An Empirical Study of Deep Learning-Based SS7 Attack Detection

被引:0
|
作者
Guo, Yuejun [1 ]
Ermis, Orhan [1 ]
Tang, Qiang [1 ]
Trang, Hoang [2 ]
De Oliveira, Alexandre [2 ]
机构
[1] Luxembourg Inst Sci & Technol, L-4362 Esch Sur Alzette, Luxembourg
[2] Entreprise Postes & Telecommun, Cyberforce Dept, L-1616 Luxembourg, Luxembourg
关键词
signalling system no. 7; telecom core network security; deep learning; attack detection;
D O I
10.3390/info14090509
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Signalling protocols are responsible for fundamental tasks such as initiating and terminating communication and identifying the state of the communication in telecommunication core networks. Signalling System No. 7 (SS7), Diameter, and GPRS Tunneling Protocol (GTP) are the main protocols used in 2G to 4G, while 5G uses standard Internet protocols for its signalling. Despite their distinct features, and especially their security guarantees, they are most vulnerable to attacks in roaming scenarios: the attacks that target the location update function call for subscribers who are located in a visiting network. The literature tells us that rule-based detection mechanisms are ineffective against such attacks, while the hope lies in deep learning (DL)-based solutions. In this paper, we provide a large-scale empirical study of state-of-the-art DL models, including eight supervised and five semi-supervised, to detect attacks in the roaming scenario. Our experiments use a real-world dataset and a simulated dataset for SS7, and they can be straightforwardly carried out for other signalling protocols upon the availability of corresponding datasets. The results show that semi-supervised DL models generally outperform supervised ones since they leverage both labeled and unlabeled data for training. Nevertheless, the ensemble-based supervised model NODE outperforms others in its category and some in the semi-supervised category. Among all, the semi-supervised model PReNet performs the best regarding the Recall and F1 metrics when all unlabeled data are used for training, and it is also the most stable one. Our experiment also shows that the performances of different semi-supervised models could differ a lot regarding the size of used unlabeled data in training.
引用
收藏
页数:19
相关论文
共 50 条
  • [1] SS7 Vulnerabilities-A Survey and Implementation of Machine Learning vs Rule Based Filtering for Detection of SS7 Network Attacks
    Ullah, Kaleem
    Rashid, Imran
    Afzal, Hammad
    Iqbal, Mian Muhammad Waseem
    Bangash, Yawar Abbas
    Abbas, Haider
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (02): : 1337 - 1371
  • [2] Deep Learning-Based Attack Detection and Classification in Android Devices
    Gomez, Alfonso
    Munoz, Antonio
    [J]. ELECTRONICS, 2023, 12 (15)
  • [3] Deep learning-based classification model for botnet attack detection
    Abdulghani Ali Ahmed
    Waheb A. Jabbar
    Ali Safaa Sadiq
    Hiran Patel
    [J]. Journal of Ambient Intelligence and Humanized Computing, 2022, 13 : 3457 - 3466
  • [4] Deep learning-based classification model for botnet attack detection
    Ahmed, Abdulghani Ali
    Jabbar, Waheb A.
    Sadiq, Ali Safaa
    Patel, Hiran
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020, 13 (7) : 3457 - 3466
  • [5] A CNN-Based Semi-supervised Learning Approach for the Detection of SS7 Attacks
    Ermis, Orhan
    Feltus, Christophe
    Tang, Qiang
    Trang, Hoang
    De Oliveira, Alexandre
    Nguyen, Cu D.
    Hirtzig, Alain
    [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2022, 2022, 13620 : 345 - 363
  • [6] Deep Learning-based Object Detection in High Resolution UAV Images: An Empirical Study
    Zhang, Haijun
    Sun, Mingshan
    Ji, Yuzhu
    Xu, Shichao
    Cao, Weihan
    [J]. 2019 IEEE 17TH INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS (INDIN), 2019, : 886 - 889
  • [7] Better Protection of SS7 Networks With Machine Learning
    Jensen, Kristoffer
    Thanh Van Do
    Hai Thanh Nguyen
    Arnes, Andre
    [J]. 2016 6TH INTERNATIONAL CONFERENCE ON IT CONVERGENCE AND SECURITY (ICITCS 2016), 2016, : 300 - 306
  • [8] Deep Learning-based Slow DDoS Attack Detection in SDN-based Networks
    Nugraha, Beny
    Murthy, Rathan Narasimha
    [J]. 2020 IEEE CONFERENCE ON NETWORK FUNCTION VIRTUALIZATION AND SOFTWARE DEFINED NETWORKS (NFV-SDN), 2020, : 51 - 56
  • [9] A deep learning-based attack on text CAPTCHAs by using object detection techniques
    Nian, Jiawei
    Wang, Ping
    Gao, Haichang
    Guo, Xiaoyan
    [J]. IET INFORMATION SECURITY, 2022, 16 (02) : 97 - 110
  • [10] Deep Learning-Based Community Detection Attack: Arctic Shipping Data as a Case
    Li, Changrong
    Duan, Wei
    Li, Zhenfu
    [J]. Security and Privacy, 2025, 8 (01)