ITU Workshop on “SS7 Security” Geneva, Switzerland 29 June 2016

Slides:



Advertisements
Similar presentations
Denial of Service Attack History What is a Denial of Service Attack? Modes of Attack Performing a Denial of Service Attack Distributed Denial of Service.
Advertisements

Hacking Communication System
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Fraud in Short Messaging in Mobile Networks
Geneva, Switzerland, 2 June 2014 Caller ID Spoofing, Egypt experience Dr. Hosam Abd Elmaoula NTRA EGYPT ITU Workshop on “Caller ID Spoofing” (Geneva, Switzerland,
Use Cases for I2RS I2RS Interim Meeting Nicolai Leymann, Deutsche Telekom AG
Hacker’s tricks for online users to reveal their sensitive information such as credit card, bank account, and social security. Phishing s are designed.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
Information System Security Engineering and Management Risk Analysis and System Security Engineering Homework (#2, #3) Dr. William Hery
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Security Awareness: Applying Practical Security in Your World
Signalling Systems System which allows various network components to exchange information –In particular, it supports call / connection control network.
1 VOIP Network Threats Let the subscribers beware Gerard Wilkes October 24, 2006.
Network security Process in which digital information are protected.
Geneva, Switzerland, 2 June 2014 Study on Spoofed Call Detection and Prevention in 3GPP China Mobile ITU Workshop on “Caller ID Spoofing” (Geneva, Switzerland,
Geneva, Switzerland, 2 June 2014 Analysis of Caller ID delivery in China Hexian Huang CATR, China ITU Workshop on “Caller ID Spoofing”
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Penetration Testing University of Sunderland CSEM02 Harry R Erwin, PhD.
ECRIT interim meeting - May Security Threats and Requirements for Emergency Calling draft-tschofenig-ecrit-security-threats Hannes Tschofenig Henning.
Securing Legacy Software SoBeNet User group meeting 25/06/2004.
Mobile IP: Introduction Reference: “Mobile networking through Mobile IP”; Perkins, C.E.; IEEE Internet Computing, Volume: 2 Issue: 1, Jan.- Feb. 1998;
Kittiphan Techakittiroj (04/09/58 19:56 น. 04/09/58 19:56 น. 04/09/58 19:56 น.) Network Security (the Internet Security) Kittiphan Techakittiroj
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
11/21/991 PSTN A T1 (1.5 Kbps) is a time-multiplexed signal of 24 DS0 (64 kbps) A T-S-T (Time-Space-Time) division multiplexed switch maps bits arriving.
Service Function Chaining Use Cases draft-liu-service-chaining-use-cases IETF 89 London, March 3, 2014 Will Liu, Hongyu Li, Oliver Huang, Huawei Technologies.
SIGNALING. To establish a telephone call, a series of signaling messages must be exchanged. There are two basic types of signal exchanges: (1) between.
Chapter 20 – Firewalls The function of a strong position is to make the forces holding it practically unassailable —On War, Carl Von Clausewitz.
Draft-qi-i2nsf-access-network- usecase-00 Author: Minpeng Qi, Xiaojun Zhuang.
Hemant Sengar, George Mason University
Mobile Communication Common Channel Signaling System No. 7 (i.e., SS7 or C7) is a global standard for telecommunications defined by the International Telecommunication.
1 實驗九:建置網路安全閘道器 教師: 助教:. 2 Outline  Background  Proxy – Squid  Firewall – IPTables  VPN – OpenVPN  Experiment  Internet gateway  Firewall  VPN.
Design and implementation of SIP-aware DDoS attack detection system By: Arif Iqbal.
Components of wireless LAN & Its connection to the Internet
Module 11: Designing Security for Network Perimeters.
MWIF Confidential MWIF-Arch Security Task Force Task 5: Security for Signaling July 11, 2001 Baba, Shinichi Ready for MWIF Kansas.
A Pattern Language for Firewalls Eduardo B. Fernandez, Maria M. Petrie, Naeem Seliya, Nelly Delessy, and Angela Herzberg.
13LECTURE NET301 11/23/2015Lect13 NET THE PROBLEM OF NETWORK SECURITY The Internet allows an attacker to attack from anywhere in the world from.
Santhosh Rajathayalan ( ) Senthil Kumar Sevugan ( )
Attacking on IPv6 W.lilakiatsakun Ref: ipv6-attack-defense-33904http://
Mobile IPv6 and Firewalls: Problem Statement Speaker: Jong-Ru Lin
Internal Controls To Reduce The Risk of Fraud May 20, 2015 Personalized Service By Business and Accounting Experts.
Venus Project Brief Description. What It Do What Monitor Log Analyze Block Narrow Report Search Where Single stations Internet Gates Special Devices Web.
SEMINAR ON IP SPOOFING. IP spoofing is the creation of IP packets using forged (spoofed) source IP address. In the April 1989, AT & T Bell a lab was among.
What's a Firewall? A security system that acts as a protective boundary between a network and the outside world Isolates computer from the internet using.
VIVID Project Attacking plan. Problems Description What we have? – Map(? ) – Satellite Imagery – Aerial Video and Mosaic Images Target – Road, building,
Mobile network vulnerabilities and countermeasures:
Introduction Wireless devices offering IP connectivity
Firewall Techniques Matt Cupp.
Network Security (the Internet Security)
2N® BRI gateways Product presentation.
Network Security Marshall Leitem 11/30/04
Computer Data Security & Privacy
Background PSTN/SS7 networking IP networking ATM networking
SEC 572 Competitive Success/snaptutorial.com
SEC 572 Education for Service-- snaptutorial.com.
SEC 572 Teaching Effectively-- snaptutorial.com
Interconnection Security: An EU level assessment
Defending against Sybil Devices in Crowdsourced Mapping Services
Computer Security Firewalls November 19, 2018 ©2004, Bryan J. Higgs.
Hannes Tschofenig Henning Schulzrinne M. Shanmugam
draft-rocky-sipping-calling-party-category-01 Report
Networking for Home and Small Businesses – Chapter 8
Net301 LECTURE 11 11/23/2015 Lect13 NET301.
Networking for Home and Small Businesses – Chapter 8
ITU-T Workshop on Security, Seoul (Korea), May 2002
Networking for Home and Small Businesses – Chapter 8
Computer Networks ARP and RARP
JAIN FOR MAP PROJECT GROUP: Maurizio Bonuccelli Piero Lauri
Mobile Networking Through Mobile IP
Presentation transcript:

ITU Workshop on “SS7 Security” Geneva, Switzerland 29 June 2016 Security in SS7 networks Gerhard Ott Test expert, Deutsche Telekom AG, gerhard.ott@telekom.de Gerhard Ott

Security in SS7 networks The SS7 stack Application TCAP ISUP SCCP Level 3 Level 2 Physical

Security in SS7 networks Security in SS7 networks - what are the risks security reasons, fraud spoof intercept DOS

Security in SS7 networks Target affected Provider Network User

Security in SS7 networks Examble of a SS7 relationship Network foreign B Network (own) Network foreign A

Security in SS7 networks Target affected Provider Network Attack on level 3 functionalities Link management Trunk group management Denial of Service attack

Security in SS7 networks Examble for a redirection Network foreign B Network (own) Network foreign A

Security in SS7 networks Target affected User The user will recall misled (there is a number is in the caller list pointing to a service with special prices) User see a faked calling number (e.g. emergency number 110)

Security in SS7 networks Target affected User The user is intercepted SMS spam SMS read along Track the location(s) of a mobile user Change the data base of a mobile user

Security in SS7 networks Security in SS7 networks – what to do about the risks level 3 issues OPC/DPC depended routing (level 3 firewall) Separation in two networks (use of network indicator) It is assumed that these proposals already applied

Security in SS7 networks Security in SS7 networks – what to do about the risks User issues Anomaly Detection on Incoming MAP messages (Monitoring system) Filtering of MAP application context (at application level) Configuration Software upgrade (Vendor action, change request)

Security in SS7 networks Thank you for your attention Questions? Comments?