SlideShare ist ein Scribd-Unternehmen logo
1 von 25
Downloaden Sie, um offline zu lesen
Telecom Security
in the Era of 5G and IoT
Dmitry Kurbatov, CTO
dmitry.kurbatov@positive-tech.com
 Started as a network engineer in 2007
 Switched to security in 2009
 Joined Positive Technologies 2010 and it changed everything
Who I am
Signaling System 7
(SS7) security report
Vulnerabilities of
mobile Internet (GPRS)
2014 2016
Primary security threats
to SS7 cellular networks
2017
Threats to packet core
security of 4G network
Next-generation networks, next-
level cybersecurity problems
(Diameter vulnerabilities)
2018
Diameter vulnerabilities
exposure report
2019
5G security
analytics
What we do
Competences:
Identification of threats and possible
attack scenarios in companies of any
business sphere
Global cybersecurity research
Wide range of products and services
portfolio: corporate, ICS, telecom,
financial, media, retail, government
National scale sports and government
cybersecurity service provider
Worldwide leadership
Web
Banking
ERP
Telecom
ICS
What we do
Competences:
Identification of threats and possible
attack scenarios in companies of any
business sphere
Global cybersecurity research
Wide range of products and services
portfolio: corporate, ICS, telecom,
financial, media, retail, government
National scale sports and government
cybersecurity service provider
Worldwide leadership
Web
Banking
ERP
Telecom
ICS
More IT technologies
penetrate
into other segments
Positive Technologies
in numbers
Every year 200+
200+
Information
security audits
0-day vulnerabilities
discovered
We discovered more than 50%
of all vulnerabilities in ICS and Telco
Expertise
150+
0-day
vulnerabilities
discovered
in ICS
30+
0-day
vulnerabilities
discovered
in Telco
400+
Web security
researches
30+
Public cybersecurity
analytical reports
Agenda
1/3 of presentation
V
Few words about me
and Positive Technologies
V
Inherited and new security issues
in 5G
V
Security guidelines
What to look at
in terms of security
Transfer to new
protocols
5G non-standalone or
how will it work right
now
Virtualized
everything
Lots and lots of new
devices and services
Where do I start … slicing
 Splitting a network
into isolated slices
 Allocating separate
(virtual) resources
 Unique security
policies to each slice
Where do I start … slicing
more slices =
more virtual devices =
more configurations
BUT
1/3 successful attacks
during 4G network testing
due to misconfiguration
75% of corp harbored critical
or high-severity vulnerabilities
because of configuration flaws
Misconfiguration Misconfiguration Vulnerability in Rest API
Vulnerability in network equipment
New core
 Super flexible
 Can serve all devices
and new application
 Based on SDN/NFV
NEF NRF PCF UDM AF
Network Exposure
Function
NF Repository
Function
Policy Control
Function
Unified Data
Management
Application
Function
AUSF
Authentication
Server Function
AMF
Core Access and Mobility
Management Function
SMF
Session Management
Function
Nnef Nnrf Npcf Nudm Naf
Nusf Namf Nsmf
UE (R)AN UPF DN
User Plane
Function
N2 N4
N5N3
N1
New core, all virtual
 Lots of VMs
and containers
 Communication
over software bus
BUT NEF NRF PCF UDM AF
Network Exposure
Function
NF Repository
Function
Policy Control
Function
Unified Data
Management
Application
Function
AUSF
Authentication
Server Function
AMF
Core Access and Mobility
Management Function
SMF
Session Management
Function
Nnef Nnrf Npcf Nudm Naf
Nusf Namf Nsmf
UE (R)AN UPF DN
User Plane
Function
N2 N4
N5N3
N1
New core, all virtual, web-based
NEF NRF PCF UDM AF
Network Exposure
Function
NF Repository
Function
Policy Control
Function
Unified Data
Management
Application
Function
AUSF
Authentication
Server Function
AMF
Core Access and Mobility
Management Function
SMF
Session Management
Function
Nnef Nnrf Npcf Nudm Naf
Nusf Namf Nsmf
UE (R)AN UPF DN
User Plane
Function
N2 N4
N5N3
N1
Architecture
New core, all virtual, web-based
Example
of communication
between functions
Service Registration
Service Discovery
Session Establishment
Session
Establishment Request
HTTP PUT (NF register)
201 Created
HTTP PUT (NFDiscovery)
200 OK (List of SMSFs)
HTTP POST (Create PDU Session)
201 Created
Convergence of
telecom and IT world
 The 5G network core
is TCP/IP-based
 These protocols are
open and well-known
 Tools for finding and
exploiting vulnerabilities
are available to
any adversary
Problem is clear, but not solved
Hacking 5G will be just as simple as hacking the web or enterprise
Difficulty of bypassing the perimeter (percentage of systems) Security level (percentage of web applications)
Analogue
1980 1991 1999 2001 2005 2010 2017
1G 2G 2.5G+ 3G 3.5G 4G 5G
Constant & continual introduction of additional network access
SS7
GTP
SIP
4.5G
APIs
Diameter
Backward compatibility
2019
Now what can a hacker do?
Easily
From
anywhere
Any mobile
operator
No special
skills needed
Steal your money
Get access to your
email and social media
Track your location
Intercept your data, calls,
and SMS messages
Take control of
your digital identity
from
GSM to 5G
Different protocols
SAME THREATS
Perform massive
denial-of-service attacks
Protocol threat comparisons
Successful attacks by threat types
Threat
Percentage of vulnerable
networks (2017)
SS7
networks
Diameter
networks
Subscriber information disclosure 100% 100%
Network information disclosure 63% 75%
Subscriber traffic interception 89% —*
Fraud 78% 33%
Subscriber denial of service 100% 100%
* In the tested networks, SMS transmission using the Diameter network was not carried out.
To establish voice calls in 4G networks, the SIP protocol is used.
Possible different reasons for previous generations
out performing Diameter in certain areas.
 SS7 threat awareness is higher
 Diameter specific challenges
Positive Technologies have further research being
published very soon looking at Diameter.
Comparing 4G networks using Diameter against
earlier network generations
Inherited issue
5G non-standalone is vulnerable to denial of service
AvailabilityConfidentiality
IntegrityIntegrity
ConfidentialityAvailability
USUALSECURITY
PRIORITIES
IOTSECURITY
PRIORITIES
Briefly about IoT
32%
37%
24%
8%
0
5
10
15
20
25
30
35
40
1 2 3 4
GARTNER: "By 2020, over 25% of identified attacks in enterprises will involve IoT."
Already
use IoT
Preparing to
implement
IoT
Will wait
and see
Will wait as
long possible
Guess how easy is it?
Millions of connected IoT devices mean
millions of potential botnet soldiers
Mirai,
500K devices
in botnet
2016
1M potentially
vulnerable
2019 TOTAL RESULTS 1,086,395
TOP COUNTRIES
Almost finished
V
Few words about me
and Positive Technologies
2/3 of presentation
V
Inherited and new security issues
in 5G
V
Security guidelines
Where to start
Ensure protection
where interoperability
required from day one
Secure new
interfaces and
communications
channels
Safeguard
SDN/NFV and
virtual environment
Implement policies
separately for
network slices
Take IoT in your
network under control
where possible
Summary
Trustworthy solutions,
constant verification
Security by design is
good, but
implementation is
always different
Security awareness
is the key
Security should
be comprehensive
Thanks
for attention
Dmitry.Kurbatov@positive-tech.com
Contact@positive-tech.com

Weitere ähnliche Inhalte

Was ist angesagt?

Philippe Langlois - LTE Pwnage - P1security
Philippe Langlois - LTE Pwnage - P1securityPhilippe Langlois - LTE Pwnage - P1security
Philippe Langlois - LTE Pwnage - P1security
P1Security
 
Transforming Private 5G Networks
Transforming Private 5G NetworksTransforming Private 5G Networks
Transforming Private 5G Networks
inside-BigData.com
 

Was ist angesagt? (20)

SS7: the bad neighbor you're stuck with during the 5G migration and far beyond
SS7: the bad neighbor you're stuck with during the 5G migration and far beyondSS7: the bad neighbor you're stuck with during the 5G migration and far beyond
SS7: the bad neighbor you're stuck with during the 5G migration and far beyond
 
Introducing Peering LAN 2.0 at DE-CIX
Introducing Peering LAN 2.0 at DE-CIXIntroducing Peering LAN 2.0 at DE-CIX
Introducing Peering LAN 2.0 at DE-CIX
 
Positive approach to security of Core networks
Positive approach to security of Core networksPositive approach to security of Core networks
Positive approach to security of Core networks
 
Telecom incidents investigation: daily work behind the scenes
Telecom incidents investigation: daily work behind the scenesTelecom incidents investigation: daily work behind the scenes
Telecom incidents investigation: daily work behind the scenes
 
5G and IoT Security
5G and IoT Security5G and IoT Security
5G and IoT Security
 
Agile 5G Deployment
Agile 5G DeploymentAgile 5G Deployment
Agile 5G Deployment
 
Philippe Langlois - LTE Pwnage - P1security
Philippe Langlois - LTE Pwnage - P1securityPhilippe Langlois - LTE Pwnage - P1security
Philippe Langlois - LTE Pwnage - P1security
 
Advanced: Private Networks & 5G Non-Public Networks
Advanced: Private Networks & 5G Non-Public NetworksAdvanced: Private Networks & 5G Non-Public Networks
Advanced: Private Networks & 5G Non-Public Networks
 
5G Services Story
5G Services Story5G Services Story
5G Services Story
 
An Introduction to 5G and ‘Real’ 5G
An Introduction to 5G and ‘Real’ 5GAn Introduction to 5G and ‘Real’ 5G
An Introduction to 5G and ‘Real’ 5G
 
6G Training Course Part 2: 6G Vision
6G Training Course Part 2: 6G Vision6G Training Course Part 2: 6G Vision
6G Training Course Part 2: 6G Vision
 
5G technical_overview_training_sec_1
5G technical_overview_training_sec_15G technical_overview_training_sec_1
5G technical_overview_training_sec_1
 
Telecom under attack: demo of fraud scenarios and countermeasures
Telecom under attack: demo of fraud scenarios and countermeasuresTelecom under attack: demo of fraud scenarios and countermeasures
Telecom under attack: demo of fraud scenarios and countermeasures
 
5G Network Architecture, Design and Optimisation
5G Network Architecture, Design and Optimisation5G Network Architecture, Design and Optimisation
5G Network Architecture, Design and Optimisation
 
Transforming Private 5G Networks
Transforming Private 5G NetworksTransforming Private 5G Networks
Transforming Private 5G Networks
 
Scaling 5G to new frontiers with NR-Light (RedCap)
Scaling 5G to new frontiers with NR-Light (RedCap)Scaling 5G to new frontiers with NR-Light (RedCap)
Scaling 5G to new frontiers with NR-Light (RedCap)
 
Propelling 5G forward: a closer look at 3GPP Release-16
Propelling 5G forward: a closer look at 3GPP Release-16Propelling 5G forward: a closer look at 3GPP Release-16
Propelling 5G forward: a closer look at 3GPP Release-16
 
Transforming enterprise and industry with 5G private networks
Transforming enterprise and industry with 5G private networksTransforming enterprise and industry with 5G private networks
Transforming enterprise and industry with 5G private networks
 
Presentation on 5G security
Presentation on 5G securityPresentation on 5G security
Presentation on 5G security
 
5G
5G5G
5G
 

Ähnlich wie Telecom Security in the Era of 5G and IoT

5G WIRELESS TRAINING
5G WIRELESS TRAINING5G WIRELESS TRAINING
5G WIRELESS TRAINING
Etta2020
 
Network Security Roadmap have some perception of provided security
Network Security Roadmap have some perception of provided securityNetwork Security Roadmap have some perception of provided security
Network Security Roadmap have some perception of provided security
slametarrokhim1
 

Ähnlich wie Telecom Security in the Era of 5G and IoT (20)

Security course: exclusive 5G SA pitfalls and new changes to legislation
Security course: exclusive 5G SA pitfalls and new changes to legislationSecurity course: exclusive 5G SA pitfalls and new changes to legislation
Security course: exclusive 5G SA pitfalls and new changes to legislation
 
5G mission diary: Houston, we have a problem
5G mission diary: Houston, we have a problem5G mission diary: Houston, we have a problem
5G mission diary: Houston, we have a problem
 
전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-
전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-
전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-
 
Elevating Network Security through NGFW Firewalls.pdf
Elevating Network Security through NGFW Firewalls.pdfElevating Network Security through NGFW Firewalls.pdf
Elevating Network Security through NGFW Firewalls.pdf
 
Chrono Defend: Time-Traveling Safeguards through NGFW Firewall Innovation
Chrono Defend: Time-Traveling Safeguards through NGFW Firewall InnovationChrono Defend: Time-Traveling Safeguards through NGFW Firewall Innovation
Chrono Defend: Time-Traveling Safeguards through NGFW Firewall Innovation
 
NGFW - An Updated Overview
NGFW - An Updated Overview NGFW - An Updated Overview
NGFW - An Updated Overview
 
BarbirThe Need of SDO Collaboration as an Enabler of SOA in NGN
BarbirThe Need of SDO Collaboration as an Enabler of SOA in NGNBarbirThe Need of SDO Collaboration as an Enabler of SOA in NGN
BarbirThe Need of SDO Collaboration as an Enabler of SOA in NGN
 
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING MLSECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
 
Best 5G Security Solutions - SecurityGen
Best 5G Security Solutions - SecurityGenBest 5G Security Solutions - SecurityGen
Best 5G Security Solutions - SecurityGen
 
SecurityGen's OSS/BSS Solutions: Navigating the Complexity of Modern Operations
SecurityGen's OSS/BSS Solutions: Navigating the Complexity of Modern OperationsSecurityGen's OSS/BSS Solutions: Navigating the Complexity of Modern Operations
SecurityGen's OSS/BSS Solutions: Navigating the Complexity of Modern Operations
 
5G Security Program -Case Studies
5G Security Program -Case Studies 5G Security Program -Case Studies
5G Security Program -Case Studies
 
5G Security Program Datasheet (2).pdf
5G Security Program Datasheet (2).pdf5G Security Program Datasheet (2).pdf
5G Security Program Datasheet (2).pdf
 
Migrating mobile networks to 5 g a smooth and secure approach 01.10.20
Migrating mobile networks to 5 g a smooth and secure approach 01.10.20Migrating mobile networks to 5 g a smooth and secure approach 01.10.20
Migrating mobile networks to 5 g a smooth and secure approach 01.10.20
 
Enhance Your Network Security with NGFW Firewall Solutions by SecurityGen
Enhance Your Network Security with NGFW Firewall Solutions by SecurityGenEnhance Your Network Security with NGFW Firewall Solutions by SecurityGen
Enhance Your Network Security with NGFW Firewall Solutions by SecurityGen
 
AirTight Networks - Wireless Security 2011
AirTight Networks - Wireless Security 2011AirTight Networks - Wireless Security 2011
AirTight Networks - Wireless Security 2011
 
Breakfast Briefing- Natilik & Cisco Introducing The Network. Intuitive.
Breakfast Briefing- Natilik & Cisco Introducing The Network. Intuitive.Breakfast Briefing- Natilik & Cisco Introducing The Network. Intuitive.
Breakfast Briefing- Natilik & Cisco Introducing The Network. Intuitive.
 
5G WIRELESS TRAINING
5G WIRELESS TRAINING5G WIRELESS TRAINING
5G WIRELESS TRAINING
 
A rede como um sensor de segurança
A rede como um sensor de segurança A rede como um sensor de segurança
A rede como um sensor de segurança
 
Infographic: Security for Mobile Service Providers
Infographic: Security for Mobile Service ProvidersInfographic: Security for Mobile Service Providers
Infographic: Security for Mobile Service Providers
 
Network Security Roadmap have some perception of provided security
Network Security Roadmap have some perception of provided securityNetwork Security Roadmap have some perception of provided security
Network Security Roadmap have some perception of provided security
 

Kürzlich hochgeladen

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Kürzlich hochgeladen (20)

MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

Telecom Security in the Era of 5G and IoT

  • 1. Telecom Security in the Era of 5G and IoT Dmitry Kurbatov, CTO dmitry.kurbatov@positive-tech.com
  • 2.  Started as a network engineer in 2007  Switched to security in 2009  Joined Positive Technologies 2010 and it changed everything Who I am Signaling System 7 (SS7) security report Vulnerabilities of mobile Internet (GPRS) 2014 2016 Primary security threats to SS7 cellular networks 2017 Threats to packet core security of 4G network Next-generation networks, next- level cybersecurity problems (Diameter vulnerabilities) 2018 Diameter vulnerabilities exposure report 2019 5G security analytics
  • 3. What we do Competences: Identification of threats and possible attack scenarios in companies of any business sphere Global cybersecurity research Wide range of products and services portfolio: corporate, ICS, telecom, financial, media, retail, government National scale sports and government cybersecurity service provider Worldwide leadership Web Banking ERP Telecom ICS
  • 4. What we do Competences: Identification of threats and possible attack scenarios in companies of any business sphere Global cybersecurity research Wide range of products and services portfolio: corporate, ICS, telecom, financial, media, retail, government National scale sports and government cybersecurity service provider Worldwide leadership Web Banking ERP Telecom ICS More IT technologies penetrate into other segments
  • 5. Positive Technologies in numbers Every year 200+ 200+ Information security audits 0-day vulnerabilities discovered We discovered more than 50% of all vulnerabilities in ICS and Telco Expertise 150+ 0-day vulnerabilities discovered in ICS 30+ 0-day vulnerabilities discovered in Telco 400+ Web security researches 30+ Public cybersecurity analytical reports
  • 6. Agenda 1/3 of presentation V Few words about me and Positive Technologies V Inherited and new security issues in 5G V Security guidelines
  • 7. What to look at in terms of security Transfer to new protocols 5G non-standalone or how will it work right now Virtualized everything Lots and lots of new devices and services
  • 8. Where do I start … slicing  Splitting a network into isolated slices  Allocating separate (virtual) resources  Unique security policies to each slice
  • 9. Where do I start … slicing more slices = more virtual devices = more configurations BUT 1/3 successful attacks during 4G network testing due to misconfiguration 75% of corp harbored critical or high-severity vulnerabilities because of configuration flaws Misconfiguration Misconfiguration Vulnerability in Rest API Vulnerability in network equipment
  • 10. New core  Super flexible  Can serve all devices and new application  Based on SDN/NFV NEF NRF PCF UDM AF Network Exposure Function NF Repository Function Policy Control Function Unified Data Management Application Function AUSF Authentication Server Function AMF Core Access and Mobility Management Function SMF Session Management Function Nnef Nnrf Npcf Nudm Naf Nusf Namf Nsmf UE (R)AN UPF DN User Plane Function N2 N4 N5N3 N1
  • 11. New core, all virtual  Lots of VMs and containers  Communication over software bus BUT NEF NRF PCF UDM AF Network Exposure Function NF Repository Function Policy Control Function Unified Data Management Application Function AUSF Authentication Server Function AMF Core Access and Mobility Management Function SMF Session Management Function Nnef Nnrf Npcf Nudm Naf Nusf Namf Nsmf UE (R)AN UPF DN User Plane Function N2 N4 N5N3 N1
  • 12. New core, all virtual, web-based NEF NRF PCF UDM AF Network Exposure Function NF Repository Function Policy Control Function Unified Data Management Application Function AUSF Authentication Server Function AMF Core Access and Mobility Management Function SMF Session Management Function Nnef Nnrf Npcf Nudm Naf Nusf Namf Nsmf UE (R)AN UPF DN User Plane Function N2 N4 N5N3 N1 Architecture
  • 13. New core, all virtual, web-based Example of communication between functions Service Registration Service Discovery Session Establishment Session Establishment Request HTTP PUT (NF register) 201 Created HTTP PUT (NFDiscovery) 200 OK (List of SMSFs) HTTP POST (Create PDU Session) 201 Created
  • 14. Convergence of telecom and IT world  The 5G network core is TCP/IP-based  These protocols are open and well-known  Tools for finding and exploiting vulnerabilities are available to any adversary
  • 15. Problem is clear, but not solved Hacking 5G will be just as simple as hacking the web or enterprise Difficulty of bypassing the perimeter (percentage of systems) Security level (percentage of web applications)
  • 16. Analogue 1980 1991 1999 2001 2005 2010 2017 1G 2G 2.5G+ 3G 3.5G 4G 5G Constant & continual introduction of additional network access SS7 GTP SIP 4.5G APIs Diameter Backward compatibility 2019
  • 17. Now what can a hacker do? Easily From anywhere Any mobile operator No special skills needed Steal your money Get access to your email and social media Track your location Intercept your data, calls, and SMS messages Take control of your digital identity from GSM to 5G Different protocols SAME THREATS Perform massive denial-of-service attacks
  • 18. Protocol threat comparisons Successful attacks by threat types Threat Percentage of vulnerable networks (2017) SS7 networks Diameter networks Subscriber information disclosure 100% 100% Network information disclosure 63% 75% Subscriber traffic interception 89% —* Fraud 78% 33% Subscriber denial of service 100% 100% * In the tested networks, SMS transmission using the Diameter network was not carried out. To establish voice calls in 4G networks, the SIP protocol is used. Possible different reasons for previous generations out performing Diameter in certain areas.  SS7 threat awareness is higher  Diameter specific challenges Positive Technologies have further research being published very soon looking at Diameter. Comparing 4G networks using Diameter against earlier network generations
  • 19. Inherited issue 5G non-standalone is vulnerable to denial of service AvailabilityConfidentiality IntegrityIntegrity ConfidentialityAvailability USUALSECURITY PRIORITIES IOTSECURITY PRIORITIES
  • 20. Briefly about IoT 32% 37% 24% 8% 0 5 10 15 20 25 30 35 40 1 2 3 4 GARTNER: "By 2020, over 25% of identified attacks in enterprises will involve IoT." Already use IoT Preparing to implement IoT Will wait and see Will wait as long possible
  • 21. Guess how easy is it? Millions of connected IoT devices mean millions of potential botnet soldiers Mirai, 500K devices in botnet 2016 1M potentially vulnerable 2019 TOTAL RESULTS 1,086,395 TOP COUNTRIES
  • 22. Almost finished V Few words about me and Positive Technologies 2/3 of presentation V Inherited and new security issues in 5G V Security guidelines
  • 23. Where to start Ensure protection where interoperability required from day one Secure new interfaces and communications channels Safeguard SDN/NFV and virtual environment Implement policies separately for network slices Take IoT in your network under control where possible
  • 24. Summary Trustworthy solutions, constant verification Security by design is good, but implementation is always different Security awareness is the key Security should be comprehensive