首页> 外文期刊>Computers & Security >An advanced persistent threat in 3G networks: Attacking the home network from roaming networks
【24h】

An advanced persistent threat in 3G networks: Attacking the home network from roaming networks

机译:3G网络中的高级持久威胁:从漫游网络攻击家庭网络

获取原文
获取原文并翻译 | 示例

摘要

The HLR/AuC is considered to be one of the most important network elements of a 3G network. It can serve up to five million subscribers and at least one transaction with HLR/ AuC is required for every single phone call or data session. This paper presents experimental results and observations that can be exploited to perform a novel distributed denial of service attack in 3G networks that targets the availability of the HLR/AuC. More specifically, first we present an experiment in which we identified and proved some zero-day vulnerabilities of the 3G network that can be exploited by malicious actors to mount various attacks. For the purpose of our experiment, we have used off-the-shelf infrastructure and software, without any specialized modification. Based on the observations of the experiment, we reveal an Advanced Persistent Threat (APT) in 3G networks that aims to flood an HLR/AuC of a mobile operator. We also prove that the discovered APT can be performed in a trivial manner using commodity hardware and software, which is widely and affordably available.
机译:HLR / AuC被认为是3G网络中最重要的网络元素之一。它可以服务多达500万订户,并且每个电话或数据会话至少需要进行一次与HLR / AuC的交易。本文介绍了可用于在针对HLR / AuC可用性的3G网络中执行新型分布式拒绝服务攻击的实验结果和观察结果。更具体地说,首先,我们提出一个实验,其中我们识别并证明了3G网络的零日漏洞,恶意参与者可以利用该漏洞进行各种攻击。为了我们的实验目的,我们使用了现成的基础架构和软件,没有进行任何专门的修改。基于实验的观察结果,我们揭示了3G网络中的高级持久威胁(APT),其目标是淹没移动运营商的HLR / AuC。我们还证明,使用广泛使用且价格适中的商品硬件和软件可以轻松实现发现的APT。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号