Improving Mobile Core Network Security with Honeynets
#1

Third-generation (3G) mobile systems provide enhanced
security by deploying a mobile terminal
to Universal Mobile Telecommunications System
(UMTS) Terrestrial Radio Access Network
(UTRAN) mutual authentication and by addressing the
vulnerabilities in 2G’s underlying cryptographic technology.
1 Such systems also pay special attention to user privacy
by deploying an identity management scheme to
protect the confidentiality of user identity, position, and
service delivery.2
With these features in mind, 3G mobile subscribers
might feel more secure when connecting to 3G networks,
but this perception doesn’t reflect reality when
you consider all the elements in the service provision
path, including the core network. The 3G core network
consists of the circuit-switched (CS) domain, the
packet-switched (PS) domain, and the Internet Protocol
(IP) multimedia subsystem (IMS).3 The CS domain
handles traffic switching and signaling for voice
communications, linking the UTRAN with other
voice networks. The PS domain handles traffic switching
and signaling for data communications, linking the
UTRAN with other packet domain networks (PDNs)
such as the Internet; the IMS is a complementary subsystem
that provides multimedia services over the PS
domain. This article focuses on the open security issues
in the PS domain—in particular, how honeynet
technology can be a cost-effective solution that increases
security.
Core network security
In recent years, mobile telecommunication networks
have transformed from infrastructures that provided
voice and limited
data services to infrastructures
that offer a wide range of multimedia options.
4 The new demands on service provisions require
improved versions of supporting systems for charging
and billing, roaming, and addressing, as well as the necessary
security services for protecting the confidentiality,
integrity, and availability of all types of information, including
user traffic, signaling, and control data.5
The outcome of this transformation was an upgrade
from the existing closed Signaling System 7-based networks
to IP-based systems that combine several old and
new technologies and applications under the pressure of
timely service delivery startup. Several research studies
report the security vulnerabilities that have subsequently
arisen:6–10
• a lack of intrusion detection systems (IDSs);
• inadequate firewall architectures;
• no security layers; and
• uncontrolled communication with roaming partners.
Such vulnerabilities ultimately lead to threats, which fall
into these categories:
• billing attacks via gateway filters;
• exposure of critical production systems that implement
packet switching—such as gateway general packet
radio service (GPRS) support nodes (GGSNs) and
serving GPRS support nodes (SGSNs)—to attacks;


Download full report
http://selab.iecs.fcu.edu.tw/course/96/d...lass_4.pdf
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: honeypots honeynets, improving performance and security in tor network through tunable path, arbitrary synonymto mobile network security ppt s, seminar report on improving atm security via atm security, entrapment and honeypots and honeynets, core java mini projects on security, honeypots and honeynets,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  projects in core java project topics 6 16,153 16-01-2018, 11:15 AM
Last Post: dhanabhagya
  Exploring the design space of social network-based Sybil defenses 1 937 15-02-2017, 02:55 PM
Last Post: jaseela123d
  Cloud Computing Security: From Single to Multi-Clouds 1 843 14-02-2017, 04:56 PM
Last Post: jaseela123d
  SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-He 1 921 14-02-2017, 03:49 PM
Last Post: jaseela123d
  Critical State-Based Filtering System for Securing SCADA Network Protocols 1 871 14-02-2017, 12:48 PM
Last Post: jaseela123d
  Security Analysis of the SASI Protocol computer science topics 2 1,961 21-06-2016, 10:30 PM
Last Post: Guest
  Security system using IP camera mechanical engineering crazy 5 4,407 16-03-2015, 02:52 PM
Last Post: seminar report asees
  MOBILE PHONE BASED ATTENDANCE TRACKING SYSTEM seminarsonly 25 21,155 06-03-2015, 07:18 PM
Last Post: unas
  A PROACTIVE APPROACH TO NETWORK SECURITY nit_cal 1 2,280 19-09-2014, 12:52 AM
Last Post: [email protected]
  Data Security Using Honey Pot System computer science topics 5 6,715 11-09-2014, 07:45 PM
Last Post: erhhk

Forum Jump: