Securing the Interconnect Signaling Network Security



Similar documents
An Oracle White Paper December The Value of Diameter Signaling in Security and Interworking Between 3G and LTE Networks

Wanderlust: Enabling roaming in the LTE era. Don Troshynski Vice President, Solutions Architecture

Worldwide attacks on SS7 network

Implementing LTE International Data Roaming

An Oracle White Paper December The Time for Diameter Is Now: Why Service Providers Should Implement Diameter Today

How to secure an LTE-network: Just applying the 3GPP security standards and that's it?

Diameter Security. Ensuring the Transport and Application Layer Integrity of Diameter across Network Interconnections

of the existing VoLTE roaming and interconnection architecture. This article compares existing circuit-switched models with the earlier

Practical Security Testing for LTE Networks BlackHat Abu Dhabi December 2012 Martyn Ruks & Nils

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Approaching these challenges with the right tools and solutions is critical for mobile operators success on the evolution to LTE.

Mobile Devices Security: Evolving Threat Profile of Mobile Networks

Security and Risk Analysis of VoIP Networks

Diameter in the Evolved Packet Core

Just as the ecommerce companies have

LTE transport network security Jason S. Boswell Head of Security Sales, NAM Nokia Siemens Networks

4G Mobile Networks At Risk

Mobile Devices Security: Evolving Threat Profile of Mobile Networks

Voice over IP over LTE (VoLTE) Impacts on LTE access. EFORT

Security Testing 4G (LTE) Networks 44con 6th September 2012 Martyn Ruks & Nils

Digital Communications Exploring SS7 signaling fraud that threatens mobile network security and subscriber privacy

Signaling Delivery Controller : Control Your 4G Network

Building Robust Signaling Networks

LTE Security. EventHelix.com. Encryption and Integrity Protection in LTE. telecommunication design systems engineering real-time and embedded systems

Transparent weaknesses in VoIP

Overview. Firewall Security. Perimeter Security Devices. Routers

FIGHTING FRAUD ON 4G. Neutralising threats in the LTE ecosystem

A Framework for Secure and Verifiable Logging in Public Communication Networks

SIP and VoIP 1 / 44. SIP and VoIP

Vulnerabilities in SOHO VoIP Gateways

COSC 472 Network Security

WEB SITE SECURITY. Jeff Aliber Verizon Digital Media Services

Where every interaction matters.

20-CS X Network Security Spring, An Introduction To. Network Security. Week 1. January 7

Overview of GSMA VoLTE Profile. minimum required functions [3]. 2. Background

4G (LTE) Roaming Experience_. Mobile World Congress 2014

Understanding and evaluating risk to information assets in your software projects

Protecting Mobile Networks from SS7 Attacks. Telesoft White Papers

CCNA Exploration: Accessing the WAN Chapter 7 Case Study


VOIP SECURITY ISSUES AND RECOMMENDATIONS

SS7: Locate. Track. Manipulate.

LTE Security How Good Is It?

DOMAIN NAME SECURITY EXTENSIONS

Intrusion Detection for Mobile Ad Hoc Networks

Diameter Signaling Controller in next-generation signaling networks

3GPP TSG SA WG3 Security S3#25 S October 2002 Munich, Germany

NFV & SDN World. Practical Approaches to NFV Orchestration Deployment. Terry McCabe CTO Mobile Business Unit

Voice Over IP (VoIP) Denial of Service (DoS)

Telecommunication Services Engineering (TSE) Lab. Chapter III 4G Long Term Evolution (LTE) and Evolved Packet Core (EPC)

All vulnerabilities that exist in conventional wired networks apply and likely easier Theft, tampering of devices

Basic Vulnerability Issues for SIP Security

Securing Next Generation Mobile Networks

SEC , Cisco Systems, Inc. All rights reserved.

LTE Attach and Default Bearer Setup Messaging

Advanced Security and Mobile Networks

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD CCNA SECURITY. VERSION 1.0

State of Texas. TEX-AN Next Generation. NNI Plan

Network functions virtualization and software management

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act

SS7 & LTE Stack Attack

Cconducted at the Cisco facility and Miercom lab. Specific areas examined

MPLS VPN Security Best Practice Guidelines

Wireless security in LTE networks Monica Paolini Senza Fili Consulting

This chapter covers the following topics: Why Network Security Is Necessary Secure Network Design Defined Categorizing Network Security Threats How

資 通 安 全 產 品 研 發 與 驗 證 (I) ICT Security Overview. Prof.. Albert B. Jeng ( 鄭 博 仁 教 授 ) 景 文 科 技 大 學 資 訊 工 程 系

Information Security Assessment and Testing Services RFQ # Questions and Answers September 8, 2014

Safeguards Against Denial of Service Attacks for IP Phones

Securing SIP Trunks APPLICATION NOTE.

Basics of Internet Security

LTE - Can SDN paradigm be applied?

SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG)

Complete Protection against Evolving DDoS Threats

Verizon Columbia Research on VoIP Security A Model Academia/Industry Collaboration. Gaston Ormazabal. Verizon Laboratories.

The Trivial Cisco IP Phones Compromise

Privacy and Security in MPLS Networks

How To Make Money From Your Cell Phone Business

Spectra2 for EPC Testing

Network Access Security in Mobile 4G LTE. Huang Zheng Xiong Jiaxi An Sihua

INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM

Configuring DHCP Snooping

VOICE OVER IP SECURITY

Link Layer and Network Layer Security for Wireless Networks

Notes on Network Security - Introduction

Link Layer and Network Layer Security for Wireless Networks

Society, Law Enforcement and the Internet

Final exam review, Fall 2005 FSU (CIS-5357) Network Security

Nokia Networks. Voice over Wi-Fi. White paper. Nokia Networks white paper Voice over Wi-Fi

White paper. TrusGuard DPX: Complete Protection against Evolving DDoS Threats. AhnLab, Inc.

MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper

IINS Implementing Cisco Network Security 3.0 (IINS)

Recommended IP Telephony Architecture

Implementing Cisco IOS Network Security

Access Mediation: Preserving Network Security and Integrity

How To Use A Femtocell (Hbn) On A Cell Phone (Hbt) On An Ipad Or Ipad (Hnt) On Your Cell Phone On A Sim Card (For Kids) On The Ipad/Iph

Cyber Security and Information Assurance Controls Prevention and Reaction NOVEMBER 2013

IT 3202 Internet Working (New)

On LTE Security: Closing the Gap Between Standards and Implementation

Triton Multi-purpose LTE wireless core networking testing tool

Transcription:

Securing the Interconnect Signaling Network Security Travis Russell Director, Cyber Security, Service Provider Networks Oracle Communications August, 2015

Current security landscape Much attention has been given to claims made at 31C3, and articles posted in the Washington Post. 2 articles were run; one in August of 2014, and another related article in December of 2014. These articles were run in advance of 31C3 in Hamburg, and have created another fire storm of activity in the industry.

The news has spread Hackers demo network-level call interception January 05, 2015 White-hat hackers at the 31st Chaos Computer Congress have demonstrated fundamental flaws in the underlying infrastructure of 2G and 3G mobile phone networks. The flaws allow attackers to covertly track the location of a phone number as well as intercept calls and SMS - all at the network level.

And continues to be sensationalized Mobile privacy open to global cyber snooping from 'SS7 protocol'

What are the claims? The four areas focused on by researchers Location tracking using ATI or SRI Call hijacking using LocationUpdate Denial of Service using InsertSubscriberData Account fraud The problem is allowing other networks to manipulate signaling and use these protocol messages

The Issue is the Business of Interconnect Telecom networks are not designed with interconnect security in mind Telecom networks are only connected with other trusted networks Signaling networks are secured through business arrangements rather than firewalls Recent events have demonstrated the vulnerabilities in this concept Service providers are exploiting their interconnects to offer other services There are rogue service providers abusing their interconnect privileges Circle, and several other companies have built entire Hub services for SS7 access It is through these channels that opens the network to abuse

What about Diameter? Researchers have made claims that because Diameter replaces SS7, these same vulnerabilities exist in LTE Partially true Diameter and SS7 are nothing alike, even though they both support many of the same functions Diameter was developed with security in mind But it needs to be implemented Ignoring the recommendations of 3GPP and the IETF will make certain that network security is compromised again The issue of interconnect needs to be resolved to eliminate these problems

What did we learn? There is no such thing as a trusted network All networks should be treated as untrusted Interconnects are wide open with little to no restrictions This is the topic a little later on define granular permissions and not everything in the network Not all suspect traffic is an attack Several started classifying suspect traffic as an attack, but in reality it was not nefarious Misconfigured nodes will also generate this traffic Some legitimate applications can also be generating traffic

What Did We Learn? Monitoring of the network is critical Most operators do not monitor their networks After monitoring their networks, several in the GSMA found anomalies More attention needs to be paid to the routing of traffic in the control plane The majority of events detected during monitoring stages has shown other service providers misbehaving rather than nefarious attacks Granting access to your network without limitations leads to exploitations Granting access to your network to unknown companies is dangerous and reckless

What Did We Learn? Accessing the SS7 network is not as easy as claimed It requires a connection, and engineering to obtain the connection One hacker cited costs of around $14k/month for an interconnect, providing them access to +600 roaming partners Some operations exist offering SS7 connectivity to anyone, using their expansive network hub

Since SS7 replaces Diameter, the same vulnerabilities exist Computer Chaos Congress 31, December 2015, Hamburg Germany

3G security; Network Domain Security (NDS); IP network layer security The security services that have been identified as being needed are confidentiality, integrity, authentication and anti-replay protection. These will be ensured by standard procedures, based on cryptographic techniques. 3GPP TS 33.210

Securing the Interconnect PCRF MME PCRF MME DSC/SIP HSS HSS DEA OCS IPsec is required at the interconnect per GSMA IR.88, providing authentication at each connection Topology hiding is required at the DEA per GSMA IR.88 protecting the topology and the network addressing Access control lists at the IP layer add another layer of protection by controlling static IP addresses MME HSS SGW PGW PCRF HSS SGW PGW DEA DSC/SIP OCS The Diameter Edge Agent (DEA) provides interconnect security MME SGW PGW OFCS SGW PGW

Interconnecting Diameter Networks 3GPP 29272-d10, Section 7.1.2, Securing Diameter Messages The HSS or the first Diameter agent in the home network with a direct connection to the visited network must verify the origin realm is correct Means that the origin realm is authorized to access the network Does not provide the means for verification but states verification of the IP address is one possible method Static IP addressing and the use of an ACL is the best method of ensuring that the connecting network is authorized to connect Further measures should be taken to ensure access is granted only for transactions that should be allowed

A DSR in the core will prevent DoS DoS is prevented by implementing a Diameter Signaling Router (DSR) in the network core This has been demonstrated in several tier 1 networks already The DSR acts as the STP for the 4G EPC; load balancing, managing congestion, and managing traffic through the core This is the best place to implement security procedures in the core The DSR is what routes to the network assets, so it only makes sense to control access to these nodes through a DSR

Safe Harbor Statement The preceding is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described for Oracle s products remains at the sole discretion of Oracle.