Wireless Security in LTE Networks Monica Paolini Senza Fili Consulting

Wireless Security in LTE Networks Monica Paolini Senza Fili Consulting

Wireless security in LTE networks Monica Paolini Senza Fili Consulting Sponsored by White paper Wireless security in LTE networks 1. Introduction Mobile security, a top-of-mind concern for operators When using smartphones to make a call, socialize with friends, check traffic or watch a video, few subscribers are concerned Mobile networks are becoming more attractive about security – of the device, of the content or of the network. targets for security attacks They are more likely to be concerned about having good coverage, a fast connection or sufficient battery life than whether There are twice as many mobile-broadband their mobile data traffic is protected. subscribers worldwide as fixed-broadband ones. Their number is growing by 45% per year (ITU). The mobile security record to date has been quite good. Because According to voice-dominated networks have been built on proprietary the Cisco VNI, interfaces, mobile networks have been difficult to penetrate, and mobile data traffic is have provided less incentive for malicious attacks than the more growing by open and data-rich IT networks. 78% per year and will This is rapidly changing. Mobile networks are becoming primarily account for data networks, moving to a flatter and more open architecture 10% of global that is inherently more vulnerable to security threats. This IP traffic by transition is gathering momentum both with the adoption of 2016 and smartphones and the applications they support, and with the represent five times the transition to a less hierarchical, IP-based architecture in LTE. volume of global The exponential growth in traffic makes it more difficult for internet operators to protect their networks. Furthermore, most third- traffic in party application developers are not directly concerned with (or 2005. affected by) security. Hackers and hacktivists have started to shift Trend Micro their attention to mobile networks and are on a steep learning has reported curve, as the sudden spike in malware over the last year shows. a rapid Additional threats to network integrity come from non-malicious growth in accidental traffic floods from devices or other network elements. Android malware As business subscribers increasingly use mobile devices to samples. connect to their corporate networks, mobile networks become more attractive targets to both hackers and hacktivists1. Security is set to become a major source of network disruption, and a top- of-mind concern for both operators and subscribers. 1. “Android Malware Could Infiltrate Corporate Networks”, Wall Street Journal, 2012. © 2012 Senza Fili Consulting • www.senzafiliconsulting.com |2| White paper Wireless security in LTE networks 2. An evolving landscape Mobile security in an IP environment The transition to data-centric, IP-based mobile Table 1. How wireless security is changing networks supporting a rapidly growing number of computationally powerful devices such as What we were used to What is coming smartphones and tablets is changing the mobile Closed, proprietary, Flat networks, more security landscape and will fundamentally change Network hierarchical networks: connections among elements: the way we perceive and deal with mobile architecture difficult to penetrate, more porous, easier to security. Mobile networks are becoming more easier to protect. penetrate. pervasive, more widely used, and more deeply Expensive RAN Femto cells, small cells and connected to other networks (Table 1). equipment, large form Wi-Fi hotspots: easier and Equipment factor: difficult to buy or cheaper to get, they provide Devices and the core network are the most heavily operate a rogue base an entry point to the mobile station. network. targeted parts of the mobile network, while RAN and backhaul have attracted fewer security Voice-based network, Powerful data-centric devices, limited data capabilities: visible from the internet: breaches (Figure 1). Although RAN and backhaul Devices easier for operators to increased vulnerability, more attacks may increase, they are likely to remain control. entry points, less control. more confined. This is because RAN and backhaul SS7: closed signaling Diameter: IP increases mobile have complex deployment configurations that are Signaling environment, difficult to networks vulnerability to specific to operator, location and equipment penetrate. security threats. vendor, and attacks require more sophisticated Applications in a fragmented preparation and on-site access. Few applications market that is difficult to Applications available or used: limited control: a source and vehicle entry points to devices. However, small cells, femto cells and Wi-Fi for security threats. hotspots integrated with cellular networks will M2M unmonitored devices: Limited use of cellular make attacks on mobile networks easier to plan difficult to protect, but may M2M networks for M2M and carry out. have stricter security applications. requirements. Furthermore, attacks on the RAN and backhaul Access to corporations and may attract a different type of threat, aimed at the Economic Billing fraud as the main government: mobile networks network infrastructure per se rather than, for value concern much more valuable as instance, access to corporate networks or sending security targets. unauthorized premium-rate SMSs. This sort of attack is more likely to be driven by hacktivists with a political or social agenda than by hackers trying to get an economic return. © 2012 Senza Fili Consulting • www.senzafiliconsulting.com |3| White paper Wireless security in LTE networks Figure 1. Overview of mobile security: entry points and impact of security threat. Source: Senza Fili 3. Mobile devices Easier to access, more difficult to protect From a security perspective, devices play a crucial role within the mobile network and pose difficult challenges to managing them effectively: . They are the most accessible targets in the end-to-end mobile network, and the most commonly exploited. There are a large number of devices in the market, and most lack the tools to manage security. Through a mobile device, it is possible to hit both the subscriber (and the linked corporate network, if any) and the mobile core network, as well as to launch attacks on the internet. Even if the disruption was caused by unsafe subscriber behavior (e.g., downloading an application from an untrusted source), the subscriber may still hold the mobile operator responsible for the security of the mobile connection. © 2012 Senza Fili Consulting • www.senzafiliconsulting.com |4| White paper Wireless security in LTE networks There are multiple entry points in mobile devices. Security threats on mobile devices Application downloads are the most often used method of spreading malware to mobile devices. The malware can be inserted Only 4% of French smartphone users are concerned into a legitimate application by a third party, who then promotes about smartphone viruses, and 22% about online the download of the modified version of the software. Software can viruses (The Future Laboratory/AVG). also be purposely designed to be a vehicle for the malware and Only 4% of mobile devices had security software then promoted as legitimate. installed in 2011 (Canalys). IBM has found a 70% increase in critical mobile OS By granting permission to collect and transmit information from the vulnerabilities in 2011–2010. From 2009 to 20011, device, the subscriber may become exposed to data and privacy mobile OS exploits grew from 2 to 19. loss: the malware may transmit information such as GPS Trend Micro identified 5,000 new malicious coordinates, contact information, email, or credit card information applications in the first quarter of 2012, and another across the network to a destination set by the malware originators. 10,000 in just one month in the following quarter2. A common type of malware sends premium-rate SMSs without Among these applications, 17 were able to infiltrate in subscriber permission (or knowledge) and charges the subscriber the Google Play Store and ended up in 700,000 through the mobile operator for them. devices before being removed. According to Dimensional Research, in 89% of Web-based attacks are triggered by the subscriber accessing enterprises employees connect to their corporate compromised or malicious websites that remotely install malware, networks and in or that access or modify data stored in the device. 47% they save customer Further security breaches may result from obtaining confidential information on data through phishing, or through unauthorized physical access to a mobile devices. device (e.g., stealing it or taking a device’s SD card long enough to Mobile devices put malware on it). Inappropriate non-malicious data syncing may contributed to also lead to data theft. For instance, corporate data may become an increase in inadvertently copied in a mobile device that is subsequently security incidents in infected with malware. 71% of enterprises, Mobile devices can be used as vehicles for attacks on the with employees subscriber’s mobile network, as well as other networks. The mobile representing a operator may not be aware of it or able to contain its effects. Yet more serious there is a potential negative repercussion on the network’s security reputation when an attack can be traced to originators who are concern than hackers in subscribers of one or a few networks, or when the network is used 72%3. to target the corporate network of an enterprise customer. 2. TrendLabs Malware Blog, Trend Micro, 2012. 3. “The impact of

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    16 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us