On Identifying Threats and Quantifying Cybersecurity Risks of Mnos Deploying Heterogeneous Rats

被引:8
作者
Angelogianni, Anna [1 ]
Politis, Ilias [1 ]
Mohammadi, Farnaz [2 ]
Xenakis, Christos [1 ]
机构
[1] Univ Piraeus, Syst Secur Lab SSL, Piraeus 18534, Greece
[2] Univ Passau, Passau Inst Digital Secur, D-94032 Passau, Germany
基金
欧盟地平线“2020”;
关键词
Security; Cellular networks; 5G mobile communication; GSM; Communication system security; 3G mobile communication; Authentication; Attack trees; risk analysis; wireless cellular networks; wireless security; SECURITY;
D O I
10.1109/ACCESS.2020.3045322
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless networks constitute a significant attack vector for adversaries due to their wide usage in our everyday life. As the fifth generation of wireless networks reaches maturity, several vulnerabilities affecting earlier generations have been resolved. Nevertheless the coexistence of legacy wireless technologies is giving rise to the risk of allowing adversaries to perform downgrade attacks, thus bypassing the improved security of the state-of-the-art communication networks. Vulnerabilities due to the trade-off between security and usability could also exist in the latest wireless networking technologies; hence mobile network operators need to be aware of the risks related to both protocol vulnerabilities and configuration defects. This paper proposes a methodology for the systematic identification of vulnerabilities associated with wireless access protocols and systems and the quantitative evaluation of the resulting risks for mobile operators using attack trees, while considering the current legislative frameworks. The proposed methodology has been designed to aid both, mobile operators towards planning more effective cybersecurity strategies and adopting efficient defences to minimise the probability of an attack and predict its impact on the operational, market and business aspects of mobile network operators. The proposed risk assessment analysis is evaluated over three distinct vertical scenarios, namely an emergency call, a high-speed train commute and a massive public event, with the most relevant threats and their impact being measured and discussed. The evaluation of the model revealed significant results for mobile network operators that are deploying a mix of legacy and state of the art cellular technologies.
引用
收藏
页码:224677 / 224701
页数:25
相关论文
共 71 条
[1]   Analyzing the Security in the GSM Radio Network Using Attack Jungles [J].
Abdulla, Parosh Aziz ;
Cederberg, Jonathan ;
Kaati, Lisa .
LEVERAGING APPLICATIONS OF FORMAL METHODS, VERIFICATION, AND VALIDATION, PT I, 2010, 6415 :60-+
[2]  
[Anonymous], 2012, GSM SEC COUNTR REP G
[3]  
[Anonymous], 2018, 55251 TS 3GPP
[4]  
[Anonymous], 2015, 24301 TS 3GPP
[5]  
[Anonymous], 2016, P 19 WORLD C NOND TE
[6]  
[Anonymous], 2020, 36331 TS 3GPP
[7]  
[Anonymous], 2006, 33401 TR ETSI
[8]  
[Anonymous], 2014, ACSAC 14
[9]  
[Anonymous], 2020, documentTS38.331,
[10]  
[Anonymous], 2019, CYBERSECURITY 5G NET