On Identifying Threats and Quantifying Cybersecurity Risks of Mnos Deploying Heterogeneous Rats

被引:8
作者
Angelogianni, Anna [1 ]
Politis, Ilias [1 ]
Mohammadi, Farnaz [2 ]
Xenakis, Christos [1 ]
机构
[1] Univ Piraeus, Syst Secur Lab SSL, Piraeus 18534, Greece
[2] Univ Passau, Passau Inst Digital Secur, D-94032 Passau, Germany
基金
欧盟地平线“2020”;
关键词
Security; Cellular networks; 5G mobile communication; GSM; Communication system security; 3G mobile communication; Authentication; Attack trees; risk analysis; wireless cellular networks; wireless security; SECURITY;
D O I
10.1109/ACCESS.2020.3045322
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless networks constitute a significant attack vector for adversaries due to their wide usage in our everyday life. As the fifth generation of wireless networks reaches maturity, several vulnerabilities affecting earlier generations have been resolved. Nevertheless the coexistence of legacy wireless technologies is giving rise to the risk of allowing adversaries to perform downgrade attacks, thus bypassing the improved security of the state-of-the-art communication networks. Vulnerabilities due to the trade-off between security and usability could also exist in the latest wireless networking technologies; hence mobile network operators need to be aware of the risks related to both protocol vulnerabilities and configuration defects. This paper proposes a methodology for the systematic identification of vulnerabilities associated with wireless access protocols and systems and the quantitative evaluation of the resulting risks for mobile operators using attack trees, while considering the current legislative frameworks. The proposed methodology has been designed to aid both, mobile operators towards planning more effective cybersecurity strategies and adopting efficient defences to minimise the probability of an attack and predict its impact on the operational, market and business aspects of mobile network operators. The proposed risk assessment analysis is evaluated over three distinct vertical scenarios, namely an emergency call, a high-speed train commute and a massive public event, with the most relevant threats and their impact being measured and discussed. The evaluation of the model revealed significant results for mobile network operators that are deploying a mix of legacy and state of the art cellular technologies.
引用
收藏
页码:224677 / 224701
页数:25
相关论文
共 71 条
[31]   GUTI Reallocation Demystified: Cellular Location Tracking with Changing Temporary Identifier [J].
Hong, Byeongdo ;
Bae, Sangwook ;
Kim, Yongdae .
25TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2018), 2018,
[32]   Privacy Attacks to the 4G and 5G Cellular Paging Protocols Using Side Channel Information [J].
Hussain, Syed Rafiul ;
Echeverria, Mitziu ;
Chowdhury, Omar ;
Li, Ninghui ;
Bertino, Elisa .
26TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2019), 2019,
[33]   5GReasoner: A Property-Directed Security and Privacy Analysis Framework for 5G Cellular Network Protocol [J].
Hussain, Syed Rafiul ;
Echeverria, Mitziu ;
Karim, Imtiaz ;
Chowdhury, Omar ;
Bertino, Elisa .
PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, :669-684
[34]   LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE [J].
Hussain, Syed Rafiul ;
Chowdhury, Omar ;
Mehnaz, Shagufta ;
Bertino, Elisa .
25TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2018), 2018,
[35]   Trashing IMSI Catchers in Mobile Networks [J].
Khan, Mohammed Shafiul Alam ;
Mitchell, Chris J. .
PROCEEDINGS OF THE 10TH ACM CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC 2017), 2017, :207-218
[36]   Touching the Untouchables: Dynamic Security Analysis of the LTE Control Plane [J].
Kim, Hongil ;
Lee, Jiho ;
Lee, Eunkyu ;
Kim, Yongdae .
2019 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2019), 2019, :1153-1168
[37]  
Kune D. F., 2012, P NETW DISTR SYST SE, P1
[38]  
LORENZ EN, 1963, J ATMOS SCI, V20, P130, DOI 10.1175/1520-0469(1963)020<0130:DNF>2.0.CO
[39]  
2
[40]   Efficient Next Generation Emergency Communications over Multi-Access Edge Computing [J].
Markakis, Evangelos K. ;
Politis, Ilias ;
Lykourgiotis, Asimakis ;
Rebahi, Yacine ;
Mastorakis, George ;
Mavromoustakis, Constandinos X. ;
Pallis, Evangelos .
IEEE COMMUNICATIONS MAGAZINE, 2017, 55 (11) :92-97