Agenda
- SS7 security
- State of the art
- Challenges in detection
- Testing environment
- SS7 attack simulator: A demo
- Big data platform
- Test results with machine learning.
- Challenges and ways forward
Agenda
- SS7 security
- State of the art
- Challenges in detection
- Testing environment
- SS7 attack simulator: A demo
- Big data platform
- Test results with machine learning.
- Challenges and ways forward
The Signaling System 7 aka SS7
- The nervous system
- Of both he telecommunication network and the mobile communication network.
- Allows network elements to communicate, collaborate and
deliver telecommunication services to the users.
- Used to be a walled garden system
- Network of trusted operators.
- No need for security.
New era: Emergence of threats
- Deregulation
- Removed the monopoly of telecom operators.
- Opened the market for less trusted parties.
- Transition to IP
- Paved the way for innovative services.
- Inherited weaknesses of IP.
- Advances in microelectronics
- Cheaper equipment to launch attacks.
- Open source mobile communication
- Enabled the construction of fake base station.
Publicly disclosed SS7 attacks
- Attackers are able to
- Track the location of subscribers.
- Intercept calls and SMS.
- Commit fraud.
- Deny service to subscribers..
- Requirements for attackers
- Must be connected to the SS7 network.
- Be able to generate arbitrary messages.
- Must be able to imitate an element in the core network by providing SS7 capability.
SS7 Messages used in attacks
- Category 1:
- Messages that has no legitimate use case for external exposures are as follows:.
- sendIdentification (SI) – anyTimeInterrogation (ATI) – anyTImeModification (ATM) – provideSubscriberLocation (PSL).
- Category 2:
- Messages that has no legitimate need to be exposed externally for the operator’s own subscribers, but can be received for other operator’s roaming subscribers as follows:
- provideSubscriberInformation (PSI) – insertSubscriberData (ISD) + gsmSCF – insertSubscriberData – deletedSubscriberData (DSL).
- Category 3:
- Messages that has legitimate need for external exposure. These are the following:
- updateLocation (UL) – sendAuthenticatioInfo (SAI) – registerSS – eraseSS – processUnstructuredSS (PSU) – cancelLocation (CL) - sendRoutingInfor-mation(SRI-SM, SRI-LCS).
How is the situation with other operators
- To be updated if approved for publishing
SS7 security
- SS7 is no longer secured.
- It is necessary to separate their home SS7 portion from the global network and provide adequate protection.
- It is necessary to perform border control to block illegitimate SS7 messages to penetrate the network.
Detection methods and challenges
- Category 1
- Simple filter can be used to identify and block them to prevent attacks.
- Category 2
- More advanced filters using the correlation between roaming users and their home operators can be employed to block unwanted messages.
- Unfortunately, such filtering will not be able to protect roaming users.
- Category 3
- No usable filter to detect attacks because complex correlations with further information on the current user state e.g. last cell ID.
- Indeed the signatures for attacks using category 3 messages can hardly be determined.
Agenda
- SS7 security
- State of the art
- Challenges in detection
- Testing environment
- SS7 attack simulator: A demo
- Big data platform
- Test results with machine learning.
- Challenges and ways forward
Testing environment: Purposes
- Simulate SS7 attacks
- Test machine learning for detection
Testing environment: SS7 stack simulator
Testing environment: SS7 attack simulator
SS7 attack simulator: Different simulated attacks
- Location tracking by sending ATI message.
- Location tracking by sending PSI message.
- Intercepting SMS.
SS7 attack simulator: Simulated nodes
SS7 attack simulator: Flow chart
SS7 attack simulator: A scenario
- 10 subcribers including a VIP user.
- The VIP user is attacked by Intercept SMS.
SS7 attack simulator: A demo
Location tracking ATI attack
Location tracking PSI attack
Big data platform to support SS7 attack detection
How machine learning can help
SMS intercepting attack: Faking a subcriber and updating a false location.
SMS intercepting attack: Receiving all SMS set to the subcriber.
Test results: K-mean clustering of user behavior
Test results: Anomaly detection of user behavior
Agenda
- SS7 security
- State of the art
- Challenges in detection
- Testing environment
- SS7 attack simulator: A demo
- Big data platform
- Test results with machine learning.
- Challenges and ways forward
Challenges and ways forward
- Still ongoing activity to develop and simulate more attacks in the testing environment.
- Develop a SS7 data collection and a scanning tool for SS7 vulnerabilities.
- Develop real-time machine learning-based toolbox for SS7 attack detection.
- We need real data and real cases for research and development.
SS7 security
The potential of machine learning
Do Van Thanh, Hai Nguyen and Kristoffer Jensen
Momchil Nikolov and Karl Walter Høye