Security threats and countermeasure in 3 g network

18
SECURITY THREATS AND COUNTERMEASURE IN 3G NETWORK Quratulain Safdar CT-014

Transcript of Security threats and countermeasure in 3 g network

Page 1: Security threats and countermeasure in 3 g network

SECURITY THREATS AND COUNTERMEASURE IN 3G NETWORK

Quratulain Safdar CT-014

Page 2: Security threats and countermeasure in 3 g network

2

INTRODUCTION

• Third generation mobile system which provide mobile users with rich services, wireless broadband access to Internet, and worldwide roaming.

• The users will be able to enjoy Voice-over-IP, multimedia messaging, and videoconferencing services with up to 2 Mbps data rate

Page 3: Security threats and countermeasure in 3 g network

TRADITIONAL INFRASTRUCTURE

• In traditional infrastructure of wire there are vast radio resources and signaling procedures so that traffic is not a big problem to handle.

Page 4: Security threats and countermeasure in 3 g network

MOBILE INFRASTRUCTURE

• In mobile network there are limited resources and signaling procedure for radio resource management is complex that’s why the traffic handling is a big threat.

Page 5: Security threats and countermeasure in 3 g network

STRUCTURE OF 3G NETWORK

Page 6: Security threats and countermeasure in 3 g network

STRUCTURE OF 3G PROTOCOL STACK

Page 7: Security threats and countermeasure in 3 g network

SECURITY THREATS IN 3G NETWORK

• Resource consume of UE• Resource consume of mobile network• The abnormal termination of

connected services

Page 8: Security threats and countermeasure in 3 g network

RESOURCE COMSUME OF UE:

Power management in mobile devices is very important because all work done by the device is lead to power consumption. If there are so many process which are running so the device need more power to consume. Continuous communication and high cost of process are the two cases which are discuss below.

–Continuous communication–High cost

Page 9: Security threats and countermeasure in 3 g network

CONTINUOUS COMMUNICATION

In this case if the resources are consumed due to ongoing communication caused by an abnormal service and communication with malicious host. The UE is infected with malicious code because of the continuous scanning inside the network. Due to this reason the resources are consumed unnecessarily.

Page 10: Security threats and countermeasure in 3 g network

HIGH COST OF PROCESS

There is a timer t is used by the system which is automatically turn off if the attacker constantly send packets over a longer period of time than t these can reallocate the radio resources. From the perspective of radio resources the allocation and release is a high task.

Page 11: Security threats and countermeasure in 3 g network

RESOURCE CONSUME OF MOBILE NETWORK:

If attacker sent packet to any mobile device for a longer period of time than t than the RNC keep the resources to that particular UE and may prevent use for other devices. This may cause the failure of voice and data service to particular base station.

Page 12: Security threats and countermeasure in 3 g network

ABNORMAL TERMINATION OF CONNECTED SERVICE:

The mobile network can have a serious problem of abnormal termination of service. The UE will try continuously in order to reconnect the mobile network. In this case all UE devices are trying to reconnect at the same time. Potential threats can be viewed in this regards. UE resources are consumed in order to reconnect to the server and occupying the wireless resources. The RNC and SGSN will be failing by massive retry in short period of time. DDOS attack will cause the failure of both data and voice services. It is an “SYNC FLOOD “attack to the network.

Page 13: Security threats and countermeasure in 3 g network

COUNTERMEASURES

Page 14: Security threats and countermeasure in 3 g network

TRAFFIC ACQUISITION SYSTEM

This system collects the useful information from the traffic in packet network. Iu-PS and Gn, Gi which are the main interface of PN and TAS designed able to analyze the communication session. To analyze the communication must see the inside tunnel of mobile network.

Page 15: Security threats and countermeasure in 3 g network

ABNORMAL TRAFFIC DETECTION SYSTEM

There are two engine used in this system one engine used for the detection of revealed attack and the other is used to detect the unknown abnormal traffic. We need to detect two type of attack the false-positive attack and the false negative-attack. In false-negative attack we need to detect the unknown abnormal attacks and in false-positive attack we need to detect the known attacks.

Page 16: Security threats and countermeasure in 3 g network

ABNORMAL UE MONITOR AND CONTROL SYSTEM

This system is use to monitor and control the information that is come into the UE. Detection and control system is not able to identify the accrual user so only need to identify user by other information such as hash table.

Page 17: Security threats and countermeasure in 3 g network

CONCLUSION

Mobile Network development is in progress and many things are doing to enhance the bandwidth and limited resources. The threats of security can not be solve in 4F and LTE advance. We research for the countermove and security threats of 3g network. There are many other development are ongoing for near future to enhance the performance of mobile network.

Page 18: Security threats and countermeasure in 3 g network

THANK YOU