Unwanted Traffic: Viruses, worms, trojans, … 2.5G/3G Provider’s Core Network 2.5G/3G Provider’s Core Network Internet Gi Firewall Internet BG Other 2.5G/3G CN Other 2.5G/3G CN External Agent GSM/GPRS RAN UMTS RAN - Attacker can be inside your n/w! - Consider effect of large infections! - Viruses/worms from Internet detected in 3G core networks
  • 12. ©Copyright 2005-06 All Rights Reserved APRICOT’06, Perth, Australia, 1-2 March 2006 14 Outline of the Talk  Motivation – why worry about infrastructure security?  GSM /GPRS network architecture & critical interfaces  Attacks exploiting security loopholes in GSM/GPRS  Impact of unwanted traffic: viruses, worms, trojans, …  Testbed setup and testing scenarios  Methodology: nature of tests possible, what else is needed  Tools for investigating network security
  • 13. ©Copyright 2005-06 All Rights Reserved APRICOT’06, Perth, Australia, 1-2 March 2006 15 Experimental Test-bed Setup & Testing Scenarios Testing can be:  Intra-provider  Inter-provider (CDMA-GSM)  Wireless-wireline
  • 14. ©Copyright 2005-06 All Rights Reserved APRICOT’06, Perth, Australia, 1-2 March 2006 16 Outline of the Talk  Motivation – why worry about infrastructure security?  GSM /GPRS network architecture & critical interfaces  Attacks exploiting security loopholes in GSM/GPRS  Impact of unwanted traffic: viruses, worms, trojans, …  Testbed setup and testing scenarios  Methodology: nature of tests possible, what else is needed  Tools for investigating network security
  • 15. ©Copyright 2005-06 All Rights Reserved APRICOT’06, Perth, Australia, 1-2 March 2006 17 Testing Methodology Active Probing Direct malicious generated traffic to SP’s network or to a remote m/c on network. E.g.  SYN attack  Tear-drop attack  Smurf attack Exploit various types of commun.  Port-to-port  IP address spoofing Infer network parameters: RTT, buffers Passive Listening Provoke remote attacker(s) to attack m/c under observation Invoke attacks, HoneyD as “bait”  Run intrusion detection systems on attacked m/c  Apply intelligent algorithms for proactive threat inference Taxonomy of Tests
  • 16. ©Copyright 2005-06 All Rights Reserved APRICOT’06, Perth, Australia, 1-2 March 2006 18 Outline of the Talk  Motivation – why worry about infrastructure security?  GSM /GPRS network architecture & critical interfaces  Attacks exploiting security loopholes in GSM/GPRS  Impact of unwanted traffic: viruses, worms, trojans, …  Testbed setup and testing scenarios  Methodology: nature of tests possible, what else is needed  Tools for investigating network security
  • 17. ©Copyright 2005-06 All Rights Reserved APRICOT’06, Perth, Australia, 1-2 March 2006 19 Network Security Investigation Investigative Tools Detect Exploit Analyze  NMAP  Netcat  Honeyd  PackEth  Snort  NTOP
  • 18. ©Copyright 2005-06 All Rights Reserved APRICOT’06, Perth, Australia, 1-2 March 2006 21 Tools for Exploiting Vulnerabilities  HoneyD:  Creates virtual machines (VMs)  VMs have unique IP addresses  Lure attackers to themselves  Can be Windows or Linux  PackETH  Packet generator  Generates packets of any protocol - ARP, TCP, UDP, ...  User configurable pkt. profiles 1 10.129.22.1 Honeypot on “Windows” 10.129.22.2 Honeypot on “Linux” 10.129.22.3 Honeypot on “Solaris” 10.129.22.16 Honeyd daemon Attacker Internet
  • 19. ©Copyright 2005-06 All Rights Reserved APRICOT’06, Perth, Australia, 1-2 March 2006 23 NTOP at Work Traffic breakdown by hosts seen Packet size distribution TCP/UDP distribution by major protocols
  • 20. ©Copyright 2005-06 All Rights Reserved APRICOT’06, Perth, Australia, 1-2 March 2006 24 NMAP and Snort Working in Conjunction Attacking m/c: scans using NMAP Exposed m/c: performs analysis via Snort
  • 21. ©Copyright 2005-06 All Rights Reserved APRICOT’06, Perth, Australia, 1-2 March 2006 25 What More is Needed PS-CN of other carrier Gp BTS RNC RNS BTS BSC BSS GSM/GPRS RAN CS-CN PS-CNGb IuPS BG … GGSN Gn … Application Servers & Proxies Gi Internet Radio Access Network (RAN) Core Network (CN) Information Servers Monitoring pointsUTRAN SGSN …
  • 22. ©Copyright 2005-06 All Rights Reserved APRICOT’06, Perth, Australia, 1-2 March 2006 26 Summary  Cellular infrastructure security … critically important in future  Analyzed GSM /GPRS from a vulnerability standpoint  Highlighted key aspects, such as  Critical interfaces  Sample attacks  Effects of unwanted traffic!  Presented our testbed setup and testing scenarios  Focused on nature and types of test portfolio  Reviewed tools and techniques to assess security
  • 23. ©Copyright 2005-06 All Rights Reserved APRICOT’06, Perth, Australia, 1-2 March 2006 28 Glossary (contd.) PCU Packet Control Unit PDN Packet Data Network PSTN Public Switched Telephone Network RACH Random Access Channel RAN Radio Access Network RTT Round Trip Time SDCCH Slow Dedicated Control Channel SGSN Serving GPRS Support Node SMSC Short Messaging Service Center UMTS Universal Mobile Telecommunication System UTRAN UMTS Terrestial Radio Access Network
  • 24. ©Copyright 2005-06 All Rights Reserved APRICOT’06, Perth, Australia, 1-2 March 2006 29 Suggested Readings  H. Yang, F. Ricciato, S. Lu, L. Zhang, “Securing a Wireless World”, Proceedings of the IEEE. Volume: 94, Issue: 2, pp. 442-454, Feb 2006. Available: http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1580512  F. Vacirca, F. Ricciato, R. Pliz, “Large-Scale RTT Measurements from an Operational UMTS/GPRS Network.” Available: http://userver.ftw.at/~ricciato/darwin/wicon05-ricciato-metawin.pdf  Netscreen Technologies Inc,.“GPRS Security Threats and Solutions”, Whitepaper, March 2002. Available: www.juniper.net/solutions/literature/white-papers/200074.pdf  W. Enck, P. Traynor, P. McDaniel, T. Porta, ''Exploiting Open Functionality in SMS-Capable Cellular Networks'', 12th ACM Conference on Computer and Communications Security, Nov 2005. Available: www.smsanalysis.org/smsanalysis.pdf
  • 25. ©Copyright 2005-06 All Rights Reserved APRICOT’06, Perth, Australia, 1-2 March 2006 30 Suggested Readings (Contd.)  E. Barken, E. Biham, N. Keller, ''Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication'', Technion, Computer Science Department, Technical Report CS-2003-05. Available: http://citeseer.ist.psu.edu/663139.html  V. Bocan, V. Cretu, ''Security and Denial of Service Threats in GSM Networks'', Periodica Politechnica, Transactions on Automatic Control and Computer Science, Vol 49 (63), 2004. Available: www.dataman.ro/phd/conti2004-2.pdf  P. Stuckman, ''The GSM Evolution'', John Wiley and Sons, 2003, ISBN 0-470-84855.

Editor's Notes

  1. Security in cellular networks critical due to … - Open access medium - Limited bandwidth - Complex cellular architecture