SlideShare a Scribd company logo
1 of 1
Download to read offline
S
i
g
n
a
l
l
i
n
gF
i
r
e
wa
l
l
s
:
T
h
ef
i
r
s
t
l
i
n
eo
f
d
e
f
e
n
c
ef
o
r
t
e
l
c
o
s
.
B
u
t
a
r
et
h
e
ye
n
o
u
g
h
?
8
0
%
O
f
s
i
g
n
a
l
l
i
n
gn
e
t
wo
r
k
s
a
r
ev
u
l
n
e
r
a
b
l
e
d
e
s
p
i
t
ef
i
r
e
wa
l
l
(
F
W)
p
r
e
s
e
n
c
e
1
O
f
t
h
ed
i
s
t
r
i
b
u
t
e
dd
e
n
i
a
l
-
o
f
-
s
e
r
v
i
c
ea
t
t
a
c
k
s
t
a
r
g
e
t
e
dC
S
P
s
2
B
i
l
l
i
o
ni
ng
l
o
b
a
l
r
e
v
e
n
u
el
o
s
s
e
s
t
ot
h
e
t
e
l
e
c
o
m i
n
d
u
s
t
r
yd
u
et
ot
e
l
e
c
o
m f
r
a
u
d
3
Ma
j
o
r
t
e
l
e
c
o
m s
e
c
u
r
i
t
yi
n
c
i
d
e
n
t
s
a
c
r
o
s
s
E
u
r
o
p
ei
n2
0
1
9
;
r
e
s
u
l
t
i
n
gi
nat
o
t
a
l
i
mp
a
c
t
o
f
a
l
mo
s
t
1
b
i
l
l
i
o
nu
s
e
r
h
o
u
r
s
l
o
s
t
4
6
5
%
1
5
3
$
2
8
.
3
C
l
e
a
r
l
y
,
l
e
g
a
c
yS
i
g
n
a
l
l
i
n
gF
i
r
e
wa
l
l
s
c
a
n
n
o
t
p
r
o
t
e
c
t
y
o
u
r
c
o
r
en
e
t
wo
r
ka
g
a
i
n
s
t
a
d
v
a
n
c
e
d
,
s
o
p
h
i
s
t
i
c
a
t
e
dt
h
r
e
a
t
s
.
H
o
wd
oy
o
ut
h
e
ne
n
s
u
r
e
c
o
mp
r
e
h
e
n
s
i
v
es
i
g
n
a
l
l
i
n
gs
e
c
u
r
i
t
y
?
I
t
’
s
t
i
mef
o
r
c
h
a
n
g
e
:
G
a
i
nf
u
l
l
v
i
s
i
b
i
l
i
t
ya
n
dr
e
a
l
-
t
i
me
mo
n
i
t
o
r
i
n
gf
o
r
c
o
mp
l
e
t
e
p
r
o
t
e
c
t
i
o
nwi
t
h
I
D
S-I
n
t
r
u
s
i
o
nD
e
t
e
c
t
i
o
nS
y
s
t
e
m
I
D
Sp
r
e
s
e
n
t
s
ac
o
mp
r
e
h
e
n
s
i
v
ey
e
t
e
a
s
ya
p
p
r
o
a
c
hf
o
r
s
e
c
u
r
i
t
y
I
D
Sp
r
e
s
e
n
t
s
ac
o
mp
r
e
h
e
n
s
i
v
ey
e
t
e
a
s
ya
p
p
r
o
a
c
hf
o
r
s
e
c
u
r
i
t
y
mo
n
i
t
o
r
i
n
ga
n
ds
i
g
n
a
l
l
i
n
gt
r
a
f
f
i
ca
n
a
l
y
s
i
s
.
I
t
o
f
f
e
r
s
e
n
d
-
t
o
-
e
n
dc
o
v
e
r
a
g
e-f
r
o
m s
e
c
u
r
i
t
ymo
n
i
t
o
r
i
n
ga
n
d
a
n
o
ma
l
o
u
s
-
a
c
t
i
v
i
t
yd
e
t
e
c
t
i
o
n
,
t
op
r
o
t
e
c
t
i
n
gs
i
g
n
a
l
l
i
n
g
n
e
t
wo
r
k
p
e
r
i
me
t
e
r
a
c
r
o
s
s
H
T
T
P
/
2
,
D
i
a
me
t
e
r
,
G
T
P
-
Ca
n
dS
S
7
s
i
g
n
a
l
l
i
n
gp
r
o
t
o
c
o
l
s
.
*
S
o
u
r
c
e
:
1
)
S
e
c
u
r
i
t
y
G
e
nr
e
s
e
a
r
c
hp
a
p
e
r
2
)
N
e
x
u
s
g
u
a
r
d
'
s
Q
32
0
1
8T
h
r
e
a
t
R
e
p
o
r
t
3
)
h
t
t
p
s
:
/
/
www.
t
o
t
a
l
t
e
l
e
.
c
o
m/
5
1
1
1
1
0
/
9
0
-
o
f
-
o
p
e
r
a
t
o
r
s
-
a
r
e
-
s
t
r
i
k
e
d
-
b
y
-
f
r
a
u
d
s
t
e
r
s
-
o
n
-
d
a
i
l
y
-
b
a
s
i
s
4
)
h
t
t
p
s
:
/
/
www.
e
n
i
s
a
.
e
u
r
o
p
a
.
e
u
/
n
e
ws
/
e
n
i
s
a
-
n
e
ws
/
a
n
n
u
a
l
-
r
e
p
o
r
t
-
o
n
-
t
e
l
e
c
o
m-
s
e
c
u
r
i
t
y
-
i
n
c
i
d
e
n
t
s
-
i
n
-
2
0
1
9
r
e
p
o
r
t
-
o
n
-
t
e
l
e
c
o
m-
s
e
c
u
r
i
t
y
-
i
n
c
i
d
e
n
t
s
-
i
n
-
2
0
1
9
S
t
a
yT
u
n
e
d
!
L
e
a
r
nmo
r
ea
b
o
u
t
h
o
wI
D
S
p
r
o
v
i
d
e
s
e
n
h
a
n
c
e
dv
i
s
i
b
i
l
i
t
y
f
o
r
e
a
r
l
yt
h
r
e
a
t
d
e
t
e
c
t
i
o
n
.
C
o
n
n
e
c
t
:
c
o
n
t
a
c
t
@s
e
c
g
e
n
.
c
o
m
www.
s
e
c
g
e
n
.
c
o
m
L
e
g
a
c
yS
i
g
n
a
l
l
i
n
gF
i
r
e
wa
l
l
s
h
a
v
ei
n
h
e
r
e
n
t
l
i
mi
t
a
t
i
o
n
s
,
wh
i
c
ha
d
v
e
r
s
a
r
i
e
s
c
a
ne
a
s
i
l
y
e
x
p
l
o
i
t
t
ob
r
e
a
c
ht
h
ec
o
r
en
e
t
wo
r
k
.
P
a
r
t
i
a
l
v
i
s
i
b
i
l
i
t
y
:
S
i
mp
l
es
i
g
n
a
l
l
i
n
gf
i
r
e
wa
l
l
s
(
F
Ws
)
c
a
n
n
o
t
f
u
l
l
yv
i
s
u
a
l
i
z
et
h
ep
e
r
i
me
t
e
r
o
f
s
i
g
n
a
l
l
i
n
gn
e
t
wo
r
k
s
.
F
W c
a
na
n
a
l
y
s
ea
n
dp
r
o
t
e
c
t
o
n
l
yt
h
ep
a
r
t
t
h
a
t
p
a
s
s
e
s
t
h
r
o
u
g
hi
t
.
T
h
u
s
,
l
e
a
v
i
n
gav
a
s
t
ma
j
o
r
i
t
yo
f
t
r
a
f
f
i
cs
u
s
c
e
p
t
i
b
l
e
.
S
t
a
t
e
l
e
s
s
n
a
t
u
r
eo
f
f
i
r
e
wa
l
l
s
:
F
Ws
a
r
es
t
a
t
e
l
e
s
s
,
c
a
n
n
o
t
c
o
l
l
e
c
t
i
n
f
o
r
ma
t
i
o
na
b
o
u
t
c
u
r
r
e
n
t
s
u
b
s
c
r
i
b
e
r
l
o
c
a
t
i
o
na
n
dc
a
n
n
o
t
p
r
o
t
e
c
t
a
g
a
i
n
s
t
C
a
t
e
g
o
r
y3(
C
A
T
3
)
b
r
e
a
c
h
e
s
-t
h
e
mo
s
t
p
r
e
f
e
r
r
e
dr
o
u
t
ef
o
r
a
t
t
a
c
k
e
r
s
l
o
o
k
i
n
gt
oi
n
t
e
r
c
e
p
t
S
MSa
n
dv
o
i
c
e
c
o
mmu
n
i
c
a
t
i
o
n
,
d
i
s
r
u
p
t
i
n
gn
e
t
wo
r
k
u
s
i
n
gD
o
Sa
n
de
n
a
b
l
i
n
gl
o
c
a
t
i
o
n
t
r
a
c
k
i
n
g
.
L
i
mi
t
e
dc
o
v
e
r
a
g
e
:
Wh
i
l
emo
s
t
F
Ws
a
r
ee
f
f
e
c
t
i
v
e
l
ya
b
l
et
oi
d
e
n
t
i
f
ya
n
db
l
o
c
k
C
a
t
e
g
o
r
y1
(
C
A
T
1
)
a
n
dC
a
t
e
g
o
r
y2(
C
A
T
2
)
t
h
r
e
a
t
s
,
t
h
e
ya
r
eo
f
t
e
nf
o
u
n
dl
a
c
k
i
n
gwh
e
ni
t
c
o
me
s
t
os
e
c
u
r
i
n
gn
e
t
wo
r
k
s
a
g
a
i
n
s
t
a
d
v
a
n
c
e
dC
A
T
3a
t
t
a
c
k
s
.
L
a
c
ko
f
s
c
a
l
a
b
i
l
i
t
ya
n
de
v
o
l
u
t
i
o
nc
a
p
a
b
i
l
i
t
i
e
s
:
I
t
i
s
c
o
mp
l
i
c
a
t
e
dt
oc
o
n
s
t
a
n
t
l
yf
i
n
e
-
t
u
n
ea
n
du
p
d
a
t
eF
W r
u
l
e
s
wi
t
h
o
u
t
b
r
e
a
k
i
n
gt
h
er
o
a
mi
n
gs
e
r
v
i
c
e
s
.
T
h
e
r
e
f
o
r
e
,
t
h
eF
W i
s
o
f
t
e
nc
o
n
f
i
g
u
r
e
do
n
c
e
a
t
au
s
u
a
l
l
yl
o
n
gi
mp
l
e
me
n
t
a
t
i
o
ns
t
a
g
e
,
t
h
u
s
l
i
mi
t
i
n
gt
h
ep
r
o
t
e
c
t
i
o
n
.
S
t
a
t
i
ca
r
c
h
i
t
e
c
t
u
r
e
:
Mo
b
i
l
en
e
t
wo
r
k
s
a
r
el
i
v
ea
n
de
v
e
r
-
e
v
o
l
v
i
n
gwi
t
hu
p
d
a
t
e
s
,
r
e
c
o
n
f
i
g
u
r
a
t
i
o
n
s
,
a
n
di
n
t
e
g
r
a
t
i
o
no
f
n
e
wf
u
n
c
t
i
o
n
s
a
n
df
e
a
t
u
r
e
s
.
I
mp
l
e
me
n
t
a
t
i
o
no
f
n
e
w
e
q
u
i
p
me
n
t
mi
g
h
t
c
h
a
n
g
et
h
es
i
g
n
a
l
l
i
n
gt
r
a
f
f
i
cr
o
u
t
i
n
gs
c
h
e
me
;
a
s
ar
e
s
u
l
t
,
s
o
met
r
a
f
f
i
cmi
g
h
t
e
n
du
pb
y
p
a
s
s
i
n
ge
x
i
s
t
i
n
gF
Ws
.
1
2
3
5
4

More Related Content

More from Security Gen

More from Security Gen (17)

SecurityGen-Cybersecurity-perspective-on-mwc-themes.pdf
SecurityGen-Cybersecurity-perspective-on-mwc-themes.pdfSecurityGen-Cybersecurity-perspective-on-mwc-themes.pdf
SecurityGen-Cybersecurity-perspective-on-mwc-themes.pdf
 
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOMTELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM
 
SecurityGen 5G Cyber-security Lab - A holistic 5G view for building a safe & ...
SecurityGen 5G Cyber-security Lab - A holistic 5G view for building a safe & ...SecurityGen 5G Cyber-security Lab - A holistic 5G view for building a safe & ...
SecurityGen 5G Cyber-security Lab - A holistic 5G view for building a safe & ...
 
ACE: ARTIFICIAL CYBERSECURITY EXPERT
ACE: ARTIFICIAL CYBERSECURITY EXPERTACE: ARTIFICIAL CYBERSECURITY EXPERT
ACE: ARTIFICIAL CYBERSECURITY EXPERT
 
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOMTELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM
 
5G Security Program Datasheet (2).pdf
5G Security Program Datasheet (2).pdf5G Security Program Datasheet (2).pdf
5G Security Program Datasheet (2).pdf
 
5G Security Program -Case Studies
5G Security Program -Case Studies 5G Security Program -Case Studies
5G Security Program -Case Studies
 
IDS: INTRUSION DETECTION SYSTEM PLATFORM
IDS: INTRUSION DETECTION SYSTEM PLATFORMIDS: INTRUSION DETECTION SYSTEM PLATFORM
IDS: INTRUSION DETECTION SYSTEM PLATFORM
 
NGFW - An Updated Overview
NGFW - An Updated Overview NGFW - An Updated Overview
NGFW - An Updated Overview
 
Securing the 5G growth story with NFVi (1).pdf
Securing the 5G growth story with NFVi (1).pdfSecuring the 5G growth story with NFVi (1).pdf
Securing the 5G growth story with NFVi (1).pdf
 
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOMTELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM
 
SecurityGen-IDS_case_study.pdf
SecurityGen-IDS_case_study.pdfSecurityGen-IDS_case_study.pdf
SecurityGen-IDS_case_study.pdf
 
Securing Private 5G Networks (1).pdf
Securing Private 5G Networks (1).pdfSecuring Private 5G Networks (1).pdf
Securing Private 5G Networks (1).pdf
 
Securing the 5G growth story with NFVi.pdf
Securing the 5G growth story with NFVi.pdfSecuring the 5G growth story with NFVi.pdf
Securing the 5G growth story with NFVi.pdf
 
SecurityGen-Signaling-Threats-in-Latam.pdf
SecurityGen-Signaling-Threats-in-Latam.pdfSecurityGen-Signaling-Threats-in-Latam.pdf
SecurityGen-Signaling-Threats-in-Latam.pdf
 
SecurityGen Telecom network security assessment - legacy versus BAS (1).pdf
SecurityGen Telecom network security assessment - legacy versus BAS (1).pdfSecurityGen Telecom network security assessment - legacy versus BAS (1).pdf
SecurityGen Telecom network security assessment - legacy versus BAS (1).pdf
 
SecurityGen-Article-Cloning-SimCard.pdf
SecurityGen-Article-Cloning-SimCard.pdfSecurityGen-Article-Cloning-SimCard.pdf
SecurityGen-Article-Cloning-SimCard.pdf
 

SecurityGen - Your Shield Against Cyber Threats

  • 1. S i g n a l l i n gF i r e wa l l s : T h ef i r s t l i n eo f d e f e n c ef o r t e l c o s . B u t a r et h e ye n o u g h ? 8 0 % O f s i g n a l l i n gn e t wo r k s a r ev u l n e r a b l e d e s p i t ef i r e wa l l ( F W) p r e s e n c e 1 O f t h ed i s t r i b u t e dd e n i a l - o f - s e r v i c ea t t a c k s t a r g e t e dC S P s 2 B i l l i o ni ng l o b a l r e v e n u el o s s e s t ot h e t e l e c o m i n d u s t r yd u et ot e l e c o m f r a u d 3 Ma j o r t e l e c o m s e c u r i t yi n c i d e n t s a c r o s s E u r o p ei n2 0 1 9 ; r e s u l t i n gi nat o t a l i mp a c t o f a l mo s t 1 b i l l i o nu s e r h o u r s l o s t 4 6 5 % 1 5 3 $ 2 8 . 3 C l e a r l y , l e g a c yS i g n a l l i n gF i r e wa l l s c a n n o t p r o t e c t y o u r c o r en e t wo r ka g a i n s t a d v a n c e d , s o p h i s t i c a t e dt h r e a t s . H o wd oy o ut h e ne n s u r e c o mp r e h e n s i v es i g n a l l i n gs e c u r i t y ? I t ’ s t i mef o r c h a n g e : G a i nf u l l v i s i b i l i t ya n dr e a l - t i me mo n i t o r i n gf o r c o mp l e t e p r o t e c t i o nwi t h I D S-I n t r u s i o nD e t e c t i o nS y s t e m I D Sp r e s e n t s ac o mp r e h e n s i v ey e t e a s ya p p r o a c hf o r s e c u r i t y I D Sp r e s e n t s ac o mp r e h e n s i v ey e t e a s ya p p r o a c hf o r s e c u r i t y mo n i t o r i n ga n ds i g n a l l i n gt r a f f i ca n a l y s i s . I t o f f e r s e n d - t o - e n dc o v e r a g e-f r o m s e c u r i t ymo n i t o r i n ga n d a n o ma l o u s - a c t i v i t yd e t e c t i o n , t op r o t e c t i n gs i g n a l l i n g n e t wo r k p e r i me t e r a c r o s s H T T P / 2 , D i a me t e r , G T P - Ca n dS S 7 s i g n a l l i n gp r o t o c o l s . * S o u r c e : 1 ) S e c u r i t y G e nr e s e a r c hp a p e r 2 ) N e x u s g u a r d ' s Q 32 0 1 8T h r e a t R e p o r t 3 ) h t t p s : / / www. t o t a l t e l e . c o m/ 5 1 1 1 1 0 / 9 0 - o f - o p e r a t o r s - a r e - s t r i k e d - b y - f r a u d s t e r s - o n - d a i l y - b a s i s 4 ) h t t p s : / / www. e n i s a . e u r o p a . e u / n e ws / e n i s a - n e ws / a n n u a l - r e p o r t - o n - t e l e c o m- s e c u r i t y - i n c i d e n t s - i n - 2 0 1 9 r e p o r t - o n - t e l e c o m- s e c u r i t y - i n c i d e n t s - i n - 2 0 1 9 S t a yT u n e d ! L e a r nmo r ea b o u t h o wI D S p r o v i d e s e n h a n c e dv i s i b i l i t y f o r e a r l yt h r e a t d e t e c t i o n . C o n n e c t : c o n t a c t @s e c g e n . c o m www. s e c g e n . c o m L e g a c yS i g n a l l i n gF i r e wa l l s h a v ei n h e r e n t l i mi t a t i o n s , wh i c ha d v e r s a r i e s c a ne a s i l y e x p l o i t t ob r e a c ht h ec o r en e t wo r k . P a r t i a l v i s i b i l i t y : S i mp l es i g n a l l i n gf i r e wa l l s ( F Ws ) c a n n o t f u l l yv i s u a l i z et h ep e r i me t e r o f s i g n a l l i n gn e t wo r k s . F W c a na n a l y s ea n dp r o t e c t o n l yt h ep a r t t h a t p a s s e s t h r o u g hi t . T h u s , l e a v i n gav a s t ma j o r i t yo f t r a f f i cs u s c e p t i b l e . S t a t e l e s s n a t u r eo f f i r e wa l l s : F Ws a r es t a t e l e s s , c a n n o t c o l l e c t i n f o r ma t i o na b o u t c u r r e n t s u b s c r i b e r l o c a t i o na n dc a n n o t p r o t e c t a g a i n s t C a t e g o r y3( C A T 3 ) b r e a c h e s -t h e mo s t p r e f e r r e dr o u t ef o r a t t a c k e r s l o o k i n gt oi n t e r c e p t S MSa n dv o i c e c o mmu n i c a t i o n , d i s r u p t i n gn e t wo r k u s i n gD o Sa n de n a b l i n gl o c a t i o n t r a c k i n g . L i mi t e dc o v e r a g e : Wh i l emo s t F Ws a r ee f f e c t i v e l ya b l et oi d e n t i f ya n db l o c k C a t e g o r y1 ( C A T 1 ) a n dC a t e g o r y2( C A T 2 ) t h r e a t s , t h e ya r eo f t e nf o u n dl a c k i n gwh e ni t c o me s t os e c u r i n gn e t wo r k s a g a i n s t a d v a n c e dC A T 3a t t a c k s . L a c ko f s c a l a b i l i t ya n de v o l u t i o nc a p a b i l i t i e s : I t i s c o mp l i c a t e dt oc o n s t a n t l yf i n e - t u n ea n du p d a t eF W r u l e s wi t h o u t b r e a k i n gt h er o a mi n gs e r v i c e s . T h e r e f o r e , t h eF W i s o f t e nc o n f i g u r e do n c e a t au s u a l l yl o n gi mp l e me n t a t i o ns t a g e , t h u s l i mi t i n gt h ep r o t e c t i o n . S t a t i ca r c h i t e c t u r e : Mo b i l en e t wo r k s a r el i v ea n de v e r - e v o l v i n gwi t hu p d a t e s , r e c o n f i g u r a t i o n s , a n di n t e g r a t i o no f n e wf u n c t i o n s a n df e a t u r e s . I mp l e me n t a t i o no f n e w e q u i p me n t mi g h t c h a n g et h es i g n a l l i n gt r a f f i cr o u t i n gs c h e me ; a s ar e s u l t , s o met r a f f i cmi g h t e n du pb y p a s s i n ge x i s t i n gF Ws . 1 2 3 5 4