Professional Documents
Culture Documents
Combating
Group
security issues
in the 5G era
Sergey Bagrov
Member of International Expert Council
of ECEA
s.bagrov@eacp.ru
What is radically
new in 5G
GTP
Analogue
SS7 SIP
API’s
Diameter
Easily
Same Threats Any mobile
operator
From No special
anywhere skills needed
From
Take control of Perform massive denial
your digital identity GSM to 5G of service attacks
Attacks on signaling
networks is not a myth
?
https://www.forbes.com/sites/thomasbr
ewster/2017/09/18/ss7-google-
coinbase-bitcoin-hack/#2ca4aff741a4
Protocol Threat Comparisons
Positive Technologies have further research being Possible different reasons for previous generations
published very soon looking at Diameter. out performing Diameter in certain areas.
Comparing 4G networks using Diameter against SS7 Threat Awareness Higher
earlier network generations Diameter specific challenges
Percentage of vulnerable
networks (2017)
Threat
SS7 Diameter
networks networks
* In the tested networks, SMS transmission using the Diameter network was not carried out.
Successful attacks by threat types To establish voice calls in 4G networks, the SIP protocol is used.
Denial of Service
Every
network
is exposed to Denial of service
denial of service is crucial for the
internet
of things
3 hours
Subscriber down-
time in testing
Conclusion #1
5G Non-Standalone is vulnerable to denial of service
USUAL SECURITY
Confidentiality Availability
IOT SECURITY
PRIORITIES
PRIORITIES
Integrity Integrity
Availability Confidentiality
Convergence of
telecom and IT world
2G & 3G 4G 5G
MAP/CAP The 5G network core is
TCP/IP-based.
TCAP JSON over
DIAMETER HTTP/2 These protocols are open
SCCP and well-known.
MTP3 Tools for finding and exploiting
M3UA
MTP2
TLS QUIC vulnerabilities are available
SCTP SCTP TCP UDP to any adversary.
MTP1 IP IP IP
Difficulty of bypassing the perimeter (percentage of systems) Security level (percentage of web applications)
Briefly about IoT
40 37%
35 32%
30
25
24%
20
15
10 8%
5
0
Already use Preparing Will wait Will wait as
IoT to and see long as
implement possible
IoT
GARTNER: “By 2020, over 25% of identified attacks in enterprises will involve IoT”
Conclusion #3
Millions of connected IoT devices mean
millions of potential botnet soldiers
2016 2019
Mirai, 1M potentially
500K devices vulnerable
in bot-net
What should be
addressed