LTE Pwnage: Hacking HLR/HSS and MME Core Network Elements. P1 Security
|
|
|
- Jeffrey Williamson
- 10 years ago
- Views:
Transcription
1 LTE Pwnage: Hacking HLR/HSS and MME Core Network Elements P1 Security 1
2 LTE ENVIRONMENT 2
3 LTE Network Overview 3
4 Corporate & Mobile Data risk increased LTE from agackers perspechve All IP always on always vulnerable? Spear- Phishing Botnets & Malware Flooding Trojan & Backdoors IPv6 renders NAT protechon inefficient Split Handshake TCP agacks prevents IPS and AnHvirus Very familiar architecture for agackers: ATCA, Linux Intricate and new protocols: Diameter, S1, X2, GTP 4
5 2G 3G to LTE: Reality and Legacy 2G 3G LTE BTS Node B enode B BSC merged into Node B merged into enode B MSC / VLR RNC MME, MSC Proxy HLR HLR, IMS HSS, HE LTE SAE HSS, SDR/SDM STP STP, SG Legacy STP GGSN GGSN PDN GW SGSN SGSN MME/SGW IN IN/PCRF PCRF RAN Firewall RAN Firewall SeGW 5
6 User data content: LTE User Plane 6
7 LTE Network AGack Surface Full IP only? No: full IP double exposure Packets (PS Domain) 2x agack surface GTP shll present S1AP/X2AP new Circuits (CS Domain) 2x agack surface SIGTRAN & SS7 will stay for many years IMS & Diameter 7
8 3G and LTE together RAN EPC 8
9 CSFB vs. VOLTE vulnerability agack surface CSFB CS Fall Back from 4G to 3G Past is present SS7 and SIGTRAN stack vulnerabilihes (DoS, spoof, ) VOLTE Whole new agack surface New APN, new network to hack, new servers, Closer to the Core Network == more serious vulns IMS (CSCF = SIP server, DNS, ) Standard? No 9
10 ISUP injechon in SIP through VOLTE Yes, SIP known but Internet SIP + SS7 ISUP == SIP- I and SIP- T == ISUP InjecHon! Remote Core Network DoS SS7 compromise External signaling injection Spoofing of ISUP messages Fake billing Ouch!
11 11
12 CSFB AGack surface through MSC Proxy and SS7 + SIGTRAN All SIGTRAN agack surface exposed All SS7 agack surface exposed Most dangerous: Logical Denial of Service agacks SSP- based SCCP DoS (P1 CVID#480) TFP- based SS7 DoS (P1 CVID#481) Equipment Crash/Denial of Service agacks Ericsson MSC Crash DoS (P1 VID#330) NSN HLR Crash DoS (P1 VID#148) Ericsson STP Crash DoS (P1 VID#187) 12
13 P1vid# NSN NGHLR remote Denial of Service caused by fragile SS7 stack Severity Critical Description Impact NGHLR SS7 stack software is not robust and suffers from Remote Denial of Service. Enables any person sending malicious SCCP traffic to the HLR to crash it. This includes the whole international SS7 network as HLRs need always to be globally reachable. Reliability for telco Ability to cope with X million of requests Not Ability to cope with malformed traffic
14 P1vid# GSM MAP primihve MAP_FORWARD_ACCESS_SIGNALLING enables RAN signaling injechon Severity Medium Spoofed Description This GSM MAP MSU "MAP_FORWARD_ACCESS_SIG NALLING" forwards any content to the Radio Access Network (RAN). Normal Impact The result is that some external entities may send or spoof MAP_FORWARD_ACCESS_SIGN ALLING MSUs to target MSC GTs and have the vulnerable MSCs to inject this signaling into the radio network (typically RANAP). Spoof and inject radio signaling As if it was coming from Radio Network
15 P1vid# Fun AnH- forensics Same agack as VID#187 Also crash Ericsson traffic monitoring log analysis forensic tools (P1 VKD VID#213) Code sharing between enforcement and forensic tools 15
16 3G and LTE together RAN EPC 16
17 Peer to Peer Radio Access Network X2AP enodeb s Peer to Peer TranslaHon Every base stahon can talk to every other Network agack surface increase Total spread into the RAN network Operator- wide L2 network L2 agacks, less defense in depth, scanning only blocked by size of network Did GTP disappear? No 17
18 User data btw enbs: LTE User Plane 18
19 LTE RAN Overview Evolved Packet Network (EPC) MME SGW Mul OSS-RC SeGW LTE RAN S1 CP S1 UP IP/Ethernet transport Mul S1 X2 Mul S1 X2 Mul S1 X2 Typically a common physical connection! 19
20 Pwning OSS: L2 network mistakes always happen Can t catch it with mulhple overlapping /8 networks: automate! From any enodeb to the NMS From any enodeb to any enodeb You can bet on insecure provisioning American example & Remote misconfigurahon 20
21 enodeb Hardware AGacks Ericsson RBS 6602 DUS (2G+3G+4G) & DUL (4G) Radio Uplink to DWDM / Optical net Local Ethernet ports (not TDM anymore) Hardware (in)security system 21
22 LTE: Equipment AGack surface increase Diameter (New) Added surface New code, maturity in queshon Very few commercial fuzzers support it Even less really trigger bugs in Diameter (depth pbm) S1/X2AP (New) GTP + MAP within two completely new protocols With encapsulahon of user traffic (Non Access Stratum protocol) What could possibly go wrong? 22
23 23
24 24
25 Diameter audit/fuzzing problem 25
26 Auditor bias #1: Open standards doesn't mean vision Diameter Nearly every parameter is ophonal Result Nobody knows what is a valid combinahon To test / fuzz / inject Combinatorial explosion Sequence / Dialogue / Flow AVP combinahon AVP values Fuzzed parameter Even manufacturer don t know how to successfully instrument the Device Under Test Fuzzer Support is not Fuzzer successful triggering 26
27 Auditor bias #2: Fuzzing is as deep as fuzzer goes And fuzzer never go deep enough Commercial fuzzer 0 trigger/1000 iteration! Standard own fuzzer 13 triggers/1000 iterations!! Need target- specific development Customized own fuzzer: 85 triggers/1000 iterations! 27
28 LTE: New risk with Diameter Diameter informahon network disseminahon Diameter awesomeness distribuhon/centralizahon its own evil side Present in many database HSS, SDM/SDR, CUD The goal was to centralize The result is one more database 28
29 LTE Huawei Specific USN = SGSN + MME UGW = SeGW + SGW + PDN GW / PGW 29
30 Pwning LTE HSS: C++ SQL InjecHon everywhere 30
31 LTE HSS Pwning methodology OSS is considered Core It is accessible by enodebs SomeHme: Network filtering mistakes Osen: Allowed for Provisionning OSS can connect to HSS HSS exports too many services Mux/Tunnel kind of thinking one port == many services 31
32 LTE EPC funchonal plane, no OAM 32
33 Add OAM: complexity explosion 33
34 Auditor bias #3: Manual vision is always incomplete Need some automahon 200 APNs * 16 million IPs == need to have dedicated scanner Each valid GTP tunnel is a new 16 millions IPs to scan Address space explosion You CANNOT do it manually You CANNOT do it without specific scanners 34
35 Pwning MME: Hardcoded encryphon keys P1 VKB CVID#485 DES Hardcoded keys everywhere 35
36 Demo 36
37 Legacy PS Interfaces of interest to LTE Gi : Interface from GGSN to Internet Gn : Interface between SGSN and other SGSN and (internal) GGSN Gp : Interface between Internal SGSN and external GGSN (GRX used here) 37
38 Leaks to Internet Passive DNSmon Leaks to GPRS Leaks to 3G data Leaks to LTE EPC edns vs idns
39 Legacy GPRS / UMTS GRX TLD / Domain.gprs Quite monolithic: APN RAI rai<rai>. mnc08. mcc204.gprs Only APNs and some network element 39
40 IMS DNS 3gppnetwork.org Supports and lists all Network Element LAC RAC Examples rac<rac>.lac<lac>.mnc08.mcc204.gprs 40
41 LTE EPC DNS Same as IMS DNS but extended Supports and lists most SAE EPC Network Elements MME SGW Examples mmec<mmec>.mmegi<mmegi>.mme.epc.mnc99.mcc208.3gppnetwork.org! 41
42 Pwning from LTE mobile Infrastructure Reverse path protechon LTE Mobile data access RFC1918 leaks (SomeHme) Datacom IP infrastructure access (Now more osen) NAT CGNAT 42
43 Pwning from external: Direct MML access from Internet Pwning from external without any reverse path trick. Shodan doesn t work on these MML agack surface exposed NAT CGNAT 43
44 Auditor bias #4: Testbed is always more secure Testbed is more secure than produchon Legacy impact Scalability impact Audit is osen only permiged in testbed Liability PotenHal for Denial of Service Result AGackers advantage ProducHon goes untested 44
45 Auditor bias #4: Testbed is always more secure Testbed is more secure than produchon Legacy impact Scalability impact There s always something more on the prod network Audit is osen only permiged in testbed Liability PotenHal for Denial of Service Result AGackers advantage ProducHon goes untested 45
46 Technical Capacity & Knowledge issue Who Can audit all new LTE protocols and legacy protocols Has experhse on the architectures & vendors equipment Guarantee Scanning quality Coverage on all protocols & arch (CSFB, IMS, Hybrid, SCharge) Cover all perimeters and accesses APNs GRX & IPX accesses Split DNS User plane and control plane 46
47 Conclusion LTE is supposed to be built with security Difference between standardizahon and real security Network Equipment Vendors are shll lagging Opening up of the technology Good: deeper independent security research Operators SHll disinformed by vendors Security through obscurity in 2013! Unbelievable! Some are gezng proachve 47
48 Contact: hgp:// THANKS! SEE YOU AT: HACKITO ERGO SUM MAY PARIS, FRANCE 48
49 BACKUP SLIDES 49
50 Interfaces 50
51 LTE Network 51
52 Previous LTE services & missions LTE Complete infrastructure audit Huawei LTE EPC Core Network audit & vulnerability research LTE CSFB infrastructure integrahon with legacy audit both Diameter, S1, X2 and SS7 integrahon for CS FallBack Ericsson enodeb audit and product security review Diameter security audit on LTE & IMS Core 52
53 LTE audit milestones 1. External LTE teshng, scan & audit (blackbox) LTE new elements IntegraHon with legacy 2. LTE eran onsite audit enodeb, enrollment, configurahon & PSR/PVR OSS & OAM 3. LTE EPC Core Network audit MME S- GW & PDN GW HSS PCRF 4. MBSS Minimum Baseline Security Standard LTE eran: enodeb, SeGW, OSS & enrollment servers LTE EPC: MME, S- GW, PCRF, HSS, PDN GW, MSC Proxy 53
54 INTERFACES 54
55 Interfaces 55
56 ADDRESSING IN LTE 56
57 Core Network: IP addresses everywhere Everything uses IP addresses User: UE, RAN: enodeb, SeGW EPC: MME, HSS, SGW, PGW IPv4 IPv6 is actually really being supported 57
58 Telecom- specific addressing End user addresses: GUTI, IMSI, 58
59 GUTI Globally Unique Temporary IdenHty (GUTI) Allocated by the MME to the UE GUTI = GUMMEI + M- TMSI GUMMEI = Globally Unique MME ID GUMMEI = MNC + MCC + MMEI MMEI = MMEGI + MMEC» MMEGI = MME Group ID» MMEC = MME Code M- TMSI == MME TMSI GPRS/UMTS P- TMSI - > LTE M- TMSI S- TMSI = MMEC + M- TMSI 59
60 GUTI in Pictures 60
61 RAI/P- TMSI mapping to GUTI! 61
62 GUTI mapping to P- TMSI! 62
63 TAC and RNC ID! 63
64 ADRESS MAPPING IN DNS 64
65 Legacy GPRS / UMTS GRX TLD / Domain.gprs Quite monolithic: APN RAI rai<rai>. mnc08. mcc204.gprs 65
66 IMS DNS 3gppnetwork.org Supports LAC RAC Examples rac<rac>.lac<lac>.mnc08.mcc204.gprs 66
67 LTE EPC DNS Same as IMS DNS but extended Supports MME SGW Examples mmec<mmec>.mmegi<mmegi>.mme.epc.mnc99.mcc 208.3gppnetwork.org 67
68 TECHNOLOGY BACKGROUNDER 68
69 LTE Data Terminology GTP = GPRS Tunneling Protocol EPS = Evolved Packet Service, LTE data sessions EPC = Evolved Packet Core, the LTE core network APN = Access Point Name (same as 2G/3G) Bearer = PDP session, GTP Tunnel for a given used SeGW = Security Gateway, segments enb / EPC SGW = Serving Gateway, like GGSN, connects to Internet 69
70 PDP Context vs. EPS Bearer UMTS and GPRS data session Packet Data Protocol (PDP) Context AGach (Alert SGSN) - > PDP Context AcHvaHon procedure LTE data session Evolved Packet System (EPS) Bearer Default EPS Bearer Dedicated EPS Bearer Both use parameters: Access Point Name (APN), IP address type, QoS parameters 70
71 LTE GTP = egtp GTP- U From enodeb to PDN GW PGW aka Internet exit node Used to be the GGSN 71
72 GTP- U udp/
73 LTE Control Plane: enodeb- MME 73
74 S1AP sctp/
75 LTE Control Plane: enodeb- enodeb 75
76 X2AP sctp/
77 Protocol and port matrix Communicating nodes Protocol ports Protocol Source Destination Source Destination enodeb S-GW GTP-U/UDP S-GW enodeb GTP-U/UDP enodeb enodeb GTP-U/UDP enodeb MME S1AP/SCTP MME enodeb S1AP/SCTP enodeb enodeb X2AP/SCTP
78 All is ASN1 All protocols described in ASN1 Different kind of Encoding BER Basic, standard TLV PER Packed, Aligned (APER) Unaligned (UPER) Described in ITU and 3GPP standards Require ASN1 CLASS keywords 78
79 LTE SIGNALING 79
80 Diameter Everywhere Diameter replaces SS7 MAP DSR Diameter Signaling Router 80
81 81
82 82
83 83
84 Security implicahon SCTP filtering to be generalized Benefit SCTP is config first most of the Hme Threat IP cloud is much more exploitahon friendly AGack techniques are known to many people Compromise consequences are more far- reaching than SS7 84
85 Diameter Roaming 85
86 Security rouhng and filtering in Diameter DSR Define rouhng & filtering rules Discriminants Indicators DesHnaHon- based: Realm, Host, ApplicaHon- ID OriginaHon- based: Realm, Host, ApplicaHon- ID Command- Code IMSIAddress 86
87 Future Diameter RouHng & Filtering 87
88 Security & Vulnerability of EPC Roaming Filtering even more important DSR filtering is not mature GRX problems amplified Impact of the GRX/IPX/IMS/SAE EPC DNS infrastructure in InformaHon Gathering Unique IdenHfier leaks much easier Privacy consequences 88
89 TESTING 89
90 TesHng Security in an LTE Environment Two kind of environment Testbed Live (also called ProducHon, Greenfield, AcHve) 90
91 LTE Testbed Security teshng Shielded teshng enodeb antenna output connected to a cable Cable arrives in test room A Shielded box in test room is connected to cable Phone / USB dongle is put inside the box for tests USB cable goes out of the box toward the test PC No RF is polluhng the spectrum Enables pre- auchon teshng 91
92 RelaHonship to Vendors Vendor usually prevent audit By limihng informahon By limihng access to Device Under Test By limihng access to testbed By threatening of potenhal problems, delays, responsibility, liability Most of the LTE teshng can happen transparently The vendor doesn t see the security audit team Presented as normal operator qualificahon Not presented as security audit Result only is presented when audit is finished 92
93 AUDITS 93
94 GTP Endpoint discovery Illegal connechon/associahon establishment User idenhty impersonahon Fuzzing Leak of user traffic to Core Network (EPC) to LTE RAN 94
95 X2AP Audit Endpoint discovery Illegal connechon/associahon establishment Fuzzing Reverse engineering of proprietary extensions MITM 95
96 S1AP Audit Endpoint discovery Illegal connechon/associahon establishment Fuzzing Reverse engineering of proprietary extensions MITM NAS injechon 96
97 LTE EPC DNS Audit EPC DNS is important EPC DNS scanner Close to GRX / IMS 97
98 ATTACKS 98
99 User agacks: EPS Bearer Security AGacks APN Bruteforcing IP SegmentaHon accessing operators RFC1918 internal networks GTP endpoint discovery from within Bearer Data Session Secondary EPS Bearer ExhausHon/Flood load DoS Max 11 to be tested Repeat setup/teardown of connechons PGW DiffServ teshng Scans the IP header DS bits (DifferenHated Services) to see difference in treatment by PGW 99
100 TOOLS 100
101 Basic audit tools LTE SIM card LTE USB Dongle LTE UE (User Equipment) = Phone RJ45 for Ethernet connechon to EPC/EUTRAN Wireshark Sakis3G and evoluhons for LTE support IPsec audit tool 101
102 Ideal audit tools GTP protocol stack & fuzzer SCTP MITM tool & fuzzer Ethernet/ARP MITM tool (egercap) S1AP protocol stack & fuzzer NAS protocol stack & fuzzer X2AP protocol stack & fuzzer Diameter protocol stack & fuzzer GRX, IMS, EPC DNS scanner 102
103 VirtualizaHon targets Huawei In progress HSS MSC Proxy PotenHal USN, Serving GW, PDN GW, MME ehrs integrated node (MME, HSS, SGW, PGW, ) Easier because one single node HP opportunity? 103
104 LTE Network VirtualizaHon 104
105 Huawei ATCA vs. PGP OSTA 2.0 Linux based OpenSuse 10.x or 11.x Old, unpatched kernel Proprietary extensions and SMP Some FPGA based boards Some OEM based integrahon (Switches AR40, Routers, ) PGP Older architecture More monolithic Harder to replicate 105
106 Hard problems Use same kernel (medium) Use licensing (medium) Load signed kernel modules (medium hard) Emulate FPGA and OEM integrahon (hard) Replicate network services / other NEs (hard) 106
107 HSS ATCA / OSTA 2.0 Few external hardware Moderately easy OperaHon in progress Based on HSS_V900R
108 Virtualizing in context (CSFB) RAN EPC 108
109 MSC Proxy ATCA / OSTA 2.0 No external hardware Moderately easy ConfiguraHon with exishng SS7 SIGTRAN infrastructure Diameter testbed 109
110 USN USN_V900R011C02SPC100 Harder 110
111 Ericsson Difficult to deal with them Very protechve Access Licensing DocumentaHon 111
112 NSN PotenHally easier than Ericsson Linux based (SGSN, ) MontaVista Some security features 112
113 Cisco Some virtualizahon done IOS 12.x Some virtualizahon needs hardware Cisco 7200 Cisco ITP Cisco GGSN Virtual networking Our technology for adapted virtualizahon 113
114 Our advantage so far Virtualize x86 with specific/signed kernels and modules Virtualize MIPS EmulaHon of specific hardware support Kernel modules development Virtualize ARM Android based device for customer simulahon 114
115 Mobile + VAS virtualizahon Specific demand from customer Virtualize x86 based server Virtualize Android clients Simulate fraudulent transachon within this flow Inject faults within repeated traffic 115
116 VIRTUALIZED SIGNALING FUZZING 116
117 Principle Proxies M3UA Proxy S1/X2 Proxy Diameter Proxy Made transparent SCTP Man in the Middle Packet forwarding 117
118 LTE increases risks Financial thes Privacy thes Hacking of corporate users M2M impact of worms and agacks LTE Mobile broadband usage as main internet connechon Protocols are untested and tradihonal fuzzer coverage is weak and shallow Network equipment is new and not as reliable as tradihonal network elements 118
119 Questions? 119
Security Testing 4G (LTE) Networks 44con 6th September 2012 Martyn Ruks & Nils
Security Testing 4G (LTE) Networks 44con 6th September 2012 Martyn Ruks & Nils 11/09/2012 1 Today s Talk Intro to 4G (LTE) Networks Technical Details Attacks and Testing Defences Conclusions 11/09/2012
Practical Security Testing for LTE Networks BlackHat Abu Dhabi December 2012 Martyn Ruks & Nils
Practical Security Testing for LTE Networks BlackHat Abu Dhabi December 2012 Martyn Ruks & Nils 06/11/2012 1 Today s Talk Intro to LTE Networks Technical Details Attacks and Testing Defences Conclusions
Worldwide attacks on SS7 network
Worldwide attacks on SS7 network P1 Security Hackito Ergo Sum 26 th April 2014 Pierre-Olivier Vauboin ([email protected]) Alexandre De Oliveira ([email protected]) Agenda Overall telecom architecture Architecture
LTE Attach and Default Bearer Setup Messaging
LTE Attach and Default Bearer Setup Messaging 2012 Inc. All Rights Reserved LTE Attach Message Sequence Chart enodeb MME SGW HSS Initial UE Message Update Location Update Location Answer Create Session
LTE Overview October 6, 2011
LTE Overview October 6, 2011 Robert Barringer Enterprise Architect AT&T Proprietary (Internal Use Only) Not for use or disclosure outside the AT&T companies except under written agreement LTE Long Term
SS7 & LTE Stack Attack
SS7 & LTE Stack Attack Ankit Gupta Black Hat USA 2013 [email protected] Introduction With the evolution of IP network, Telecom Industries are using it as their core mode of communication for their network
LTE transport network security Jason S. Boswell Head of Security Sales, NAM Nokia Siemens Networks
LTE transport network security Jason S. Boswell Head of Security Sales, NAM Nokia Siemens Networks 1 Nokia Siemens Networks New evolved Networks - new security needs Walled Garden Transport & Protocols
Voice over IP over LTE (VoLTE) Impacts on LTE access. EFORT http://www.efort.com
1 Introduction Voice over IP over LTE (VoLTE) Impacts on LTE access EFORT http://www.efort.com IMS (IP Multimedia Subsystems) has been around for some time, and many infrastructure vendors have invested
LTE X2 Handover Messaging
LTE X2 Handover Messaging 2013 Inc. All Rights Reserved LTE X2 Handover Sequence Diagram UE Target enodeb Source enodeb MME SGW Handover Confirm X2AP Handover Request X2AP Handover Request Acknowledge
4G Mobile Networks At Risk
07.05.1203 Consortium Attack analysis and Security concepts for MObile Network infastructures supported by collaborative Information exchange 4G Mobile Networks At Risk The ASMONIA Threat and Risk Analysis
Delivery of Voice and Text Messages over LTE
Delivery of Voice and Text Messages over LTE 1. The Market for Voice and SMS! 2. Third Party Voice over IP! 3. The IP Multimedia Subsystem! 4. Circuit Switched Fallback! 5. VoLGA LTE was designed as a
Remotely crashing HLR MSC STP
Remotely crashing HLR MSC STP MME Why it took telecom industry 20 years to recognize the problems with SS7 Philippe Langlois, P1 Security Intro Philippe Langlois Founder of Qualys, Worldnet, TSTF, WaveSecurity,
Advanced SIP Series: SIP and 3GPP Operations
Advanced S Series: S and 3GPP Operations, Award Solutions, Inc Abstract The Session Initiation Protocol has been chosen by the 3GPP for establishing multimedia sessions in UMTS Release 5 (R5) networks.
Implementing LTE International Data Roaming
Implementing International Data Roaming Data Roaming Standardization Implementing International Data Roaming On completion of EPC standardization at 3GPP, specifications for international roaming between
How to secure an LTE-network: Just applying the 3GPP security standards and that's it?
How to secure an LTE-network: Just applying the 3GPP security standards and that's it? Telco Security Day @ Troopers 2012 Peter Schneider Nokia Siemens Networks Research 1 Nokia Siemens Networks 2012 Intro
NTT DOCOMO Technical Journal. Core Network Infrastructure and Congestion Control Technology for M2M Communications
M2M 3GPP Standardization Further Development of LTE/LTE-Advanced LTE Release 10/11 Standardization Trends Core Network Infrastructure and Congestion Control Technology for M2M Communications The number
Diameter in the Evolved Packet Core
Diameter in the Evolved Packet Core A Whitepaper November 2009 Page 2 DIAMETER in the Evolved Packet Core Mobile broadband is becoming a reality, as the Internet generation grows accustomed to having broadband
IP Multimedia System: general aspects and migration perspectives
IMS TPC EPC IP Multimedia System: general aspects and migration perspectives Dr. Leo Lehmann Federal Office of Communication, Switzerland ITU Workshop on Developments regarding telecommunication network
Mobile network evolution A tutorial presentation
Mobile network evolution A tutorial presentation Andy Sutton Principal Design Consultant - Transport Networks Avren Events, Time and Sync in Telecoms, Dublin, Ireland Tuesday 2 nd November 2010 hello About
Long-Term Evolution. Mobile Telecommunications Networks WMNet Lab
Long-Term Evolution Mobile Telecommunications Networks WMNet Lab Background Long-Term Evolution Define a new packet-only wideband radio with flat architecture as part of 3GPP radio technology family 2004:
UNDERSTANDING CORE TELECOM SECURITY
SOLUTION BRIEF -TELECOM UNDERSTANDING CORE TELECOM SECURITY If you think you re not affected, consider that a 2013 Congressional survey of more than 150 utility companies revealed more than a dozen utilities
Telecom Signaling attacks on 3G and LTE networks
Telecom Signaling attacks on 3G and LTE networks from SS7 to all-ip, all open [email protected] P1 Security Inc. v1.1 Telecom security intro! SIP, PBX,...! Periphery, customer side.! Long gone
Wanderlust: Enabling roaming in the LTE era. Don Troshynski Vice President, Solutions Architecture
Wanderlust: Enabling roaming in the LTE era Don Troshynski Vice President, Solutions Architecture Acme Packet Trusted, first-class services and applications Apps & services Session delivery network April
Security researcher at P1 Security. Hacking Telco equipment: The HLR/HSS Laurent Ghigonis P1 Security
Hacking Telco equipment The HLR/HSS Laurent Ghigonis Security researcher at P1 Security What are we talking about? A mobile network operator Core Network Network passive capture showing Global Titles Mobile
Applying Software Defined Networks and Virtualization Concepts for Next Generation Mobile Broadband Networks
BROADBAND UKRAINE: 12th June 2013, Kiev, Ukraine FOKUS Center for Next Generation Network Infrastructures (NGNI) Applying Software Defined Networks and Virtualization Concepts for Next Generation Mobile
Cisco ASR 5000 Mobility Management Entity Administration Guide
Cisco ASR 5000 Mobility Management Entity Administration Guide Version 14.0 Last Updated February 28, 2014 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com
Protocol Signaling Procedures in LTE
White Paper Protocol Signaling Procedures in LTE By: V. Srinivasa Rao, Senior Architect & Rambabu Gajula, Lead Engineer Overview The exploding growth of the internet and associated services has fueled
Technical white paper. Enabling mobile broadband growth Evolved Packet Core
Technical white paper Enabling mobile broadband growth Evolved Packet Core Contents 3 Enabling mobile broadband growth 4 Enabling migration from current networks to LTE 4 Terminology 5 The demand for cost-effective
Public Safety Communications Research. LTE Demonstration Network Test Plan. Phase 3 Part 1: Network Interoperability & Drive Test. Version 2.
Public Safety Communications Research LTE Demonstration Network Test Plan Phase 3 Part 1: Network Interoperability & Drive Test Version 2.4 May 7, 2013 1 1 Contents 2 List of Tables... 5 3 List of Figures...
Telecommunication Services Engineering (TSE) Lab. Chapter III 4G Long Term Evolution (LTE) and Evolved Packet Core (EPC)
Chapter III 4G Long Term Evolution (LTE) and Evolved Packet Core (EPC) http://users.encs.concordia.ca/~glitho/ Outline 1. LTE 2. EPC architectures (Basic and advanced) 3. Mobility management in EPC 4.
Mobile Devices Security: Evolving Threat Profile of Mobile Networks
Mobile Devices Security: Evolving Threat Profile of Mobile Networks SESSION ID: MBS-T07 Anand R. Prasad, Dr.,ir., Selim Aissi, PhD Objectives Introduction Mobile Network Security Cybersecurity Implications
UMTS/GPRS system overview from an IP addressing perspective. David Kessens Jonne Soininen
UMTS/GPRS system overview from an IP addressing perspective David Kessens Jonne Soininen Introduction 1) Introduction to 3GPP networks (GPRS, UMTS) Technical overview and concepts for 3GPP networks Mobility
Whitepaper. 10 Metrics to Monitor in the LTE Network. www.sevone.com blog.sevone.com [email protected]
10 Metrics to Monitor in the LTE Network The deployment of LTE increases dependency on the underlying network, which must be closely monitored in order to avert serviceimpacting events. In addition, the
Contents VULNERABILITIES OF MOBILE INTERNET (GPRS), 2014
VULNERABILITIES OF MOBILE INTERNET (GPRS) Dmitry Kurbatov Sergey Puzankov Pavel Novikov 2014 Contents 1. Introduction 2. Summary 3. Mobile network scheme 4. GTP protocol 5. Searching for mobile operator
IP-based Mobility Management for a Distributed Radio Access Network Architecture. [email protected]
IP-based Mobility Management for a Distributed Radio Access Network Architecture [email protected] Outline - Definition IP-based Mobility Management for a Distributed RAN Architecture Page 2 Siemens
SAE and Evolved Packet Core
SAE and Evolved Packet Core Farooq Bari Seattle Communications (COM-19) Society Chapter Nov. 13, 2008 1 SAE/EPS Background Around 2005, 3GPP RAN groups initiated the LTE work and in parallel the SAE work
CS Fallback Function for Combined LTE and 3G Circuit Switched Services
EPC Voice over Circuit Switched Services Special Articles on SAE Standardization Technology CS Fallback Function for Combined and Circuit Switched Services The PP, an international standardization body
Overview of the Evolved packet core network
UNIVERSITY OF ALBERTA Overview of the Evolved packet core network Project report submitted to the Faculty of graduate studies and research University of Alberta In partial fulfillment of the requirements
Architecture Overview NCHU CSE LTE - 1
Architecture Overview NCHU CSE LTE - 1 System Architecture Evolution (SAE) Packet core networks are also evolving to the flat System Architecture Evolution (SAE) architecture. This new architecture optimizes
Introduction to Evolved Packet Core
S T R A T E G I C W H I T E P A P E R Introduction to Evolved Packet Core This white paper provides a brief introduction to Evolved Packet Core a new mobile core for LTE. Herein, key concepts and functional
FIGHTING FRAUD ON 4G. Neutralising threats in the LTE ecosystem
FIGHTING FRAUD ON 4G Neutralising threats in the LTE ecosystem TABLE OF CONTENTS Introduction...3 New and Old Vulnerabilities...4 Identity Management...5 A Unified Response...6 Data Mining...7 An Evolving
Single Radio Voice Call Continuity. (SRVCC) with LTE. White Paper. Overview. By: Shwetha Vittal, Lead Engineer CONTENTS
White Paper Single Radio Voice Call Continuity (SRVCC) with LTE By: Shwetha Vittal, Lead Engineer Overview Long Term Evolution (LTE) is heralded as the next big thing for mobile networks. It brings in
Mobile Packet Backbone Network Training Programs. Catalog of Course Descriptions
Mobile Packet Backbone Network Training Programs Catalog of Course Descriptions Page 2 Catalog of Course Descriptions INTRODUCTION... 6 MOBILE PACKET BACKBONE NETWORK (M-PBN) R5.1 DELTA... 7 MOBILE PACKET
10 METRICS TO MONITOR IN THE LTE NETWORK. [ WhitePaper ]
[ WhitePaper ] 10 10 METRICS TO MONITOR IN THE LTE NETWORK. Abstract: The deployment of LTE increases dependency on the underlying network, which must be closely monitored in order to avert service-impacting
Overview of Network Architecture Alternatives for 3GPP2 Femto Cells Jen M. Chen, et al. QUALCOMM Incorporated
3GPP2 Workshop, Boston, MA Title: Source: Contact: Overview of Network Architecture Alternatives for 3GPP2 Femto Cells Jen M. Chen, et al. QUALCOMM Incorporated Jen M. Chen QUALCOMM Incorporated 858-658-2543
CMPT 471 Networking II
CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access
Trends in Mobile Network Architectures 3GPP LTE Mobile WiMAX Next Generation Mobile Networks Dr.-Ing. Michael Schopp, Siemens Networks
Trends in Mobile Network Architectures 3GPP LTE Mobile WiMAX Next Generation Mobile Networks Dr.-Ing. Michael Schopp, Siemens Networks Outline 1 Next Generation Mobile Networks 2 New Radio Access Network
3GPP Long Term Evolution: Architecture, Protocols and Interfaces
3GPP Long Term Evolution: Architecture, Protocols and Interfaces Aderemi A. Atayero, Matthew K. Luka, Martha K. Orya, Juliet O. Iruemi Department of Electrical & Information Engineering Covenant University,
How To Understand And Understand The Gsp Protocol On A Cell Phone Or Ipad Or Ipa (For A Cell) On A Sim Simlan 2 Or Ipam (For An Ipa) On An Ipad 2 Or 4 Or Ipap
HITB Labs: Practical Attacks Against 3G/4G Telecommunication Networks Jim Geovedi Daniel Mende [email protected], [email protected] Agenda Overview 3G / 4G Backhaul Networks Backend Protocols in depth The Lab
Mobile Network Security
A key component of Ericsson s Evolved IP Network solution Technology paper This document outlines the need for effective network security in response to increasing perceived threats, recent publicized
Mobile Devices Security: Evolving Threat Profile of Mobile Networks
Mobile Devices Security: Evolving Threat Profile of Mobile Networks MBS-W07 Selim Aissi, PhD Objectives Mobile Security Threat Landscape Mobile Network Security Cybersecurity Implications, Mitigations
464XLAT in mobile networks
STRATEGIC WHITE PAPER IPv6 migration strategies for mobile networks To cope with the increasing demand for IP addresses, most mobile network operators (MNOs) have deployed Carrier Grade Network Address
Philippe Langlois, P1 Security Inc. [email protected]
Telecommunications Infrastructure Security Getting in the SS7 kingdom: hard technology and disturbingly easy hacks to get entry points in the walled garden. Philippe Langlois, P1 Security Inc. [email protected]
5.0 Network Architecture. 5.1 Internet vs. Intranet 5.2 NAT 5.3 Mobile Network
5.0 Network Architecture 5.1 Internet vs. Intranet 5.2 NAT 5.3 Mobile Network 1 5.1The Internet Worldwide connectivity ISPs connect private and business users Private: mostly dial-up connections Business:
Mobility Management for All-IP Core Network
Mobility Management for All-IP Core Network Mobility Management All-IP Core Network Standardization Special Articles on SAE Standardization Technology Mobility Management for All-IP Core Network PMIPv6
IPV6 IN MOBILE NETWORKS
IPV6 IN MOBILE NETWORKS APNIC37 - TUTORIAL PRESENTATION TUESDAY 25/02/2014 TELSTRA TEMPLATE 4X3 BLUE BETA TELPPTV4 Sunny Yeung Senior Technology Specialist Telstra Wireless Data Engineering AGENDA 1. Why
LTE Performance and Analysis using Atoll Simulation
IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE) e-issn: 2278-1676,p-ISSN: 2320-3331, Volume 9, Issue 6 Ver. III (Nov Dec. 2014), PP 68-72 LTE Performance and Analysis using Atoll Simulation
ETSI TS 129 303 V8.0.0 (2009-01) Technical Specification
TS 129 303 V8.0.0 (2009-01) Technical Specification Universal Mobile Telecommunications System (UMTS); LTE; Domain Name System Procedures (3GPP TS 29.303 version 8.0.0 Release 8) 1 TS 129 303 V8.0.0 (2009-01)
SOLUTIONS FOR ROAMING AND INTEROPERABILITY PROBLEMS BETWEEN LTE AND 2G OR 3G NETWORKS
Review of the Air Force Academy No 2 (24) 2013 SOLUTIONS FOR ROAMING AND INTEROPERABILITY PROBLEMS BETWEEN LTE AND 2G OR 3G NETWORKS Radu CURPEN, Florin SANDU, Cosmin COSTACHE, Gabriel Mihail DANCIU Transilvania
LTE Security How Good Is It?
LTE Security How Good Is It? Michael Bartock IT Specialist (Security) National Institute of Standards & Technology Jeffrey Cichonski IT Specialist (Security) National Institute of Standards & Technology
Nokia Siemens Networks Flexi Network Server
Nokia Siemens Networks Flexi Network Server Ushering network control into the LTE era 1. Moving towards LTE Rapidly increasing data volumes in mobile networks, pressure to reduce the cost per transmitted
Mobile IPv6 deployment opportunities in next generation 3GPP networks. I. Guardini E. Demaria M. La Monaca
Mobile IPv6 deployment opportunities in next generation 3GPP networks I. Guardini E. Demaria M. La Monaca Overview of SAE/LTE Terminology SAE (System Architecture Evolution): core network/system aspects
29.09.2015. Digital Communications Exploring SS7 signaling fraud that threatens mobile network security and subscriber privacy
29.09.2015 Digital Communications Exploring SS7 signaling fraud that threatens mobile Mobile communications is a prime target for hackers who desire to penetrate critical infrastructures and businesses
Evolution of the 3GPP Network Architecture, (the Evolved Packet Core)
Evolution of the 3GPP Network Architecture, (the Evolved Packet Core) Dr. Sungho Choi Vice Chairman of 3GPP TSG SA 1 Peak Data Rate (bps) DL/UL Air Interface Technology Evolution OFDMA 300M/75M Rel. 8
ETSI TS 129 119 V9.0.0 (2010-01) Technical Specification
TS 129 119 V9.0.0 (2010-01) Technical Specification Universal Mobile Telecommunications System (UMTS); LTE; GPRS Tunnelling Protocol (GTP) specification for Gateway Location Register (GLR) (3GPP TS 29.119
CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013
CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access
Demo 1. Network Path and Quality Validation in the Evolved Packet Core
Competence Center NGNI Demo 1 Network Path and Quality Validation in the Evolved Packet Core 1 Fraunhofer Institute FOKUS and TU Berlin AV AV provides education and applied research together with Fraunhofer
Network functions virtualization and software management
ericsson White paper Uen 284 23-3248 December 2014 Network functions virtualization and software management LEVERAGING THE FULL POTENTIAL WITH NETWORK SLICING Network Functions Virtualization technology
Overview of GSMA VoLTE Profile. minimum required functions [3]. 2. Background
GSMA Overview of GSMA Profile It was agreed in the GSMA in February 2010 that voice services over LTE () shall use the platform standardized by the 3GPP with a view to maximizing international interoperability.
Cisco ASR 5000 Series Mobility Management Entity Administration Guide
Cisco ASR 5000 Series Mobility Management Entity Administration Guide Version 12.0 Last Updated September 30, 2011 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706
Securing the Interconnect Signaling Network Security
Securing the Interconnect Signaling Network Security Travis Russell Director, Cyber Security, Service Provider Networks Oracle Communications August, 2015 Current security landscape Much attention has
Design and Implementation of a Distributed Mobility Management Entity (MME) on OpenStack
Aalto University School of Science Degree Programme in Computer Science and Engineering Gopika Premsankar Design and Implementation of a Distributed Mobility Management Entity (MME) on OpenStack Master
Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN
Virtual private network Network security protocols COMP347 2006 Len Hamey Instead of a dedicated data link Packets securely sent over a shared network Internet VPN Public internet Security protocol encrypts
20-CS-6053-00X Network Security Spring, 2014. An Introduction To. Network Security. Week 1. January 7
20-CS-6053-00X Network Security Spring, 2014 An Introduction To Network Security Week 1 January 7 Attacks Criminal: fraud, scams, destruction; IP, ID, brand theft Privacy: surveillance, databases, traffic
Performance validation for the mobile core
October 2015 Performance validation for the mobile core Are you ready for Terabits of Traffic? EPC and virtualization, the impact on performance validation Performance validation for the mobile core 1
Optimization Handoff in Mobility Management for the Integrated Macrocell - Femtocell LTE Network
Optimization Handoff in Mobility Management for the Integrated Macrocell - Femtocell LTE Network Ms.Hetal Surti PG Student, Electronics & Communication PIT, Vadodara E-mail Id:[email protected] Mr.Ketan
Private DNS for Mobile Operators
Private for James Yu Senior Director - Strategic Technical Initiatives NeuStar, Inc. [email protected] +1-571-434-5572 (B) +1-703-622-5187 (M) Richard Xu Chief Architect Aicent, Inc [email protected]
Chapter 10 VoIP for the Non-All-IP Mobile Networks
Chapter 10 VoIP for the Non-All-IP Mobile Networks Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University Outline 10.1 GSM-IP: VoIP Service for GSM 256
Towards Software Defined Cellular Networks
Towards Software Defined Cellular Networks Li Erran Li (Bell Labs, Alcatel-Lucent) Morley Mao (University of Michigan) Jennifer Rexford (Princeton University) 1 Outline Critiques of LTE Architecture CellSDN
Intel Network Builders Solution Brief. Intel and ASTRI* Help Mobile Network Operators Support Small Cell Networks
Intel Network Builders Solution Brief Intel and ASTRI* Help Mobile Network Operators Support Small Cell Networks Overview Wireless networks built using small cell base stations are enabling mobile network
LTE CDMA Interworking
LTE CDMA Interworking ehrpd - Use of a Common Core and a Stepping Stone to LTE Mike Dolan Consulting Member of Technical Staff Alcatel-Lucent Overview ehrpd (evolved High Rate Packet Data*) ehrpd involves
Author: Yaniv Balmas, ERT Lab Security Researcher November 2013. Mobile Network Security Availability Risks in Mobile Networks
Author: Yaniv Balmas, ERT Lab Security Researcher November 2013 Mobile Network Security Availability Risks in Mobile Networks Table of Contents Executive Summary...3 Introduction...4 Mobile Networks Overview...4
Single Radio Voice Call Continuity (SRVCC) Testing Using Spirent CS8 Interactive Tester
Application Note Single Radio Voice Call Continuity (SRVCC) Testing Using Spirent CS8 Interactive Tester September 2013 Rev. A 09/13 Single Radio Voice Call Continuity (SRVCC) Testing Using Spirent CS8
Building Robust Signaling Networks
ericsson White paper Uen 284 23-3268 July 2015 Building Robust Signaling Networks MEETING THE CHALLENGES OF THE RISING SIGNALING STORM Distributed signaling network robustness that follows the concept
464XLAT: Breaking Free of IPv4. [email protected] APRICOT 2014
464XLAT: Breaking Free of IPv4 [email protected] APRICOT 2014 1 Background T-Mobile US is a GSM / UMTS / LTE provider in the USA with 45+ Million subscribers In 2008, T-Mobile launched the first
Best Practices for Securing IP Telephony
Best Practices for Securing IP Telephony Irwin Lazar, CISSP Senior Analyst Burton Group Agenda VoIP overview VoIP risks Mitigation strategies Recommendations VoIP Overview Hosted by VoIP Functional Diagram
ETSI TS 129 274 V8.0.0 (2009-01) Technical Specification
TS 129 274 V8.0.0 (2009-01) Technical Specification Universal Mobile Telecommunications System (UMTS); LTE; General Packet Radio Service (GPRS); Evolved GPRS Tunnelling Protocol (egtp) for EPS (3GPP TS
Long Term Evolution - LTE. A short overview
Long Term Evolution - LTE A short overview LTE Architecture 2 Conformance Test Suite Specification 3 GPP and ETSI product 3GPP TS 32.523-3 Evolved Universal Terrestrial Radio Access (E-UTRA) User Equipment
CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module
CS 665: Computer System Security Network Security Bojan Cukic Lane Department of Computer Science and Electrical Engineering West Virginia University 1 Usage environment Anonymity Automation, minimal human
Kamakshi Sridhar, PhD Distinguished Member of Technical Staff Director Wireless CTO organization
Introduction to Evolved Packet Core (EPC): EPC Elements, protocols and procedures Kamakshi Sridhar, PhD Distinguished Member of Technical Staff Director Wireless CTO organization August 2012 Agenda 1.
3GPP TS 29.303 V8.0.0 (2008-12)
TS 29.303 V8.0.0 (2008-12) Technical Specification 3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; Domain Name System Procedures; Stage 3 (Release 8) The present
SERVICE CONTINUITY. Ensuring voice service
SERVICE CONTINUITY FOR TODAY S Voice over LTE SUBSCRIBERS Ensuring voice service with Single Radio Voice Call Continuity (SR-VCC) TECHNOLOGY White Paper Subscribers expectations for mobile data services
LTE service area. 3G service area. EPS : Evolved Packet System. Currently Planning & Coordination Office 1 C *
VoLTE esrvcc VSRVCC Inter-domain Handover Technologies in LTE for Voice (VoLTE) and TV Phone A data communication service called Xi (Crossy) has started in LTE. In the future, voice and TV phone services
Protecting Critical Infrastructure
Protecting Critical Infrastructure SCADA Network Security Monitoring March 20, 2015 Table of Contents Introduction... 4 SCADA Systems... 4 In This Paper... 4 SCADA Security... 4 Assessing the Security
Supporting mobility in the RAN cloud
Supporting mobility in the RAN cloud Michael Fitch BT 23 rd October 2012 Cloud basics On-Demand Self-Service A consumer can provision computing capabilities, such as server time and network storage, automatically
Study of Long Term Evolution Network, its Architecture along with its Interfaces
International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347 5161 2015 INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Research Article Study
Nokia Siemens Networks Flexi Network Gateway. Brochure
Nokia Siemens Networks Flexi Network Gateway Prepare for Mobile Broadband Growth Brochure. 2/14 Brochure Table of Content 1. Towards the flat all-ip Network... 3 2. Preparing the Gateway for Mobile Broadband
Malicious Network Traffic Analysis
Malicious Network Traffic Analysis Uncover system intrusions by identifying malicious network activity. There are a tremendous amount of network based attacks to be aware of on the internet today and the
Deploying IPv6 in 3GPP Networks. Evolving Mobile Broadband from 2G to LTE and Beyond. NSN/Nokia Series
Brochure More information from http://www.researchandmarkets.com/reports/2379605/ Deploying IPv6 in 3GPP Networks. Evolving Mobile Broadband from 2G to LTE and Beyond. NSN/Nokia Series Description: Deploying
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design Learning Objectives Identify common misconceptions about firewalls Explain why a firewall
