How To Protect Your Mobile From Attack From A Signalling Storm



Similar documents
Mobile Network Threat Analysis and MNO Positioning

Nokia Networks. security you can rely on

In-Network Programmability for Next-Generation personal Cloud service support: The INPUT project

Signaling is growing 50% faster than data traffic

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 1, March, 2013 ISSN:

NEMESYS: Enhanced Network Security for Seamless Service Provisioning in the Smart Mobile Ecosystem

DataSheet. A complete view of the customer. What is Accanto s icem?

Security Toolsets for ISP Defense

FIGHTING FRAUD ON 4G. Neutralising threats in the LTE ecosystem

Malware Hunter: Building an Intrusion Detection System (IDS) to Neutralize Botnet Attacks

BYOzzzz: Focusing on the Unsolved Challenges of Mobility, An Industry Perspective

I D C A N A L Y S T C O N N E C T I O N

Smart Grid Security: A Look to the Future

End-user Security Analytics Strengthens Protection with ArcSight

Network Infrastructure Security in Cellular Data Networks: An Initial Investigation

How Cisco IT Protects Against Distributed Denial of Service Attacks

Running Head: AWARENESS OF BYOD SECURITY CONCERNS 1. Awareness of BYOD Security Concerns. Benjamin Tillett-Wakeley. East Carolina University

Practical Attacks against Mobile Device Management Solutions

A Novel Distributed Denial of Service (DDoS) Attacks Discriminating Detection in Flash Crowds

Ashok Kumar Gonela MTech Department of CSE Miracle Educational Group Of Institutions Bhogapuram.

White Paper. Copyright 2012, Juniper Networks, Inc. 1

Performance Measuring in Smartphones Using MOSES Algorithm

trends in mobile malware and importance of network based user protection

DDoS-blocker: Detection and Blocking of Distributed Denial of Service Attack

How To Understand The Signalling Behavior Of A Mobile Network

Security MWC Nokia Solutions and Networks. All rights reserved.

Mobile Malware Network View. Kevin McNamee : Alcatel-Lucent

Attacks from the Inside

Adaptive Intelligent Firewall - der nächste Entwicklungssprung der NGFW. Jürgen Seitz Systems Engineering Manager

How To Use Icem

How To Protect Your Mobile Device From Attack

Automation of Smartphone Traffic Generation in a Virtualized Environment. Tanya Jha Rashmi Shetty

Mobile Network Security

Mobile Devices Security: Evolving Threat Profile of Mobile Networks

DDoS Protection. How Cisco IT Protects Against Distributed Denial of Service Attacks. A Cisco on Cisco Case Study: Inside Cisco IT

Delivering secure, real-time business insights for the Industrial world

10 Things Every Web Application Firewall Should Provide Share this ebook

Marble & MobileIron Mobile App Risk Mitigation

Kick starting science...

MOBILE MALWARE REPORT

How To Make Data Streaming A Real Time Intelligence

IBM QRadar Security Intelligence April 2013

Analyze & Classify Intrusions to Detect Selective Measures to Optimize Intrusions in Virtual Network

TLP WHITE. Denial of service attacks: what you need to know

New possibilities in latest OfficeScan and OfficeScan plug-in architecture

Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Abnormal Behavior Analysis

DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR

Building Robust Signaling Networks

In the pursuit of becoming smart

Thingsquare Technology

Radware Attack Mitigation Solution (AMS) Protect Online Businesses and Data Centers Against Emerging Application & Network Threats - Whitepaper

Advantages of Managed Security Services

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act

Oracle s Session Initiation Protocol Trunking Solution. Increase Agility and Reduce Costs with Session Initiation Protocol Trunks

Tunisia s experience in building an ISAC. Haythem EL MIR Technical Manager NACS Head of the Incident Response Team cert-tcc

HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT

Monitoring mobile communication network, how does it work? How to prevent such thing about that?

SIP SECURITY WILEY. Dorgham Sisalem John Floroiu Jiri Kuthan Ulrich Abend Henning Schulzrinne. A John Wiley and Sons, Ltd.

Guideline on Safe BYOD Management

IBM Security X-Force Threat Intelligence

App coverage. ericsson White paper Uen Rev B August 2015

Decoding DNS data. Using DNS traffic analysis to identify cyber security threats, server misconfigurations and software bugs

The 5G Infrastructure Public-Private Partnership

Protecting DNS Critical Infrastructure Solution Overview. Radware Attack Mitigation System (AMS) - Whitepaper

Testing & Assuring Mobile End User Experience Before Production. Neotys

The Mobile Malware Problem

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

Taxonomy of Intrusion Detection System

Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望

IBM Endpoint Manager Product Introduction and Overview

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Section 12 MUST BE COMPLETED BY: 4/22

Index Terms Denial-of-Service Attack, Intrusion Prevention System, Internet Service Provider. Fig.1.Single IPS System

The Hillstone and Trend Micro Joint Solution

CHECK POINT Mobile Security Revolutionized. [Restricted] ONLY for designated groups and individuals

Cisco Cloud Web Security Key Functionality [NOTE: Place caption above figure.]

Denial of Service Attacks

Intrusion Detection for Mobile Ad Hoc Networks

Technical Product Overview. Employing cloud-based technologies to address security risks to endpoint systems

Mobile Edge Computing: Unleashing the value chain

LTE transport network security Jason S. Boswell Head of Security Sales, NAM Nokia Siemens Networks

Mobile App Reputation

Connect for new business opportunities

Mobile Cloud Computing. Chamitha de Alwis, PhD Senior Lecturer University of Sri Jayewardenepura

NTT DOCOMO Technical Journal. Core Network Infrastructure and Congestion Control Technology for M2M Communications

SHARE THIS WHITEPAPER

Security strategies to stay off the Børsen front page

Transcription:

ICL, TUB, CERTH, Telecom Italia IT, COSMOTE, HISPASEC Erol Gelenbe Fellow of the French National Academy of Engineering Dynamic Real-Time Security for Seamless Service Provisioning in the Mobile Ecosystem Your Euros at Work..

Mobile Security -- Why is it Important?? Critical Applications Private Communications: Eavesdropping & Deceit Access and Update of Sensitive Data E Health, Business Data, False Data, Deceit The Internet of Things Smart Grid, Smart Vehicles, Cyber-Technical Systems Mobile Economy, Bitcoin, Payments

Context and Tools NEMESYS Components Observation: Dynamic Data Collection External Data Sets SECSIM: Simulator for Dynamic Security - Signaling Storm Detection and Mitigation Mobile Honeypots Analytics, Visualization Root Cause Analysis Rooting Security

Observation, Analyics and Visualisation Property/factors specific testing The Visualization and Analysis Placing Honeypots Convergence time Scalability Processing complexity Visual Correlation evaluation User Perception Integrability Evaluation

Technical issues Detection of attacks Analysis of signalling storms Disruption of Mobile Networks & Cyber-Technical Systems Development of signalling storm detectors and mitigators Changes in Standards with regard to Signalling Attracting Attacks via Honeypots Where and How Exploiting Resource Consumption (e.g. Computing time, Energy) & Billing Real-time detector for signalling anomalies and a graph based algorithm for detecting billing related attacks System Instability & Energy Cost of Signalling Attacks Lightweight Technologies for Base Stations Femtocells Risks Anomaly detection framework for femtocell architectures and virtualisation to protect users and femtocell devices Specific anomaly detection algorithms running on top of this framework 5

Detection based on signalling protocols Signalling storms Apps on mobile devices generating data traffic that results in excessive signalling load, causing outages, possible system breakdowns and performance degradations Apps may not necessarily be malicious but together they act like a distributed denial-ofservice attack (DDoS) Root causes are due to interworking between the entire mobile ecosystem: smartphones, operating systems, apps, the network configuration, cloud services, and users Poorly designed apps (e.g. incidents reported by DoCoMo [1], SK Telecom [2] and Nokia [3]) Outages in mobile cloud services [4] Malware infections [5] (e.g. adware, SMS trojans, botnets) Unwanted traffic from the Internet [6] (e.g. scanning worms, backscatter DoS traffic) [1] DoCoMo demands Google's help with signalling storm http://www.rethink-wireless.com/2012/01/30/docomo-demands-googles-signalling-storm.htm [2] Operators Urge Action Against Chatty Apps http://www.lightreading.com/operators-urge-action-against-chatty-apps/d/d-id/687399#msgs [3] Angry Birds + Android + ads = network overload http://www.itwire.com/business-it-news/networking/47823-angry-birds-%20-android-%20-ads-=-networkoverload [4] OTT service blackouts trigger signaling overload in mobile networks http://blogs.nsn.com/mobile-networks/2013/09/16/ott-service-blackouts-trigger-signalingoverload-in-mobile-networks/ [5] J. Li et al, Characterizing high-frequency subscriber sessions in cellular data networks, in Proc. IFIP Networking Conf. 2013. [6] F. Ricciato et al., On the impact of unwanted traffic onto a 3G network, in Proc. SecPerU 06. 6

Radio resource control (RRC) state machine Systems have been designed to: Save spectrum Stay in states with lower battery consumption The cost in terms of signalling load is paid during state transitions 7

Congestion due to attacks Signalling storms do not always translate into congestion in the data plane The affected signalling servers are the RNC (3G) and MME (4G) State transition model 8

9

Detection based on Signalling System Load & Types 10

Root Cause Analysis Anomalous users Behavioral similarity Core network impact

Mobile Security Prepare for the Future European R & D for Future Security and Privacy Build Test-Beds for Cyberdefense with Large Scale Usecases such as the IoT Develop Sophisticated Dynamic Detection & Mitigation Systems for existing and future systems Revisit Networking Routing and Signaling Protocols for Enhanced Security Use Security and Privacy to Add Value to European Industry and Commerce