Академический Документы
Профессиональный Документы
Культура Документы
Mobile Networks
Kari-Matti Puukangas / TeliaSonera
14.4.2010
Contents
Background
Scope of the study
Different Types of Fraudulent SMS
Spoofing
Faking
3rd party faking
Spamming and Flooding
GT scanning and Mobile malware
TCAP Handshake
TCAP Sec
SMS Firewall
Conclusion
Kari-Matti Puukangas
Background
Asia
USA
Europe
Kari-Matti Puukangas
Background
Kari-Matti Puukangas
Background
Kari-Matti Puukangas
Kari-Matti Puukangas
Spoofing
Faking
3rd party faking
Spamming
Flooding
GT scanning
Mobile malware
Kari-Matti Puukangas
Spoofing
Kari-Matti Puukangas
Faking
Kari-Matti Puukangas
Kari-Matti Puukangas
10
Spamming
Unsolicited SMS
The spam SMS content can include:
Commercial information
Bogus contest
Messages intended to invite a response from the
receiver (e.g. to call a premium number)
Flooding
A large number of messages sent to one or more
destinations
Messages may be either valid or invalid.
Purpose to slow down the operator network or jam
one ore more mobile terminals
Usually combined with spoofing or faking
Kari-Matti Puukangas
11
GT Scanning
Mobile malware
Kari-Matti Puukangas
12
13
Kari-Matti Puukangas
14
TCAP Handshake
TCAP Sec
SMS Firewall
Kari-Matti Puukangas
15
TCAP Handshake
Kari-Matti Puukangas
16
TCAP Handshake
Weaknesses
No big investments
Good protection against faking
Standardized by 3GPP
Opportunities
-
Threats
Kari-Matti Puukangas
17
TCAP sec
SS7 Security Gateway (SEG) with databases for security policy (SPD) and security
association (SAD)
Kari-Matti Puukangas
18
TCAP sec
Strengths
-
Weaknesses
Opportunities
-
Threats
Kari-Matti Puukangas
19
SMS Firewall
Kari-Matti Puukangas
20
SMS Firewall
Kari-Matti Puukangas
21
SMS Firewall
Kari-Matti Puukangas
22
SMS Firewall
Strengths
-
Weaknesses
Opportunities
-
Threats
Kari-Matti Puukangas
23
Conclusion
Requirements
Conclusion
Kari-Matti Puukangas
24
Thank You
Questions?
Kari-Matti Puukangas
25