Contents VULNERABILITIES OF MOBILE INTERNET (GPRS), 2014

Size: px
Start display at page:

Download "Contents VULNERABILITIES OF MOBILE INTERNET (GPRS), 2014"

Transcription

1 VULNERABILITIES OF MOBILE INTERNET (GPRS) Dmitry Kurbatov Sergey Puzankov Pavel Novikov 2014

2 Contents 1. Introduction 2. Summary 3. Mobile network scheme 4. GTP protocol 5. Searching for mobile operator s facilities on the Internet 6. Threats 6.1. IMSI brute force 6.2. The disclosure of subscriber s data via IMSI 6.3. Disconnection of authorized subscribers from the Internet 6.4. Blocking the connection to the Internet 6.5. Internet at the expense of others 6.6. Data interception 6.7. DNS tunneling 6.8. Substitution of DNS for GGSN 7. Conclusion and recommendations

3 1. Introduction Modern mobile networks facilitate the most convenient access to the Internet without the need for static infrastructures. People can access , messengers, social networks and online stores whenever and wherever they need it. A range of businesses use mobile Internet for remote administration, financial operations, e-commerce, M2M and some other purposes. Government organizations provide more and more services via the web, and it results in a significant increase in the volume of the world s mobile data traffic. This traffic is expected to increase significantly in both 3G/3.5G and 4G through 2018, see table below. Many users have approached the use of broadband Internet access with caution, due to publicity around security breaches. In response to this, a great number of security solutions were introduced to protect this services sector, such as antivirus software, firewalls, etc. By contrast, the level of consciousness about security while using the mobile Internet is relatively low. Most users assume that mobile network access is much safer because a big mobile-telecoms provider will protect subscribers and has the benefit of the developments in security from the broadband Internet arena. Unfortunately, as practice shows, mobile Internet is a great opportunity for the attacker, and can be less secure than more traditional options. This report will provide an analysis of these threats, as well as recommendations to ensure the safety of mobile Internet services. Exabytes per Month % % % 60% 30% 51% 2/2.5G 3/3.5G 4G Source: Cisco VNI Mobile 2014 Fig. 1. The expected growth in mobile data traffic [1] 2. Summary Positive Technologies has determined that there are serious security issues in the networks that support mobile Internet devices. A large number of devices belonging to 2G/3G networks of mobile network operators are available via open GTP ports as well as some other open communication protocols (FTP, Telnet, HTTP). An attacker can connect to the node of a mobile network operator by exploiting vulnerabilities (for example, default passwords) in these interfaces. Having acquired access to the network of any operator, an attacker can automatically gain access to the GRX network, which in turn allows him/her to perform various attacks on subscribers of any operator: 1. Searching for valid IMSI 2. Obtaining subscriber s data via IMSI (including his/her location) 3. Disconnection of subscribers from the Internet or blocking their access to the Internet 4. Connecting to the Internet with credentials of the legitimate user and at the expense of others 5. Listening to the traffic of the victim 6. Engage in a fishing attack Security measures required to protect against such attacks include proper configuration of equipment, utilizing a firewall and regular security monitoring. More details on the recommended set of protective measures is provided in the final part of this review. 3

4 3. Mobile network scheme Fig. 2. Provider s mobile network Mobile provider s network consists of the Circuit Switched Core Network (CS core), the Packet Switched Core Network (PS core), the base station network and its 2G controllers (BSC and BTS in the scheme), and the base station network and its 3G controllers (Node B and RNC). The scheme shows that 3G network is based on 2G radio access network; the rest of the operator s network does not undergo any significant changes in the evolution to the third generation. As clearly outlined in Figure 2.2, the operators networks have not undergone any significant changes in terms of security from 2G to 3G to 4G. Below is the packet data transfer subsystem (PS core). The scheme in Figure 3 illustrates the architecture of the system used to transmit data in a 2G network. There are some differences in the chain MS (mobile station) SGSN within the 3G network (UMTS network). The scheme shows that an attacker can access the provider s network using: Subscriber s Mobile Station The Internet The GRX network, i.e. via another mobile provider Thus if an attacker enters the network of any mobile provider in the world, he/she will be able to affect other providers. Service GPRS Support Node (SGSN) and Gateway GPRS Support Node (GGSN) are the basic elements for data transmission. The former one is used to provide subscribers with data transmission services and it also interacts with other network elements; the latter is a gateway between the internal operator s network and the Internet. In addition to the Internet connection, there is a connection to the GRX network Global Roaming exchange, which is based on complicated relationships between individual operators (interconnection of networks) used to provide Internet access to subscribers in roaming. 4

5 Fig. 3. A scheme for the packet data transmission within mobile networks (including information on protocols) 4. GTP protocol GTP protocol is used to send the traffic within PS core and GRX. This is a tunneling protocol, which runs over UDP and utilizes port 2123 (for management purposes, GTP-C), port 2152 (for transmitting user data, GTP-U), and 3386 (for billing, GTP ). Message Type field in the GTP header is primarily used for management purposes in GTP-C. Usually, in GTP-U Message Type = 0xFF (T-PDU). Tunnel Endpoint Identifier (TEID) is a tunnel identifier that is not associated with an IP address, i.e., packages can be sent with the same TEID but from different IP addresses (in case if the subscriber moves and switches to another SGSN). PDP Context Activation procedure is executed when the subscriber is connecting to the Internet. In simplified form, the procedure is as follows: 1. The phone sends an Activate PDP Context request, which (amongst other information) contains the login, password, and APN. 2. After receiving the APN, SGSN tries to resolve it on the internal DNS server; the server resolves the received APN and provides the corresponding GGSN address. 3. The SGSN sends the Create PDP Context request to this address. 4. The GGSN authenticates the submitted login and password, for example, on the RADIUS server. 5. The GGSN obtains an IP address for the mobile phone and transmits all data required for PDP context activation back to the SGSN. 6. The SGSN accomplishes the activation procedure by sending back to the phone all the data required for establishing a connection. In fact, the PDP Context Activation procedure is the creation of a tunnel between a cell phone and a gateway (GGSN) on the operator s mobile network. 5

6 Octets Version PT (*) E S Message Type Length (1 st Octet) Length (2 nd Octet) Tunnel Endpoint Identifier (1 st Octet) Tunnel Endpoint Identifier (2 nd Octet) Tunnel Endpoint Identifier (3 rd Octet) Tunnel Endpoint Identifier (4 th Octet) Sequence Number (1 st 1) 4) Octet) Sequence Number (2 nd 1) 4) Octet) 2) 4) N-PDU Number 3) 4) Next Extension Header Type 1 PN NOTE 0: (*) This bit is a spare bit. It shall be sent as '0'. The receiver shall not evaluate this bit. NOTE 1: 1) This field shall only be evaluated when indicated by the S flag set to 1. NOTE 2: 2) This field shall only be evaluated when indicated by the PN flag set to 1. NOTE 3: 3) This field shall only be evaluated when indicated by the E flag set to 1. NOTE 4: 4) This field shall be present if and only if any one or more of the S, PN and E flags are set. Fig. 4. GTP header structure PDP Context Activation SGSN DNS GGSN RADIUS DHCP 1. Activate PDP Context Request 2a. DNS Request mncxxx.mscxxx.internet 2b. DNS Response GGSN IP 4a. Radius Authenticate Request 4b. Radius Authenticate Response 3. Create PDP Context Request 5a. DHCP Address Request 7. Activate PDP Context Accept GTP U 6. Create PDP Context Response GTP C + GTP U 5a. DHCP Address Assignment Fig. 5. The procedure for establishing a connection 6

7 5. Searching for mobile operator s facilities on the Internet We already know that GGSN must be deployed as an edge device. Using Shodan.io search engine for Internet-connected devices, we can find the required devices by their banners. Fig. 6. Search results in Shodan Search result displays about 40 devices using this abbreviation in their banners. The screenshot provides a list of some devices that use this abbreviation, including devices with open Telnet and turned off password authentication. An attacker can perform an intrusion into the network of the operator in the Central African Republic by connecting to this device and implementing the required settings. Having access to the network of any operator, the attacker will automatically get access to the GRX network and other operators of mobile services. One single mistake made by one single operator in the world creates this opportunity for attack to many other mobile networks. There are more ways of using the compromised boundary host, for example, DNS spoofing attack (more information about attacks is considered below). GGSN and SGSN can also be found in other ways. GTP protocol described above can be used only within PS core and GRX networks and should not be accessible from the Internet. In practice, however, things are often quite different: There are more than 207,000 devices with open GTP ports all over the global Internet. Fig. 7. Countries with the largest number of hosts with open GTP ports (more than 1000) 7

8 Fig. 8. The distribution of hosts with open GTP ports around the world What can be said about these 207,000 devices? 7,255 devices are not associated with GTP and send HTTP responses (see fig. 9) The remainder of the 200,000 addresses respond with correct GTP messages. A more in-depth analysis shows that an individual device may not be a component of a mobile network: these are universal devices utilized for other purposes when administrators of certain systems did not turn off this feature for them. Alcatel-Lucent 7750 and ZTE ZXUN xgw can often be found among such devices, and the latter has open FTP and Telnet ports. 548 devices responded to the request for establishing a connection: four of them allow a user or attacker to create a tunnel while other respond with various errors. Fig. 9. The response to GTP request received from equipment by Internet Rimon LTD Fig. 10. Responses to attempts to establish a PDP connection 8

9 Let us look into the responses: 1. System failure and Mandatory IE incorrect responses imply that the fields of the GTP packet required for this node were not filled. 2. No resources available response means that node s DHCP pool or PDP pool has run out. 3. Missing or unknown APN and Service not supported responses imply that the current APN is not included into the list of authorized APNs (you can find proper APNs on the provider s website in the Internet, WAP, or MMS settings). 4. Accept response implies that the device provides an IP address and other connection attributes, i.e. a tunnel is created. HTTP 4% FTP 81% SSH 25% Telnet 82% BGP 4% VPN (UDP:500) 44% Fig. 11. Number of hosts with various services Dictionary passwords % 79% Management interfaces available to any Internet user % 82% Use of open data transfer protocols % 82% Vulnerabilities of system and application software caused by lack of updates SQL Injection % 55% 64% 63% Unrestricted File Upload % 55% Storing important data unencrypted Path traversal % 47% 45% 42% Dictionary SNMP Community String value (public) % 36% DBMS access interfaces available to any Internet user % 36% Fig. 12. Top 10 vulnerabilities typical of a network perimeter Therefore, an attacker coming from the Internet can detect the proper GGSN, set up the GTP connection and then encapsulate GTP control packets into the created tunnel. If parameters were selected properly, GGSN will take them as packets from legitimate devices within the operator s network. Another benefit for attackers is that GTP is not the only protocol used on detected hosts. Telnet, FTP, SSH, Web, etc. are also used for management purposes. The figure below shows how many open ports were detected for each protocol. According to statistics provided by Positive Technologies, penetration tests revealed that data transferring via open protocols (FTP, Telnet, HTTP) and availability of management interfaces from the Internet are the most frequent vulnerabilities to appear in the network perimeter of large companies information systems. Moreover, the distribution of these vulnerabilities has doubled in compared to 2011/2012, effectively creating a larger number and range of attacks for mobile Internet suppliers and users to consider. 9

10 6. Threats The following parameters are typical for the described attacks: the complexity of implementing (having regard to conditions) is medium, the reproducibility (i.e. the reuse of the attack by other attackers) is high IMSI brute force Goal: To find a valid IMSI. Attack vector: An attacker conducts attacks from the GRX network or the operator s network. Description: IMSI is the SIM card Number (International Mobile Subscriber ID). It consists of 15 digits, the first three identify the Mobile Country Code (MCC), the next two digits are the Mobile Network Code (MNC). You can choose the required operator on the website enter the MCC and MNC and then brute force the remaining 10 digits by sending a Send Routing Information for GPRS Request message via GRX. This message can be sent to any GSN device, which converts the request into an SS7 format (CS core network component) and sends it to HLR where it is processed by SS7 network. If the subscriber with this IMSI uses the Internet, we can get the SGSN IP address serving the mentioned subscriber. Otherwise, response will be as follows: Mobile station Not Reachable for GPRS. Result. Obtaining a list of valid IMSI for further attacks. Fig. 13. The scheme of the attack 10

11 6.2. The disclosure of subscriber s data via IMSI Goal: To obtain a phone number, location data, information about the model of a subscriber s mobile device via IMSI. Attack vector: An attacker conducts attacks from the GRX network or the operator s network. Description: An attacker can use this vulnerability after the success of the previous attack or if he/she gets a subscriber s IMSI via a viral application for the subscriber s smartphone. The attacker needs to know the SGSN IP address, garnered from the previous attack. After that, the attacker sends an Update PDP Context Request to the SGSN IP address requesting the subscriber s location; the GSN Control Plane is spoofed with the attacker s IP address. The response contains MSISDN (Mobile Subscriber Integrated Services Digital Number), IMEI (International Mobile Equipment Identity, it helps to identify the model of a subscriber s phone) and the current subscriber s mobile radio base tower (MCC, MNC, LAC, CI). Consequently, the attacker can find the subscriber s location accurate to several hundred meters using the following website: or Result: The required information about the subscriber is obtained. Fig. 14. The scheme of the attack 11

12 6.3. Disconnection of authorized subscribers from the Internet Goal: To disconnect the connected subscribers. Attack vector: An attacker conducts attacks from the GRX network or the operator s network. Description: The attack is based on sending the PDP context delete request packets to the target GGSN with all the TEID listed. The PDP Сontext information is deleted, which causes disconnection of authorized subscribers. At the same time, GGSN unilaterally closes tunnels and sends the responses on this event to the attacker. A valid SGSN used by the subscriber to set up the connection doesn t have information about closing connections, so tunnels continue to occupy the hardware resources. The subscriber s Internet stops working, but the connection is displayed as active. Result: All subscribers connected to this GGSN will be disconnected. The amount of subscribers served by one GGSN is 100,000 10,000,000. Fig. 15. The scheme of the attack 12

13 6.4. Blocking the connection to the Internet Goal: To block the establishment of new connections to the Internet. Attack vector: An attacker conducts attacks from the GRX network or the operator s network. Description: The attack is based on sending the Create PDP context request packets with IMSI list, thus the exhaustion of the available pool of PDP tunnels occurs. For example, the maximum number of PDP Context Cisco 7200 with 256 MB of memory is 80,000, with 512 MB 135,000: it is not difficult to brute force all possible combinations. Moreover, more and more IP addresses from DHCP pool are issued and they may be exhausted. It does not matter what will be exhausted first the DHCP pool or the PDP pool, after all, GGSN will response with No resource available to all valid connection requests. Moreover, GGSN cannot close tunnels, because when you try to close one, GGSN sends an attacker Delete PDP context request with the number of the tunnel to be closed. If there is no response (actually, there isn t any response because an attacker does not want this to happen), GGSN sends such requests over and over again. The resources remain occupied. In case of successful implementation of this attack, authorized subscribers will not be able to connect to the Internet and those who were connected will be disconnected as GGSN sends these tunnels to the attacker s address. This attack is an analogue of the DHCP starvation attack at the GTP level. Result: The subscribers of the attacked GGSN will not be able to connect to the Internet. The amount of subscribers served by one GGSN is 100,000 10,000,000. Fig. 16. The scheme of the attack 13

14 6.5. Internet at the expense of others Goal: The exhaustion of the subscriber s account and use of the connection for illegal purposes. Attack vector: An attacker conducts attacks from the GRX network or the operator s network. Description: The attack is based on sending the Create PDP context request packets with the IMSI of a subscriber known in advance. Thus, the subscriber s credentials are used to establish connection. Unsuspecting subscriber will get a huge bill. It is possible to establish connection via the IMSI of a non-existent subscriber, as subscriber authorization is performed at the stage of connecting to SGSN and GGSN receives already verified connections. Since the SGSN is compromised, no verification is carried out. Result: An attacker can connect to the Internet with the credentials of a legitimate user. Fig. 17. The scheme of the attack 14

15 6.6. Data interception Goal: To listen to the traffic of the victim and conduct a fishing attack. Attack vector: An attacker conducts attacks from the GRX network or the operator s network. Description: An attacker can intercept data sent between the subscriber s device and the Internet by sending an Update PDP Context Request message with spoofed GSN addresses to SGSN and GGSN. This attack is an analogue of the ARP Spoofing attack at the GTP level. Result: Listening to traffic or spoofing traffic from the victim and disclosure of sensitive data. Fig. 18. The scheme of the attack 15

16 6.7. DNS tunneling Goal: To get non-paid access to the Internet from the subscriber s mobile station. Attack vector: The attacker is the subscriber of a mobile phone network and acts through a mobile phone. Description: This is a well-known attack vector, rooted in the days of dial-up, but the implementation of low-price and fast dedicated Internet access made it less viable. However, this attack can be used in mobile networks, for example, in roaming when prices for mobile Internet are unreasonably high and the data transfer speed is not that important (for example, for checking ). The point of this attack is that some operators do not rate DNS traffic, usually in order to redirect the subscriber to the operator s webpage for charging the balance. An attacker can use this vulnerability by sending special crafted requests to the DNS server; to get access one needs a specialized host on the Internet. Result: Getting non-paid access to the Internet at the expense of mobile operator. Fig. 19. The scheme of the attack 16

17 6.8. Substitution of DNS for GGSN Goal: To listen to the traffic of the victim, to conduct a fishing attack. Attack vector: An attacker acts through the Internet. Description: If an attacker gets access to GGSN (which is quite possible as we could see), the DNS address can be spoofed with the attacker s address and all the subscriber s traffic will be redirected through the attacker s host. Thus, listening to all the mobile traffic of the subscriber is possible. Result: An ability to listen to traffic or spoof traffic from all subscribers and then gather confidential data to engage it in fishing attacks. Fig. 20. The scheme of the attack 17

18 7. Conclusion and recommendations Modern mobile networks feature serious vulnerabilities, which allow attackers to perform various attacks against both certain mobile Internet users and the entire infrastructure (for example, for the purpose of industrial espionage or elimination of competitors on the market) using inexpensive equipment. In addition, the deterioration of international relationships and security has historically triggered cell phone tapping followed by the scandalous publication of negotiations between politicians or military officials. Some of the attacks cannot be performed if the mobile equipment is configured properly, but the results our research suggest that misconfiguration is a common problem in the telecommunications sphere by those attempting to save money on security. Vendors often leave some services enabled while these services should be disabled on this equipment, which gives additional opportunities to attackers. Many people rely on new communication standards that include new safety technologies. However, despite the development of such standards (3G, 4G) we cannot completely abandon the use of old generation networks (2G). The reason is the specifics of the implementation of mobile networks and the fact that the 2G base stations have better coverage as well as the fact that 3G networks use their infrastructure. Also, as of later 2014, the majority of operators in the world do not provide opportunities for voice transmission over 4G networks: during a call mobile phone switches forcedly to 3G network or even to 2G and after a call it switches back, if it is possible. The possibility of such invisible switches is widely used for mobile surveillance. The key difference between 4G and other networks voice transmission over IP, may be a vulnerability itself: therefore, not only data but also phone calls may be affected. Therefore, we should expect even more surprises from 4G networks. As for the currently used networks (2G and 3G), Positive Technologies experts recommend to implement the following security measures on the side of communication providers (fig. 21): 1. Use firewalls at the GRX network edge for blocking services that are not associated with providing an Internet access to subscribers in roaming (only required services are permitted: GTP, DNS, etc.). 2. Use firewalls at the Internet edge for blocking services that should not be accessible from the Internet. 3. Use 3GPP TS recommendations to configure the security settings within the PS Core network. The network must be secured, in particular, by using IPsec to send the GTP-C traffic within PS core. Fig. 21. The recommended set of security measures 18

19 4. Carry out a regular security monitoring of the perimeter (Advanced Border Control service). This set of measures will monitor the Customer s network protection against external threats. The monitoring implies regular scanning of all operator s networks and hosts available from the Internet. Scanning reveals available network services, their versions, and types of operational systems. Information obtained during the scanning is checked against the vulnerabilities and exploits database. Thus, the operator is able to control the perimeter from the point of the attacker, predict possible attacks and prevent them. 5. Develop security compliances of equipment and perform regular compliance management tasks (see example in fig.22). Fig. 22. MaxPatrol Compliance Management Sources 1. Cisco Global Mobile Data Traffic Forecast Update, Cisco VNI Mobile, visual-networking-index-vni/white_paper_c pdf 2. Vulnerability Statistics for Corporate Information Systems (), Positive Technologies, _rus.pdf 3. Vulnerabilities of mobile networks based on SS7 protocols. Positive Technologies, Cell phones and total NSA surveillance: How does it work? Positive Technologies, G inherently less secure than 3G The Telegraph, G-inherently-less-secure-than-3G.html 6. Mobile Internet security from inside and outside Positive Technologies, 7. GRX and a Spy Agency GPP TS

20 List of abbreviations APN - Access Point Name; a symbolic name of an access point through which the user can get access to the requested type of the service (WAP, Internet, MMS) BSC - Base Station Controller BTS - Base Transceiver Station; a piece of equipment (repeaters, transceivers) that facilitates wireless communication between user equipment and a network. CI - Cell ID CS - Circuit Switched; data transmission with channel switching DHCP - Dynamic Host Configuration Protocol DNS - Domain Name System FTP - File Transfer Protocol GGSN - Gateway GPRS Support Node; the node affiliated to PS Core Network, it enables the routing of data between GPRS Core network and external IP networks GPRS - General Packet Radio Service GRX - Global Roaming exchange; network that provides packet data services to the roaming GTP - GPRS Tunneling Protocol; a protocol describing and performing the transmission of data between GSN nodes within the packet network HLR - Home Location Register; a database storing all information about the subscriber HTTP - HyperText Transfer Protocol IMEI - International Mobile Equipment Identity IMSI - International Mobile Subscriber Identity LAC - Local Area Code MCC - Mobile Country Code; a code of country, in which the Base Station is located MMS - Multimedia Message System; a system for multimedia messaging (images, audio and video files) within the mobile network MNC - Mobile Network Code MS - Mobile Station MSISDN - Mobile Subscriber Integrated Services Digital Number PS - Packet Switched; data transmission with packet switching SGSN - Service GPRS Support Node; the main component of the GPRS system for implementation of all packet data processing functions SS7 - Signaling System 7; a common channel signaling system used in the international and local telephone networks around the world SSH - Secure Shell TEID - Tunnel Endpoint IDentifier UDP - User Datagram Protocol UMTS - Universal Mobile Telecommunications System; a mobile technology developed by the European Telecommunications Standards Institute (ETSI) in order to implement a 3G service in Europe. WAP - Wireless Application Protocol 20

ETSI TS 129 119 V9.0.0 (2010-01) Technical Specification

ETSI TS 129 119 V9.0.0 (2010-01) Technical Specification TS 129 119 V9.0.0 (2010-01) Technical Specification Universal Mobile Telecommunications System (UMTS); LTE; GPRS Tunnelling Protocol (GTP) specification for Gateway Location Register (GLR) (3GPP TS 29.119

More information

3GPP TS 29.119 V7.0.0 (2007-06)

3GPP TS 29.119 V7.0.0 (2007-06) TS 29.119 V7.0.0 (2007-06) Technical Specification 3rd Generation Partnership Project; Technical Specification Group Core Network; GPRS Tunnelling Protocol (GTP) specification for GLR (Release 7) The present

More information

U.S. Patent Appl. No. 13/247.308 filed September 28, 2011 NETWORK ADDRESS PRESERVATION IN MOBILE NETWORKS TECHNICAL FIELD

U.S. Patent Appl. No. 13/247.308 filed September 28, 2011 NETWORK ADDRESS PRESERVATION IN MOBILE NETWORKS TECHNICAL FIELD U.S. Patent Appl. No. 13/247.308 filed September 28, 2011 NETWORK ADDRESS PRESERVATION IN MOBILE NETWORKS TECHNICAL FIELD [0001] The disclosure relates to mobile networks and, more specifically, to wireless

More information

Worldwide attacks on SS7 network

Worldwide attacks on SS7 network Worldwide attacks on SS7 network P1 Security Hackito Ergo Sum 26 th April 2014 Pierre-Olivier Vauboin (po@p1sec.com) Alexandre De Oliveira (alex@p1sec.com) Agenda Overall telecom architecture Architecture

More information

SIGNALING SYSTEM 7 (SS7) SECURITY REPORT

SIGNALING SYSTEM 7 (SS7) SECURITY REPORT SIGNALING SYSTEM 7 () SECURITY REPORT Page CONTENTS. Introduction. Summary 4. Research methodology 5 Preconditions for attacks 5 An attacker s profile 5 Resources required 5 4. Research overview 6 4..

More information

How To Use A Femtocell (Hbn) On A Cell Phone (Hbt) On An Ipad Or Ipad (Hnt) On Your Cell Phone On A Sim Card (For Kids) On The Ipad/Iph

How To Use A Femtocell (Hbn) On A Cell Phone (Hbt) On An Ipad Or Ipad (Hnt) On Your Cell Phone On A Sim Card (For Kids) On The Ipad/Iph . Femtocell: Femtostep to the Holy Grail... Ravishankar Borgaonkar, Kévin Redon.. Technische Universität Berlin, SecT ravii/kredon@sec.t-labs.tu-berlin.de TROOPERS 2011, 30 March 2011 3G/UMTS femtocells

More information

Advanced SIP Series: SIP and 3GPP Operations

Advanced SIP Series: SIP and 3GPP Operations Advanced S Series: S and 3GPP Operations, Award Solutions, Inc Abstract The Session Initiation Protocol has been chosen by the 3GPP for establishing multimedia sessions in UMTS Release 5 (R5) networks.

More information

SS7 & LTE Stack Attack

SS7 & LTE Stack Attack SS7 & LTE Stack Attack Ankit Gupta Black Hat USA 2013 akg0x11@gmail.com Introduction With the evolution of IP network, Telecom Industries are using it as their core mode of communication for their network

More information

WHITE PAPER. Mobility Services Platform (MSP) Using MSP in Wide Area Networks (Carriers)

WHITE PAPER. Mobility Services Platform (MSP) Using MSP in Wide Area Networks (Carriers) WHITE PAPER Mobility Services Platform (MSP) Using MSP in Wide Area Networks (Carriers) Table of Contents About This Document... 1 Chapter 1 Wireless Data Technologies... 2 Wireless Data Technology Overview...

More information

SECURITY TRENDS & VULNERABILITIES REVIEW 2015

SECURITY TRENDS & VULNERABILITIES REVIEW 2015 SECURITY TRENDS & VULNERABILITIES REVIEW 2015 Contents 1. Introduction...3 2. Executive summary...4 3. Inputs...6 4. Statistics as of 2014. Comparative study of results obtained in 2013...7 4.1. Overall

More information

Wired Network Security: Hospital Best Practices. Jody Barnes. East Carolina University

Wired Network Security: Hospital Best Practices. Jody Barnes. East Carolina University Wired Network Security 1 Running Head: Wired Network Security: Hospital Best Practices Wired Network Security: Hospital Best Practices Jody Barnes East Carolina University Wired Network Security 2 Abstract

More information

How to secure an LTE-network: Just applying the 3GPP security standards and that's it?

How to secure an LTE-network: Just applying the 3GPP security standards and that's it? How to secure an LTE-network: Just applying the 3GPP security standards and that's it? Telco Security Day @ Troopers 2012 Peter Schneider Nokia Siemens Networks Research 1 Nokia Siemens Networks 2012 Intro

More information

UMTS/GPRS system overview from an IP addressing perspective. David Kessens Jonne Soininen

UMTS/GPRS system overview from an IP addressing perspective. David Kessens Jonne Soininen UMTS/GPRS system overview from an IP addressing perspective David Kessens Jonne Soininen Introduction 1) Introduction to 3GPP networks (GPRS, UMTS) Technical overview and concepts for 3GPP networks Mobility

More information

Security Measures and Weaknesses of the GPRS Security Architecture

Security Measures and Weaknesses of the GPRS Security Architecture Security Measures and Weaknesses of the GPRS Security Architecture Christos Xenakis Security Group, Communication Networks Laboratory, Department of Informatics & Telecommunications, University of Athens,

More information

Penetration Testing Report Client: Business Solutions June 15 th 2015

Penetration Testing Report Client: Business Solutions June 15 th 2015 Penetration Testing Report Client: Business Solutions June 15 th 2015 Acumen Innovations 80 S.W 8 th St Suite 2000 Miami, FL 33130 United States of America Tel: 1-888-995-7803 Email: info@acumen-innovations.com

More information

GSM v. CDMA: Technical Comparison of M2M Technologies

GSM v. CDMA: Technical Comparison of M2M Technologies GSM v. CDMA: Technical Comparison of M2M Technologies Introduction Aeris provides network and data analytics services for Machine-to- Machine ( M2M ) and Internet of Things ( IoT ) applications using multiple

More information

A practical attack against GPRS/EDGE/UMTS/HSPA mobile data communications ABSTRACT

A practical attack against GPRS/EDGE/UMTS/HSPA mobile data communications ABSTRACT A practical attack against GPRS/EDGE/UMTS/HSPA mobile data communications David Perez - david@taddong.com Jose Pico - jose@taddong.com Black Hat DC 2011 (Jan. 18-19) ABSTRACT In this article we present

More information

Femtocells: A Poisonous Needle in the Operator s Hay Stack

Femtocells: A Poisonous Needle in the Operator s Hay Stack Femtocells: A Poisonous Needle in the Operator s Hay Stack Ravishankar Borgaonkar, Nico Golde and Kevin Redon Security in Telecommunications Technische Universität Berlin and Deutsche Telekom Laboratories

More information

NTT DOCOMO Technical Journal. Core Network Infrastructure and Congestion Control Technology for M2M Communications

NTT DOCOMO Technical Journal. Core Network Infrastructure and Congestion Control Technology for M2M Communications M2M 3GPP Standardization Further Development of LTE/LTE-Advanced LTE Release 10/11 Standardization Trends Core Network Infrastructure and Congestion Control Technology for M2M Communications The number

More information

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection. A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based

More information

TABLE OF CONTENT. Page 2 of 9 INTERNET FIREWALL POLICY

TABLE OF CONTENT. Page 2 of 9 INTERNET FIREWALL POLICY IT FIREWALL POLICY TABLE OF CONTENT 1. INTRODUCTION... 3 2. TERMS AND DEFINITION... 3 3. PURPOSE... 5 4. SCOPE... 5 5. POLICY STATEMENT... 5 6. REQUIREMENTS... 5 7. OPERATIONS... 6 8. CONFIGURATION...

More information

Security Technology: Firewalls and VPNs

Security Technology: Firewalls and VPNs Security Technology: Firewalls and VPNs 1 Learning Objectives Understand firewall technology and the various approaches to firewall implementation Identify the various approaches to remote and dial-up

More information

IPv6 SECURITY. May 2011. The Government of the Hong Kong Special Administrative Region

IPv6 SECURITY. May 2011. The Government of the Hong Kong Special Administrative Region IPv6 SECURITY May 2011 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the express

More information

The Trivial Cisco IP Phones Compromise

The Trivial Cisco IP Phones Compromise Security analysis of the implications of deploying Cisco Systems SIP-based IP Phones model 7960 Ofir Arkin Founder The Sys-Security Group ofir@sys-security.com http://www.sys-security.com September 2002

More information

EXPLORER. TFT Filter CONFIGURATION

EXPLORER. TFT Filter CONFIGURATION EXPLORER TFT Filter Configuration Page 1 of 9 EXPLORER TFT Filter CONFIGURATION Thrane & Thrane Author: HenrikMøller Rev. PA4 Page 1 6/15/2006 EXPLORER TFT Filter Configuration Page 2 of 9 1 Table of Content

More information

Recommended IP Telephony Architecture

Recommended IP Telephony Architecture Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 SNAC.Guides@nsa.gov This Page Intentionally Left Blank ii Warnings

More information

Wireless VPN White Paper. WIALAN Technologies, Inc. http://www.wialan.com

Wireless VPN White Paper. WIALAN Technologies, Inc. http://www.wialan.com Wireless VPN White Paper WIALAN Technologies, Inc. http://www.wialan.com 2014 WIALAN Technologies, Inc. all rights reserved. All company and product names are registered trademarks of their owners. Abstract

More information

CTS2134 Introduction to Networking. Module 8.4 8.7 Network Security

CTS2134 Introduction to Networking. Module 8.4 8.7 Network Security CTS2134 Introduction to Networking Module 8.4 8.7 Network Security Switch Security: VLANs A virtual LAN (VLAN) is a logical grouping of computers based on a switch port. VLAN membership is configured by

More information

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN Virtual private network Network security protocols COMP347 2006 Len Hamey Instead of a dedicated data link Packets securely sent over a shared network Internet VPN Public internet Security protocol encrypts

More information

How To Understand The Gsm And Mts Mobile Network Evolution

How To Understand The Gsm And Mts Mobile Network Evolution Mobile Network Evolution Part 1 GSM and UMTS GSM Cell layout Architecture Call setup Mobility management Security GPRS Architecture Protocols QoS EDGE UMTS Architecture Integrated Communication Systems

More information

Mitigating the Security Risks of Unified Communications

Mitigating the Security Risks of Unified Communications 2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore Mitigating the Security Risks of Unified Communications Fernando Almeida 1 +, Jose

More information

Flow-Based Monitoring of GTP Traffic in Cellular Networks. Master of Science Thesis. E.H.T.B. Brands

Flow-Based Monitoring of GTP Traffic in Cellular Networks. Master of Science Thesis. E.H.T.B. Brands Flow-Based Monitoring of GTP Traffic in Cellular Networks Master of Science Thesis by E.H.T.B. Brands Date: July 20, 2012 Committee: dr. ir. Aiko Pras Rick Hofstede, M.Sc. dr. ir. Georgios Karagiannis

More information

Classification of Firewalls and Proxies

Classification of Firewalls and Proxies Classification of Firewalls and Proxies By Dhiraj Bhagchandka Advisor: Mohamed G. Gouda (gouda@cs.utexas.edu) Department of Computer Sciences The University of Texas at Austin Computer Science Research

More information

Chapter 2 Mobility Management for GPRS and UMTS

Chapter 2 Mobility Management for GPRS and UMTS Chapter 2 Mobility Management for GPRS and UMTS Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University Outline 2.1 Network Architectures 2.2 Concepts

More information

29.09.2015. Digital Communications Exploring SS7 signaling fraud that threatens mobile network security and subscriber privacy

29.09.2015. Digital Communications Exploring SS7 signaling fraud that threatens mobile network security and subscriber privacy 29.09.2015 Digital Communications Exploring SS7 signaling fraud that threatens mobile Mobile communications is a prime target for hackers who desire to penetrate critical infrastructures and businesses

More information

An Oracle White Paper December 2013. The Value of Diameter Signaling in Security and Interworking Between 3G and LTE Networks

An Oracle White Paper December 2013. The Value of Diameter Signaling in Security and Interworking Between 3G and LTE Networks An Oracle White Paper December 2013 The Value of Diameter Signaling in Security and Interworking Between 3G and LTE Networks Introduction Today s mobile networks are no longer limited to voice calls. With

More information

Mobile Wireless Overview

Mobile Wireless Overview Mobile Wireless Overview A fast-paced technological transition is occurring today in the world of internetworking. This transition is marked by the convergence of the telecommunications infrastructure

More information

GPRS and 3G Services: Connectivity Options

GPRS and 3G Services: Connectivity Options GPRS and 3G Services: Connectivity Options An O2 White Paper Contents Page No. 3-4 5-7 5 6 7 7 8-10 8 10 11-12 11 12 13 14 15 15 15 16 17 Chapter No. 1. Executive Summary 2. Bearer Service 2.1. Overview

More information

The 3GPP and 3GPP2 Movements Towards an All IP Mobile Network. 1 Introduction

The 3GPP and 3GPP2 Movements Towards an All IP Mobile Network. 1 Introduction The 3GPP and 3GPP2 Movements Towards an All IP Mobile Network Girish Patel Wireless Solutions Nortel Networks Richardson, TX grpatel@nortelnetworks.com Steven Dennett Personal Communications Sector Motorola

More information

MANAGED SECURITY SERVICES

MANAGED SECURITY SERVICES MANAGED SECURITY SERVICES Security first Safety first! Security is becoming increasingly important for companies, especially for the extension of networking to mission-critical environments, with new intranet

More information

Implementing LTE International Data Roaming

Implementing LTE International Data Roaming Implementing International Data Roaming Data Roaming Standardization Implementing International Data Roaming On completion of EPC standardization at 3GPP, specifications for international roaming between

More information

IP-based Mobility Management for a Distributed Radio Access Network Architecture. helmut.becker@siemens.com

IP-based Mobility Management for a Distributed Radio Access Network Architecture. helmut.becker@siemens.com IP-based Mobility Management for a Distributed Radio Access Network Architecture helmut.becker@siemens.com Outline - Definition IP-based Mobility Management for a Distributed RAN Architecture Page 2 Siemens

More information

Mobile Office Security Requirements for the Mobile Office

Mobile Office Security Requirements for the Mobile Office Mobile Office Security Requirements for the Mobile Office S.Rupp@alcatel.de Alcatel SEL AG 20./21.06.2001 Overview Security Concepts in Mobile Networks Applications in Mobile Networks Mobile Terminal used

More information

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls

More information

Mobile Communications

Mobile Communications October 21, 2009 Agenda Topic 2: Case Study: The GSM Network 1 GSM System General Architecture 2 GSM Access network. 3 Traffic Models for the Air interface 4 Models for the BSS design. 5 UMTS and the path

More information

Global System for Mobile Communication Technology

Global System for Mobile Communication Technology Global System for Mobile Communication Technology Mobile Device Investigations Program Technical Operations Division DHS - FLETC GSM Technology Global System for Mobile Communication or Groupe Special

More information

Windows Remote Access

Windows Remote Access Windows Remote Access A newsletter for IT Professionals Education Sector Updates Issue 1 I. Background of Remote Desktop for Windows Remote Desktop Protocol (RDP) is a proprietary protocol developed by

More information

ITL BULLETIN FOR JANUARY 2011

ITL BULLETIN FOR JANUARY 2011 ITL BULLETIN FOR JANUARY 2011 INTERNET PROTOCOL VERSION 6 (IPv6): NIST GUIDELINES HELP ORGANIZATIONS MANAGE THE SECURE DEPLOYMENT OF THE NEW NETWORK PROTOCOL Shirley Radack, Editor Computer Security Division

More information

Verizon Wireless White Paper. Verizon Wireless Broadband Network Connectivity and Data Transport Solutions

Verizon Wireless White Paper. Verizon Wireless Broadband Network Connectivity and Data Transport Solutions Verizon Wireless White Paper Verizon Wireless Broadband Network Connectivity and Data Transport Solutions Verizon Wireless White Paper Verizon Wireless Broadband Network Connectivity and Data Transport

More information

A Systemfor Scanning Traffic Detection in 3G WCDMA Network

A Systemfor Scanning Traffic Detection in 3G WCDMA Network 2012 IACSIT Hong Kong Conferences IPCSIT vol. 30 (2012) (2012) IACSIT Press, Singapore A Systemfor Scanning Traffic Detection in 3G WCDMA Network Sekwon Kim +, Joohyung Oh and Chaetae Im Advanced Technology

More information

SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide with Enhanced Logging

SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide with Enhanced Logging SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide with Enhanced Logging 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION:

More information

Security Testing 4G (LTE) Networks 44con 6th September 2012 Martyn Ruks & Nils

Security Testing 4G (LTE) Networks 44con 6th September 2012 Martyn Ruks & Nils Security Testing 4G (LTE) Networks 44con 6th September 2012 Martyn Ruks & Nils 11/09/2012 1 Today s Talk Intro to 4G (LTE) Networks Technical Details Attacks and Testing Defences Conclusions 11/09/2012

More information

Firewalls, Tunnels, and Network Intrusion Detection

Firewalls, Tunnels, and Network Intrusion Detection Firewalls, Tunnels, and Network Intrusion Detection 1 Part 1: Firewall as a Technique to create a virtual security wall separating your organization from the wild west of the public internet 2 1 Firewalls

More information

Draft ITU-T Recommendation X.805 (Formerly X.css), Security architecture for systems providing end-to-end communications

Draft ITU-T Recommendation X.805 (Formerly X.css), Security architecture for systems providing end-to-end communications Draft ITU-T Recommendation X.805 (Formerly X.css), architecture for systems providing end-to-end communications Summary This Recommendation defines the general security-related architectural elements that

More information

GPRS / 3G Services: VPN solutions supported

GPRS / 3G Services: VPN solutions supported GPRS / 3G Services: VPN solutions supported GPRS / 3G VPN soluti An O2 White Paper An O2 White Paper Contents Page No. 3 4-6 4 5 6 6 7-10 7-8 9 9 9 10 11-14 11-12 13 13 13 14 15 16 Chapter No. 1. Executive

More information

Basics of Internet Security

Basics of Internet Security Basics of Internet Security Premraj Jeyaprakash About Technowave, Inc. Technowave is a strategic and technical consulting group focused on bringing processes and technology into line with organizational

More information

Session Hijacking Exploiting TCP, UDP and HTTP Sessions

Session Hijacking Exploiting TCP, UDP and HTTP Sessions Session Hijacking Exploiting TCP, UDP and HTTP Sessions Shray Kapoor shray.kapoor@gmail.com Preface With the emerging fields in e-commerce, financial and identity information are at a higher risk of being

More information

Mobile@Home GSM services over wireless LAN

Mobile@Home GSM services over wireless LAN Mobile@Home GSM services over wireless LAN Martin Bäckström, Andreas Havdrup, Tomas Nylander, Jari Vikberg and Peter Öhman What do you get when you combine mobile telephony with voice over IP (VoIP)? Mobile@Home.

More information

N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work

N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work How Firewalls Work By: Jeff Tyson If you have been using the internet for any length of time, and especially if

More information

Mobility and cellular networks

Mobility and cellular networks Mobility and cellular s Wireless WANs Cellular radio and PCS s Wireless data s Satellite links and s Mobility, etc.- 2 Cellular s First generation: initially debuted in Japan in 1979, analog transmission

More information

UIP1868P User Interface Guide

UIP1868P User Interface Guide UIP1868P User Interface Guide (Firmware version 0.13.4 and later) V1.1 Monday, July 8, 2005 Table of Contents Opening the UIP1868P's Configuration Utility... 3 Connecting to Your Broadband Modem... 4 Setting

More information

HughesNet Broadband VPN End-to-End Security Enabled by the HN7700S-R

HughesNet Broadband VPN End-to-End Security Enabled by the HN7700S-R HughesNet Broadband VPN End-to-End Security Enabled by the HN7700S-R HughesNet Managed Broadband Network Services include a high level of end-toend security utilizing a robust architecture designed by

More information

LTE Overview October 6, 2011

LTE Overview October 6, 2011 LTE Overview October 6, 2011 Robert Barringer Enterprise Architect AT&T Proprietary (Internal Use Only) Not for use or disclosure outside the AT&T companies except under written agreement LTE Long Term

More information

Jarkko Kuisma jikuisma@cc.hut.fi

Jarkko Kuisma jikuisma@cc.hut.fi Jarkko Kuisma jikuisma@cc.hut.fi 1 Roaming the ability for a cellular customer to automatically make & receive voice calls, send & receive data, or access other services when travelling outside the geographical

More information

5.0 Network Architecture. 5.1 Internet vs. Intranet 5.2 NAT 5.3 Mobile Network

5.0 Network Architecture. 5.1 Internet vs. Intranet 5.2 NAT 5.3 Mobile Network 5.0 Network Architecture 5.1 Internet vs. Intranet 5.2 NAT 5.3 Mobile Network 1 5.1The Internet Worldwide connectivity ISPs connect private and business users Private: mostly dial-up connections Business:

More information

Network Security Guidelines. e-governance

Network Security Guidelines. e-governance Network Security Guidelines for e-governance Draft DEPARTMENT OF ELECTRONICS AND INFORMATION TECHNOLOGY Ministry of Communication and Information Technology, Government of India. Document Control S/L Type

More information

Firewalls. Chapter 3

Firewalls. Chapter 3 Firewalls Chapter 3 1 Border Firewall Passed Packet (Ingress) Passed Packet (Egress) Attack Packet Hardened Client PC Internet (Not Trusted) Hardened Server Dropped Packet (Ingress) Log File Internet Border

More information

STAR-GATE TM. Annex: Intercepting Packet Data Compliance with CALEA and ETSI Delivery and Administration Standards.

STAR-GATE TM. Annex: Intercepting Packet Data Compliance with CALEA and ETSI Delivery and Administration Standards. STAR-GATE TM Annex: Intercepting Packet Data Compliance with CALEA and ETSI Delivery and Administration Standards. In this document USA Tel: +1-703-818-2130 Fax: +1-703-818-2131 E-mail: marketing.citi@cominfosys.com

More information

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks

More information

IP Link Best Practices for Network Integration and Security. Introduction...2. Passwords...4 ACL...5 VLAN...6. Protocols...6. Conclusion...

IP Link Best Practices for Network Integration and Security. Introduction...2. Passwords...4 ACL...5 VLAN...6. Protocols...6. Conclusion... IP Link Best Practices for Network Integration and Security Table of Contents Introduction...2 Passwords...4 ACL...5 VLAN...6 Protocols...6 Conclusion...9 Abstract Extron IP Link technology enables A/V

More information

A System for Detecting a Port Scanner in 3G WCDMA Mobile Networks

A System for Detecting a Port Scanner in 3G WCDMA Mobile Networks A System for Detecting a Port Scanner in 3G WCDMA Mobile Networks K. Sekwon 1, O. Joohyung 1, I. Chaetae 1, and K. Inho 2 1 Korea Internet & Security Agency, IT Venture Tower, Jungdaero 135, Songpa, Seoul

More information

Step-by-Step Configuration

Step-by-Step Configuration Step-by-Step Configuration Kerio Technologies Kerio Technologies. All Rights Reserved. Printing Date: August 15, 2007 This guide provides detailed description on configuration of the local network which

More information

GPRS Network Security

GPRS Network Security AT&T Wireless Services, Inc. GPRS Network Security Document Number 12199 Revision 0.4.5 Peter Rysavy, Primary Contributing Writer Product Development AT&T Wireless Services, Inc. PO Box 97061 Redmond,

More information

Security and Authentication Concepts

Security and Authentication Concepts Security and Authentication Concepts for UMTS/WLAN Convergence F. Fitzek M. Munari V. Pastesini S. Rossi L. Badia Dipartimento di Ingegneria, Università di Ferrara, via Saragat 1, 44100 Ferrara, Italy

More information

Technical Notes TN 1 - ETG 3000. FactoryCast Gateway TSX ETG 3021 / 3022 modules. How to Setup a GPRS Connection?

Technical Notes TN 1 - ETG 3000. FactoryCast Gateway TSX ETG 3021 / 3022 modules. How to Setup a GPRS Connection? FactoryCast Gateway TSX ETG 3021 / 3022 modules How to Setup a GPRS Connection? 1 2 Table of Contents 1- GPRS Overview... 4 Introduction... 4 GPRS overview... 4 GPRS communications... 4 GPRS connections...

More information

Chapter 3: WLAN-GPRS Integration for Next-Generation Mobile Data Networks

Chapter 3: WLAN-GPRS Integration for Next-Generation Mobile Data Networks Chapter 3: WLAN-GPRS Integration for Next-Generation Mobile Data Networks IEEE Wireless Communication, Oct. 2002 Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National

More information

Practical Security Testing for LTE Networks BlackHat Abu Dhabi December 2012 Martyn Ruks & Nils

Practical Security Testing for LTE Networks BlackHat Abu Dhabi December 2012 Martyn Ruks & Nils Practical Security Testing for LTE Networks BlackHat Abu Dhabi December 2012 Martyn Ruks & Nils 06/11/2012 1 Today s Talk Intro to LTE Networks Technical Details Attacks and Testing Defences Conclusions

More information

3G TS 29.119 V1.0.0 (1999-10)

3G TS 29.119 V1.0.0 (1999-10) 3G TS 29.119 V1.0.0 (1999-10) Technical Specification 3rd Generation Partnership Project; Technical Specification Group Core Network; GPRS Tunnelling Protocol (GTP) specification for GLR (3G TS 29.119

More information

Industrial Communication. Securing Industrial Wireless

Industrial Communication. Securing Industrial Wireless Industrial Communication Whitepaper Securing Industrial Wireless Contents Introduction... 3 Wireless Applications... 4 Potential Threats... 5 Denial of Service... 5 Eavesdropping... 5 Rogue Access Point...

More information

Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment

Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment White Paper Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment Cisco Connected Analytics for Network Deployment (CAND) is Cisco hosted, subscription-based

More information

Using a VPN with Niagara Systems. v0.3 6, July 2013

Using a VPN with Niagara Systems. v0.3 6, July 2013 v0.3 6, July 2013 What is a VPN? Virtual Private Network or VPN is a mechanism to extend a private network across a public network such as the Internet. A VPN creates a point to point connection or tunnel

More information

My FreeScan Vulnerabilities Report

My FreeScan Vulnerabilities Report Page 1 of 6 My FreeScan Vulnerabilities Report Print Help For 66.40.6.179 on Feb 07, 008 Thank you for trying FreeScan. Below you'll find the complete results of your scan, including whether or not the

More information

Securing Next Generation Mobile Networks

Securing Next Generation Mobile Networks White Paper October 2010 Securing Next Generation Mobile Networks Overview As IP based telecom networks are deployed, new security threats facing operators are inevitable. This paper reviews the new mobile

More information

Architecture Overview

Architecture Overview Architecture Overview Design Fundamentals The networks discussed in this paper have some common design fundamentals, including segmentation into modules, which enables network traffic to be isolated and

More information

Penetration Testing with Kali Linux

Penetration Testing with Kali Linux Penetration Testing with Kali Linux PWK Copyright 2014 Offensive Security Ltd. All rights reserved. Page 1 of 11 All rights reserved to Offensive Security, 2014 No part of this publication, in whole or

More information

Network Concepts. IT 4823 Information Security Concepts and Administration. The Network Environment. Resilience. Network Topology. Transmission Media

Network Concepts. IT 4823 Information Security Concepts and Administration. The Network Environment. Resilience. Network Topology. Transmission Media IT 4823 Information Security Concepts and Administration March 17 Network Threats Notice: This session is being recorded. Happy 50 th, Vanguard II March 17, 1958 R.I.P. John Backus March 17, 2007 Copyright

More information

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS

More information

LifeSize Transit Deployment Guide June 2011

LifeSize Transit Deployment Guide June 2011 LifeSize Transit Deployment Guide June 2011 LifeSize Tranist Server LifeSize Transit Client LifeSize Transit Deployment Guide 2 Firewall and NAT Traversal with LifeSize Transit Firewalls and Network Address

More information

Chapter 10 VoIP for the Non-All-IP Mobile Networks

Chapter 10 VoIP for the Non-All-IP Mobile Networks Chapter 10 VoIP for the Non-All-IP Mobile Networks Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University Outline 10.1 GSM-IP: VoIP Service for GSM 256

More information

State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD005.001. Effective Date: April 7, 2005

State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD005.001. Effective Date: April 7, 2005 State of New Mexico Statewide Architectural Configuration Requirements Title: Network Security Standard S-STD005.001 Effective Date: April 7, 2005 1. Authority The Department of Information Technology

More information

Final exam review, Fall 2005 FSU (CIS-5357) Network Security

Final exam review, Fall 2005 FSU (CIS-5357) Network Security Final exam review, Fall 2005 FSU (CIS-5357) Network Security Instructor: Breno de Medeiros 1. What is an insertion attack against a NIDS? Answer: An insertion attack against a network intrusion detection

More information

Firewalls. Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ Ola.Flygt@vxu.se +46 470 70 86 49. Firewall Design Principles

Firewalls. Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ Ola.Flygt@vxu.se +46 470 70 86 49. Firewall Design Principles Firewalls Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ Ola.Flygt@vxu.se +46 470 70 86 49 1 Firewall Design Principles Firewall Characteristics Types of Firewalls Firewall Configurations

More information

Remote Access Security

Remote Access Security Glen Doss Towson University Center for Applied Information Technology Remote Access Security I. Introduction Providing remote access to a network over the Internet has added an entirely new dimension to

More information

CS5008: Internet Computing

CS5008: Internet Computing CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is

More information

While every effort was made to verify the following information, no warranty of accuracy or usability is expressed or implied.

While every effort was made to verify the following information, no warranty of accuracy or usability is expressed or implied. AG082411 Objective: How to set up a 3G connection using Static and Dynamic IP addressing Equipment: SITRANS RD500 Multitech rcell MTCBAH4EN2 modem PC with Ethernet card Internet explorer 6.0 or higher

More information

Exam Questions SY0-401

Exam Questions SY0-401 Exam Questions SY0-401 CompTIA Security+ Certification http://www.2passeasy.com/dumps/sy0-401/ 1. A company has implemented PPTP as a VPN solution. Which of the following ports would need to be opened

More information

About Firewall Protection

About Firewall Protection 1. This guide describes how to configure basic firewall rules in the UTM to protect your network. The firewall then can provide secure, encrypted communications between your local network and a remote

More information

Security vulnerabilities in the Internet and possible solutions

Security vulnerabilities in the Internet and possible solutions Security vulnerabilities in the Internet and possible solutions 1. Introduction The foundation of today's Internet is the TCP/IP protocol suite. Since the time when these specifications were finished in

More information

Chapter 9 Monitoring System Performance

Chapter 9 Monitoring System Performance Chapter 9 Monitoring System Performance This chapter describes the full set of system monitoring features of your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. You can be alerted to important

More information