Mobile network operators connect towards each other through the private interconnection network (IPX). This closed private network enables international calls, data, messages and many other services across network and country borders. It connects billions of users and Internet of Things devices. In the last years, evidence arose that the network has been misused for various kind of attacks. We will introduce the foundations of the interconnection network, give the security background. Outline existing attacks and describe a new charging attack. Various activities are ongoing to improve the security of the IPX network, which we will describe. We close with an overview of potential risk areas for 5G core networks.
%0 Journal Article
%1 mjs:Holtmanns:MobileCoreNetworks
%A Holtmanns, Silke
%D 2019
%K 4g 5g_mobile_network charging diameter ds19 editor interconnection ipx mjsarticle ss7
%N 2
%P 943-951
%T New Attack Vectors for Mobile Core Networks
%U http://www.sicherheitsforschung-magdeburg.de/uploads/journal/MJS_064_Holtmanns_MobileCoreNetworks.pdf
%V 18
%X Mobile network operators connect towards each other through the private interconnection network (IPX). This closed private network enables international calls, data, messages and many other services across network and country borders. It connects billions of users and Internet of Things devices. In the last years, evidence arose that the network has been misused for various kind of attacks. We will introduce the foundations of the interconnection network, give the security background. Outline existing attacks and describe a new charging attack. Various activities are ongoing to improve the security of the IPX network, which we will describe. We close with an overview of potential risk areas for 5G core networks.
@article{mjs:Holtmanns:MobileCoreNetworks,
abstract = { Mobile network operators connect towards each other through the private interconnection network (IPX). This closed private network enables international calls, data, messages and many other services across network and country borders. It connects billions of users and Internet of Things devices. In the last years, evidence arose that the network has been misused for various kind of attacks. We will introduce the foundations of the interconnection network, give the security background. Outline existing attacks and describe a new charging attack. Various activities are ongoing to improve the security of the IPX network, which we will describe. We close with an overview of potential risk areas for 5G core networks. },
added-at = {2021-09-19T18:42:17.000+0200},
author = {Holtmanns, Silke},
biburl = {https://www.bibsonomy.org/bibtex/24d6145d0d734c637b4161da605253d6b/steschum},
interhash = {f5075828b41bdc05b9c305c44e875410},
intrahash = {4d6145d0d734c637b4161da605253d6b},
issn = {2192-4260},
journaltitle = {Magdeburger Journal zur Sicherheitsforschung},
keywords = {4g 5g_mobile_network charging diameter ds19 editor interconnection ipx mjsarticle ss7},
language = {EN},
number = 2,
pages = {943-951},
timestamp = {2021-10-22T17:15:30.000+0200},
title = {New Attack Vectors for Mobile Core Networks},
url = {http://www.sicherheitsforschung-magdeburg.de/uploads/journal/MJS_064_Holtmanns_MobileCoreNetworks.pdf},
urldate = {2019-08-05},
volume = 18,
year = 2019
}