Attacks to mobile networks using SS7 vulnerabilities: a real traffic analysis

被引:0
|
作者
Luiza Odete H. de Carvalho Macedo
Miguel Elias M. Campista
机构
[1] Universidade Federal do Rio de Janeiro (UFRJ),GTA
来源
Telecommunication Systems | 2023年 / 83卷
关键词
Mobile communications; Legacy mobile networks; SS7 vulnerabilities; Real dataset analysis; SS7 attack characterization;
D O I
暂无
中图分类号
学科分类号
摘要
The SS7 (Signaling System no\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$^o$$\end{document} 7) protocol stack is still in use today to interconnect networks from different mobile telecommunication providers. These protocols were proposed in the 80 s, taking into account mutual trust relationships between participants. With the success of IP communications and the growth in the number of carriers, mobile networks have become exposed to many SS7 attacks. In this paper, we discuss important threats to SS7 networks as well as the main countermeasures. We also analyze a dataset obtained from a major telecommunication provider in Brazil. From this dataset, we observe that thousands of threats are triggered daily, that the main attacks are proportional along the time, that attacks are concentrated on a subset of attack sources as well as on a subset of victims, and that attack orchestration is possible but still not clear. These findings justify all the concerns regarding SS7 vulnerabilities and encourage new proposals towards attack mitigation.
引用
收藏
页码:253 / 265
页数:12
相关论文
共 50 条
  • [31] Traffic analysis of mobile sensor networks
    Martyna, Jerzy
    [J]. PROCEEDINGS OF THE IASTED INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING AND NETWORKS, 2007, : 33 - 38
  • [32] CTAC: Control traffic tunneling attacks' countermeasures in mobile wireless networks
    Khalil, Issa
    Awad, Mamoun
    Khreishah, Abdallah
    [J]. COMPUTER NETWORKS, 2012, 56 (14) : 3300 - 3317
  • [33] Security Analysis of DDoS Attacks Using Machine Learning Algorithms in Networks Traffic
    Alzahrani, Rami J.
    Alzahrani, Ahmed
    [J]. ELECTRONICS, 2021, 10 (23)
  • [34] Analysis of the Effects of SS7 Message Discard Schemes on Call Completion Rates During Overload
    Rumsewicz, Michael P.
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 1993, 1 (04) : 491 - 502
  • [35] Secure cooperative mobile ad hoc networks against injecting traffic attacks
    Yu, W
    Liu, KJR
    [J]. 2005 SECOND ANNUAL IEEE COMMUNICATIONS SOCIETY CONFERENCE ON SENSOR AND AD HOC COMMUNICATIONS AND NETWORKS, 2005, : 55 - 64
  • [36] Real-time traffic support in heterogeneous mobile networks
    Yuan Sun
    Elizabeth M. Belding-Royer
    Xia Gao
    James Kempf
    [J]. Wireless Networks, 2007, 13 : 431 - 445
  • [37] Real-time traffic support in heterogeneous mobile networks
    Sun, Yuan
    Belding-Royer, Elizabeth M.
    Gao, Xia
    Kempf, James
    [J]. WIRELESS NETWORKS, 2007, 13 (04) : 431 - 445
  • [38] Unblocking stolen mobile devices using SS7-MAP vulnerabilities Exploiting the relationship between IMEI and IMSI for EIR access
    Rao, Siddharth Prakash
    Holtmanns, Silke
    Oliver, Ian
    Aura, Tuomas
    [J]. 2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 1171 - 1176
  • [39] Monitoring of traffic networks using mobile sensors
    Cong, Zhe
    De Schutter, Bart
    Burger, Mernout
    Babuska, Robert
    [J]. 2014 IEEE 17TH INTERNATIONAL CONFERENCE ON INTELLIGENT TRANSPORTATION SYSTEMS (ITSC), 2014, : 792 - 797
  • [40] Traffic Flow Analysis Based on the Real Data Using Neural Networks
    Pamula, Teresa
    [J]. TELEMATICS IN THE TRANSPORT ENVIRONMENT, 2012, 329 : 364 - 371