SS7 Vulnerabilities - A Survey and Implementation of Machine Learning vs Rule Based Filtering for Detection of SS7 Network Attacks

Kaleem Ullah*, Imran Rashid, Hammad Afzal, Mian Muhammad Waseem Iqbal, Yawar Abbas Bangash, Haider Abbas

*المؤلف المقابل لهذا العمل

نتاج البحث: المساهمة في مجلةArticleمراجعة النظراء

164 اقتباسات (Scopus)

ملخص

The Signalling System No. 7 (SS7) is used in GSM/UMTS telecommunication technologies for signalling and management of communication. It was designed on the concept of private boundary walled technology having mutual trust between few national/multinational operators with no inherent security controls in 1970s. Deregulation, expansion, and merger of telecommunication technology with data networks have vanquished the concept of boundary walls hence increasing the number of service providers, entry points, and interfaces to the SS7 network, which made it vulnerable to serious attacks. The SS7 exploits can be used by attackers to intercept messages, track a subscriber's location, tape/redirect calls, adversely affect disaster relief operations, drain funds of individuals from banks in combination with other methods and send billions of spam messages. This paper provides a comprehensive review of the SS7 attacks with detailed methods to execute attacks, methods to enter the SS7 core network, and recommends safeguards against the SS7 attacks. It also provides a machine learning based framework to detect anomalies in the SS7 network which is compared with rule based filtering. It further presents a conceptual model for the defense of network.

اللغة الأصليةEnglish
رقم المقال8984216
الصفحات (من إلى)1337-1371
عدد الصفحات35
دوريةIEEE Communications Surveys and Tutorials
مستوى الصوت22
رقم الإصدار2
المعرِّفات الرقمية للأشياء
حالة النشرPublished - أبريل 1 2020
منشور خارجيًانعم

ASJC Scopus subject areas

  • ???subjectarea.asjc.2200.2208???

قم بذكر هذا