SS7 Vulnerabilities-A Survey and Implementation of Machine Learning vs Rule Based Filtering for Detection of SS7 Network Attacks

被引:155
|
作者
Ullah, Kaleem [1 ]
Rashid, Imran [2 ]
Afzal, Hammad [3 ]
Iqbal, Mian Muhammad Waseem [1 ]
Bangash, Yawar Abbas [3 ]
Abbas, Haider [1 ]
机构
[1] Natl Univ Sci & Technol, Informat Secur Dept, Islamabad 44000, Pakistan
[2] Natl Univ Sci & Technol, Mil Coll Signals, Dept Elect Engn, Rawalpindi 48000, Pakistan
[3] Natl Univ Sci & Technol, Comp Sci, Islamabad 44000, Pakistan
来源
关键词
SS7; vulnerabilities; attacks; tracking mobile subscribers; call interception; SMS interception; SMS fraud; machine learning; rule based filtering; ARTIFICIAL NEURAL-NETWORKS; IP; INTERWORKING; SYSTEM;
D O I
10.1109/COMST.2020.2971757
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Signalling System No. 7 (SS7) is used in GSM/UMTS telecommunication technologies for signalling and management of communication. It was designed on the concept of private boundary walled technology having mutual trust between few national/multinational operators with no inherent security controls in 1970s. Deregulation, expansion, and merger of telecommunication technology with data networks have vanquished the concept of boundary walls hence increasing the number of service providers, entry points, and interfaces to the SS7 network, which made it vulnerable to serious attacks. The SS7 exploits can be used by attackers to intercept messages, track a subscriber's location, tape/redirect calls, adversely affect disaster relief operations, drain funds of individuals from banks in combination with other methods and send billions of spam messages. This paper provides a comprehensive review of the SS7 attacks with detailed methods to execute attacks, methods to enter the SS7 core network, and recommends safeguards against the SS7 attacks. It also provides a machine learning based framework to detect anomalies in the SS7 network which is compared with rule based filtering. It further presents a conceptual model for the defense of network.
引用
收藏
页码:1337 / 1371
页数:35
相关论文
共 24 条
  • [1] IMPLEMENTATION OF SS7 - ITALTEL EXPERIENCE
    CAZZANIGA, M
    GARAVELLI, A
    ROBROCK, A
    [J]. IEEE COMMUNICATIONS MAGAZINE, 1990, 28 (07) : 84 - 88
  • [2] VLSI implementation of the SS7 TCAP
    Macii, A
    Macii, E
    [J]. 1996 2ND INTERNATIONAL CONFERENCE ON ASIC, PROCEEDINGS, 1996, : 66 - 68
  • [3] Better Protection of SS7 Networks With Machine Learning
    Jensen, Kristoffer
    Thanh Van Do
    Hai Thanh Nguyen
    Arnes, Andre
    [J]. 2016 6TH INTERNATIONAL CONFERENCE ON IT CONVERGENCE AND SECURITY (ICITCS 2016), 2016, : 300 - 306
  • [4] SS7 over IP: Signaling interworking vulnerabilities
    Sengar, Hemant
    Dantu, Ram
    Wijesekera, Duminda
    Jajodia, Sushil
    [J]. IEEE NETWORK, 2006, 20 (06): : 32 - 41
  • [5] Attacks to mobile networks using SS7 vulnerabilities: a real traffic analysis
    Macedo, Luiza Odete H. de Carvalho
    Campista, Miguel Elias M.
    [J]. TELECOMMUNICATION SYSTEMS, 2023, 83 (03) : 253 - 265
  • [6] Signaling system 7 (SS7) network security
    Moore, T
    Kosloff, T
    Keller, J
    Manes, G
    Shenoi, S
    [J]. 2002 45TH MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOL III, CONFERENCE PROCEEDINGS, 2002, : 496 - 499
  • [7] Attacks to mobile networks using SS7 vulnerabilities: a real traffic analysis
    Luiza Odete H. de Carvalho Macedo
    Miguel Elias M. Campista
    [J]. Telecommunication Systems, 2023, 83 : 253 - 265
  • [8] PCS NETWORK SIGNALING USING SS7
    LIN, YB
    DEVRIES, SK
    [J]. IEEE PERSONAL COMMUNICATIONS, 1995, 2 (03): : 44 - 55
  • [9] A CNN-Based Semi-supervised Learning Approach for the Detection of SS7 Attacks
    Ermis, Orhan
    Feltus, Christophe
    Tang, Qiang
    Trang, Hoang
    De Oliveira, Alexandre
    Nguyen, Cu D.
    Hirtzig, Alain
    [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2022, 2022, 13620 : 345 - 363
  • [10] Distributed simulation of a SS7 signaling network
    Karne, RK
    Wijesinha, AL
    Patel, M
    Sood, AK
    Simon, R
    [J]. INFORMATION REUSE AND INTEGRATION, 2000, : 137 - 140