SlideShare ist ein Scribd-Unternehmen logo
1 von 18
Quratulain Safdar CT-014
• Third generation mobile system which provide
mobile users with rich services,
wireless broadband access to Internet, and
worldwide roaming.
• The users will be able to enjoy Voice-over-IP,
multimedia messaging, and videoconferencing
services with up to 2 Mbps data rate
2
TRADITIONAL INFRASTRUCTURE
• In traditional infrastructure of wire there
are vast radio resources and signaling
procedures so that traffic is not a big
problem to handle.
MOBILE INFRASTRUCTURE
• In mobile network there are limited
resources and signaling procedure for
radio resource management is complex
that’s why the traffic handling is a big
threat.
STRUCTURE OF 3G NETWORK
STRUCTURE OF 3G PROTOCOL
STACK
SECURITY THREATS IN 3G
NETWORK
• Resource consume of UE
• Resource consume of mobile network
• The abnormal termination of connected
services
RESOURCE COMSUME OF UE:
Power management in mobile devices is very
important because all work done by the device is
lead to power consumption. If there are so many
process which are running so the device need
more power to consume. Continuous
communication and high cost of process are the
two cases which are discuss below.
–Continuous communication
–High cost
CONTINUOUS COMMUNICATION
In this case if the resources are consumed due to
ongoing communication caused by an abnormal
service and communication with malicious host.
The UE is infected with malicious code because
of the continuous scanning inside the network.
Due to this reason the resources are consumed
unnecessarily.
HIGH COST OF PROCESS
There is a timer t is used by the system which is
automatically turn off if the attacker constantly
send packets over a longer period of time than t
these can reallocate the radio resources. From
the perspective of radio resources the allocation
and release is a high task.
RESOURCE CONSUME OF MOBILE
NETWORK:
If attacker sent packet to any mobile device
for a longer period of time than t than the
RNC keep the resources to that particular
UE and may prevent use for other devices.
This may cause the failure of voice and
data service to particular base station.
ABNORMAL TERMINATION OF
CONNECTED SERVICE:
The mobile network can have a serious problem of
abnormal termination of service. The UE will try
continuously in order to reconnect the mobile network. In
this case all UE devices are trying to reconnect at the
same time. Potential threats can be viewed in this
regards. UE resources are consumed in order to
reconnect to the server and occupying the wireless
resources. The RNC and SGSN will be failing by
massive retry in short period of time. DDOS attack will
cause the failure of both data and voice services. It is an
“SYNC FLOOD “attack to the network.
COUNTERMEASURES
TRAFFIC ACQUISITION SYSTEM
This system collects the useful information from
the traffic in packet network. Iu-PS and Gn, Gi
which are the main interface of PN and TAS
designed able to analyze the communication
session. To analyze the communication must
see the inside tunnel of mobile network.
ABNORMAL TRAFFIC DETECTION
SYSTEM
There are two engine used in this system one
engine used for the detection of revealed attack
and the other is used to detect the unknown
abnormal traffic. We need to detect two type of
attack the false-positive attack and the false
negative-attack. In false-negative attack we
need to detect the unknown abnormal attacks
and in false-positive attack we need to detect the
known attacks.
ABNORMAL UE MONITOR AND
CONTROL SYSTEM
This system is use to monitor and control the
information that is come into the UE. Detection
and control system is not able to identify the
accrual user so only need to identify user by
other information such as hash table.
CONCLUSION
Mobile Network development is in progress and
many things are doing to enhance the bandwidth
and limited resources. The threats of security
can not be solve in 4F and LTE advance. We
research for the countermove and security
threats of 3g network. There are many other
development are ongoing for near future to
enhance the performance of mobile network.
Security threats and countermeasure in 3 g network

Weitere ähnliche Inhalte

Was ist angesagt?

Signal survey report
Signal survey reportSignal survey report
Signal survey reportravisaraswat4
 
Copy of saitejabaddam07
Copy of saitejabaddam07Copy of saitejabaddam07
Copy of saitejabaddam07Saitheja Reddy
 
Gsm – global system for mobile communication
Gsm – global system for mobile communicationGsm – global system for mobile communication
Gsm – global system for mobile communicationMuhammad Uzair Rasheed
 
Understanding Bluetooth Technology and How to use in with Mobile Devices
Understanding Bluetooth Technology and How to use in with Mobile DevicesUnderstanding Bluetooth Technology and How to use in with Mobile Devices
Understanding Bluetooth Technology and How to use in with Mobile Deviceschusneo
 
MOBILE COMPUTING and WIRELESS COMMUNICATION
MOBILE COMPUTING and WIRELESS COMMUNICATION MOBILE COMPUTING and WIRELESS COMMUNICATION
MOBILE COMPUTING and WIRELESS COMMUNICATION Jay Nagar
 
WIRELESS BODY AREA NETWORK
WIRELESS BODY AREA NETWORKWIRELESS BODY AREA NETWORK
WIRELESS BODY AREA NETWORKmadhushreek
 
Wireless Body Area Networks
Wireless Body Area Networks Wireless Body Area Networks
Wireless Body Area Networks Musfiqur Rahman
 
Advantages of ad hoc sensor network, driving application
Advantages of ad hoc sensor network, driving applicationAdvantages of ad hoc sensor network, driving application
Advantages of ad hoc sensor network, driving applicationbachhavsmita
 
Wireless Body Area network
Wireless Body Area networkWireless Body Area network
Wireless Body Area networkRajeev N
 
Part 2: Technical Specification HAJJ Pilgrims Tracking System
Part 2:  Technical Specification HAJJ Pilgrims Tracking SystemPart 2:  Technical Specification HAJJ Pilgrims Tracking System
Part 2: Technical Specification HAJJ Pilgrims Tracking SystemSazzad Hossain
 
Umts system architecture
Umts system architectureUmts system architecture
Umts system architectureMidhun S
 

Was ist angesagt? (20)

Signal survey report
Signal survey reportSignal survey report
Signal survey report
 
Copy of saitejabaddam07
Copy of saitejabaddam07Copy of saitejabaddam07
Copy of saitejabaddam07
 
Mobile network structure
Mobile network structure Mobile network structure
Mobile network structure
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Gsm – global system for mobile communication
Gsm – global system for mobile communicationGsm – global system for mobile communication
Gsm – global system for mobile communication
 
Class 1
Class 1Class 1
Class 1
 
Understanding Bluetooth Technology and How to use in with Mobile Devices
Understanding Bluetooth Technology and How to use in with Mobile DevicesUnderstanding Bluetooth Technology and How to use in with Mobile Devices
Understanding Bluetooth Technology and How to use in with Mobile Devices
 
MOBILE COMPUTING and WIRELESS COMMUNICATION
MOBILE COMPUTING and WIRELESS COMMUNICATION MOBILE COMPUTING and WIRELESS COMMUNICATION
MOBILE COMPUTING and WIRELESS COMMUNICATION
 
Wireless Networking
Wireless NetworkingWireless Networking
Wireless Networking
 
WiMAX
WiMAXWiMAX
WiMAX
 
WIRELESS BODY AREA NETWORK
WIRELESS BODY AREA NETWORKWIRELESS BODY AREA NETWORK
WIRELESS BODY AREA NETWORK
 
Wireless Body Area Networks
Wireless Body Area Networks Wireless Body Area Networks
Wireless Body Area Networks
 
Advantages of ad hoc sensor network, driving application
Advantages of ad hoc sensor network, driving applicationAdvantages of ad hoc sensor network, driving application
Advantages of ad hoc sensor network, driving application
 
Wireless Body Area network
Wireless Body Area networkWireless Body Area network
Wireless Body Area network
 
Part 2: Technical Specification HAJJ Pilgrims Tracking System
Part 2:  Technical Specification HAJJ Pilgrims Tracking SystemPart 2:  Technical Specification HAJJ Pilgrims Tracking System
Part 2: Technical Specification HAJJ Pilgrims Tracking System
 
Mobile Technology
Mobile TechnologyMobile Technology
Mobile Technology
 
What is WPAN?
What is WPAN?What is WPAN?
What is WPAN?
 
Personal area networks (PAN)
Personal area networks (PAN)Personal area networks (PAN)
Personal area networks (PAN)
 
Umts system architecture
Umts system architectureUmts system architecture
Umts system architecture
 

Andere mochten auch

Improving Web App Sec Microsoft
Improving Web App Sec MicrosoftImproving Web App Sec Microsoft
Improving Web App Sec Microsoftguestc27cd9
 
Lcj pg sql-lt-kaigai
Lcj pg sql-lt-kaigaiLcj pg sql-lt-kaigai
Lcj pg sql-lt-kaigaiKohei KaiGai
 
Collabor Tech Talk - Data Encryption 101
Collabor Tech Talk - Data Encryption 101Collabor Tech Talk - Data Encryption 101
Collabor Tech Talk - Data Encryption 101Collabor Inc.
 
Data encryption recommendation
Data encryption recommendationData encryption recommendation
Data encryption recommendationChawarong Songserm
 
CS_GA2009_Paper
CS_GA2009_PaperCS_GA2009_Paper
CS_GA2009_PaperAlexandra
 
How to find Zero day vulnerabilities
How to find Zero day vulnerabilitiesHow to find Zero day vulnerabilities
How to find Zero day vulnerabilitiesMohammed A. Imran
 
Web application security: Threats & Countermeasures
Web application security: Threats & CountermeasuresWeb application security: Threats & Countermeasures
Web application security: Threats & CountermeasuresAung Thu Rha Hein
 

Andere mochten auch (11)

Improving Web App Sec Microsoft
Improving Web App Sec MicrosoftImproving Web App Sec Microsoft
Improving Web App Sec Microsoft
 
Lcj pg sql-lt-kaigai
Lcj pg sql-lt-kaigaiLcj pg sql-lt-kaigai
Lcj pg sql-lt-kaigai
 
Collabor Tech Talk - Data Encryption 101
Collabor Tech Talk - Data Encryption 101Collabor Tech Talk - Data Encryption 101
Collabor Tech Talk - Data Encryption 101
 
Data encryption recommendation
Data encryption recommendationData encryption recommendation
Data encryption recommendation
 
CS_GA2009_Paper
CS_GA2009_PaperCS_GA2009_Paper
CS_GA2009_Paper
 
How to find Zero day vulnerabilities
How to find Zero day vulnerabilitiesHow to find Zero day vulnerabilities
How to find Zero day vulnerabilities
 
Encryption technology
Encryption technologyEncryption technology
Encryption technology
 
Cases
CasesCases
Cases
 
0-knowledge fuzzing
0-knowledge fuzzing0-knowledge fuzzing
0-knowledge fuzzing
 
Cryptography
CryptographyCryptography
Cryptography
 
Web application security: Threats & Countermeasures
Web application security: Threats & CountermeasuresWeb application security: Threats & Countermeasures
Web application security: Threats & Countermeasures
 

Ähnlich wie Security threats and countermeasure in 3 g network

A STRATEGY FOR DEFENDING PACKETS AGAINST RECOGNIZED INTERNAL JAMMERS IN WIREL...
A STRATEGY FOR DEFENDING PACKETS AGAINST RECOGNIZED INTERNAL JAMMERS IN WIREL...A STRATEGY FOR DEFENDING PACKETS AGAINST RECOGNIZED INTERNAL JAMMERS IN WIREL...
A STRATEGY FOR DEFENDING PACKETS AGAINST RECOGNIZED INTERNAL JAMMERS IN WIREL...pharmaindexing
 
Interference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and ConfrontationInterference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and Confrontationirjes
 
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...IRJET Journal
 
DATA COM PRESENTATION-1.pptx
DATA COM PRESENTATION-1.pptxDATA COM PRESENTATION-1.pptx
DATA COM PRESENTATION-1.pptxKelvinDube4
 
IRJET- Review on Multiple Access Techniques used in Mobile Telecommunication ...
IRJET- Review on Multiple Access Techniques used in Mobile Telecommunication ...IRJET- Review on Multiple Access Techniques used in Mobile Telecommunication ...
IRJET- Review on Multiple Access Techniques used in Mobile Telecommunication ...IRJET Journal
 
Smart metering and control of transmission system
Smart metering and control of transmission systemSmart metering and control of transmission system
Smart metering and control of transmission systemDurgarao Gundu
 
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATIONSECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATIONEditor IJMTER
 
IRJET- Data Transmission for Proximity Devices using Ultrasonic Sound Waves
IRJET- Data Transmission for Proximity Devices using Ultrasonic Sound WavesIRJET- Data Transmission for Proximity Devices using Ultrasonic Sound Waves
IRJET- Data Transmission for Proximity Devices using Ultrasonic Sound WavesIRJET Journal
 
IRJET-QOS parameter analysis of UMTS networks based on Handovers and Sectoriz...
IRJET-QOS parameter analysis of UMTS networks based on Handovers and Sectoriz...IRJET-QOS parameter analysis of UMTS networks based on Handovers and Sectoriz...
IRJET-QOS parameter analysis of UMTS networks based on Handovers and Sectoriz...IRJET Journal
 
Various Techniques Used in Wireless Sensor Networks for Data Transfer
Various Techniques Used in Wireless Sensor Networks for Data TransferVarious Techniques Used in Wireless Sensor Networks for Data Transfer
Various Techniques Used in Wireless Sensor Networks for Data TransferIJAEMSJORNAL
 
Impact of security breach on the upstream delay performance of next generatio...
Impact of security breach on the upstream delay performance of next generatio...Impact of security breach on the upstream delay performance of next generatio...
Impact of security breach on the upstream delay performance of next generatio...journalBEEI
 
Design computing architecture ~ Mobile Technologies
Design computing architecture ~ Mobile TechnologiesDesign computing architecture ~ Mobile Technologies
Design computing architecture ~ Mobile TechnologiesSwapnali Pawar
 
Consistent Access of Internet in Vehicular Networks
Consistent Access of Internet in Vehicular NetworksConsistent Access of Internet in Vehicular Networks
Consistent Access of Internet in Vehicular NetworksIRJET Journal
 
Wireless Communication Systems Are Developing Rapidly Essay
Wireless Communication Systems Are Developing Rapidly EssayWireless Communication Systems Are Developing Rapidly Essay
Wireless Communication Systems Are Developing Rapidly EssayApril Dillard
 
Requisite Trust Based Routing Protocol for WSN
Requisite Trust Based Routing Protocol for WSNRequisite Trust Based Routing Protocol for WSN
Requisite Trust Based Routing Protocol for WSNAM Publications
 
A wireless intrusion detection system and a new attack model (synopsis)
A wireless intrusion detection system and a new attack model (synopsis)A wireless intrusion detection system and a new attack model (synopsis)
A wireless intrusion detection system and a new attack model (synopsis)Mumbai Academisc
 

Ähnlich wie Security threats and countermeasure in 3 g network (20)

MANAGING INTERFERENCE IN COLLABORATIVE NETWORKS BY FLOW CONTROL AND SIGNAL PO...
MANAGING INTERFERENCE IN COLLABORATIVE NETWORKS BY FLOW CONTROL AND SIGNAL PO...MANAGING INTERFERENCE IN COLLABORATIVE NETWORKS BY FLOW CONTROL AND SIGNAL PO...
MANAGING INTERFERENCE IN COLLABORATIVE NETWORKS BY FLOW CONTROL AND SIGNAL PO...
 
Dd33630634
Dd33630634Dd33630634
Dd33630634
 
Dd33630634
Dd33630634Dd33630634
Dd33630634
 
A STRATEGY FOR DEFENDING PACKETS AGAINST RECOGNIZED INTERNAL JAMMERS IN WIREL...
A STRATEGY FOR DEFENDING PACKETS AGAINST RECOGNIZED INTERNAL JAMMERS IN WIREL...A STRATEGY FOR DEFENDING PACKETS AGAINST RECOGNIZED INTERNAL JAMMERS IN WIREL...
A STRATEGY FOR DEFENDING PACKETS AGAINST RECOGNIZED INTERNAL JAMMERS IN WIREL...
 
Interference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and ConfrontationInterference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and Confrontation
 
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...
 
DATA COM PRESENTATION-1.pptx
DATA COM PRESENTATION-1.pptxDATA COM PRESENTATION-1.pptx
DATA COM PRESENTATION-1.pptx
 
IRJET- Review on Multiple Access Techniques used in Mobile Telecommunication ...
IRJET- Review on Multiple Access Techniques used in Mobile Telecommunication ...IRJET- Review on Multiple Access Techniques used in Mobile Telecommunication ...
IRJET- Review on Multiple Access Techniques used in Mobile Telecommunication ...
 
Smart metering and control of transmission system
Smart metering and control of transmission systemSmart metering and control of transmission system
Smart metering and control of transmission system
 
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATIONSECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
 
IRJET- Data Transmission for Proximity Devices using Ultrasonic Sound Waves
IRJET- Data Transmission for Proximity Devices using Ultrasonic Sound WavesIRJET- Data Transmission for Proximity Devices using Ultrasonic Sound Waves
IRJET- Data Transmission for Proximity Devices using Ultrasonic Sound Waves
 
IRJET-QOS parameter analysis of UMTS networks based on Handovers and Sectoriz...
IRJET-QOS parameter analysis of UMTS networks based on Handovers and Sectoriz...IRJET-QOS parameter analysis of UMTS networks based on Handovers and Sectoriz...
IRJET-QOS parameter analysis of UMTS networks based on Handovers and Sectoriz...
 
Various Techniques Used in Wireless Sensor Networks for Data Transfer
Various Techniques Used in Wireless Sensor Networks for Data TransferVarious Techniques Used in Wireless Sensor Networks for Data Transfer
Various Techniques Used in Wireless Sensor Networks for Data Transfer
 
Impact of security breach on the upstream delay performance of next generatio...
Impact of security breach on the upstream delay performance of next generatio...Impact of security breach on the upstream delay performance of next generatio...
Impact of security breach on the upstream delay performance of next generatio...
 
Design computing architecture ~ Mobile Technologies
Design computing architecture ~ Mobile TechnologiesDesign computing architecture ~ Mobile Technologies
Design computing architecture ~ Mobile Technologies
 
Remote Monitoring 2020 Vison
Remote Monitoring 2020 VisonRemote Monitoring 2020 Vison
Remote Monitoring 2020 Vison
 
Consistent Access of Internet in Vehicular Networks
Consistent Access of Internet in Vehicular NetworksConsistent Access of Internet in Vehicular Networks
Consistent Access of Internet in Vehicular Networks
 
Wireless Communication Systems Are Developing Rapidly Essay
Wireless Communication Systems Are Developing Rapidly EssayWireless Communication Systems Are Developing Rapidly Essay
Wireless Communication Systems Are Developing Rapidly Essay
 
Requisite Trust Based Routing Protocol for WSN
Requisite Trust Based Routing Protocol for WSNRequisite Trust Based Routing Protocol for WSN
Requisite Trust Based Routing Protocol for WSN
 
A wireless intrusion detection system and a new attack model (synopsis)
A wireless intrusion detection system and a new attack model (synopsis)A wireless intrusion detection system and a new attack model (synopsis)
A wireless intrusion detection system and a new attack model (synopsis)
 

Mehr von mmubashirkhan

Two factor authentication presentation mcit
Two factor authentication presentation mcitTwo factor authentication presentation mcit
Two factor authentication presentation mcitmmubashirkhan
 
Situational awareness for computer network security
Situational awareness for computer network securitySituational awareness for computer network security
Situational awareness for computer network securitymmubashirkhan
 
Comparison between traditional vpn and mpls vpn
Comparison between traditional vpn and mpls vpnComparison between traditional vpn and mpls vpn
Comparison between traditional vpn and mpls vpnmmubashirkhan
 
Security in wireless la ns
Security in wireless la ns Security in wireless la ns
Security in wireless la ns mmubashirkhan
 
Saa s multitenant database architecture
Saa s multitenant database architectureSaa s multitenant database architecture
Saa s multitenant database architecturemmubashirkhan
 
Improving intrusion detection system by honeypot
Improving intrusion detection system by honeypotImproving intrusion detection system by honeypot
Improving intrusion detection system by honeypotmmubashirkhan
 
Drive by downloads-cns
Drive by downloads-cnsDrive by downloads-cns
Drive by downloads-cnsmmubashirkhan
 
Cyber security issues
Cyber security issuesCyber security issues
Cyber security issuesmmubashirkhan
 
Biometric security tech
Biometric security techBiometric security tech
Biometric security techmmubashirkhan
 
Authentication in manet
Authentication in manetAuthentication in manet
Authentication in manetmmubashirkhan
 
Advanced persistent threat (apt)
Advanced persistent threat (apt)Advanced persistent threat (apt)
Advanced persistent threat (apt)mmubashirkhan
 

Mehr von mmubashirkhan (11)

Two factor authentication presentation mcit
Two factor authentication presentation mcitTwo factor authentication presentation mcit
Two factor authentication presentation mcit
 
Situational awareness for computer network security
Situational awareness for computer network securitySituational awareness for computer network security
Situational awareness for computer network security
 
Comparison between traditional vpn and mpls vpn
Comparison between traditional vpn and mpls vpnComparison between traditional vpn and mpls vpn
Comparison between traditional vpn and mpls vpn
 
Security in wireless la ns
Security in wireless la ns Security in wireless la ns
Security in wireless la ns
 
Saa s multitenant database architecture
Saa s multitenant database architectureSaa s multitenant database architecture
Saa s multitenant database architecture
 
Improving intrusion detection system by honeypot
Improving intrusion detection system by honeypotImproving intrusion detection system by honeypot
Improving intrusion detection system by honeypot
 
Drive by downloads-cns
Drive by downloads-cnsDrive by downloads-cns
Drive by downloads-cns
 
Cyber security issues
Cyber security issuesCyber security issues
Cyber security issues
 
Biometric security tech
Biometric security techBiometric security tech
Biometric security tech
 
Authentication in manet
Authentication in manetAuthentication in manet
Authentication in manet
 
Advanced persistent threat (apt)
Advanced persistent threat (apt)Advanced persistent threat (apt)
Advanced persistent threat (apt)
 

Kürzlich hochgeladen

mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...anjaliyadav012327
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...Pooja Nehwal
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 

Kürzlich hochgeladen (20)

mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 

Security threats and countermeasure in 3 g network

  • 2. • Third generation mobile system which provide mobile users with rich services, wireless broadband access to Internet, and worldwide roaming. • The users will be able to enjoy Voice-over-IP, multimedia messaging, and videoconferencing services with up to 2 Mbps data rate 2
  • 3. TRADITIONAL INFRASTRUCTURE • In traditional infrastructure of wire there are vast radio resources and signaling procedures so that traffic is not a big problem to handle.
  • 4. MOBILE INFRASTRUCTURE • In mobile network there are limited resources and signaling procedure for radio resource management is complex that’s why the traffic handling is a big threat.
  • 5. STRUCTURE OF 3G NETWORK
  • 6. STRUCTURE OF 3G PROTOCOL STACK
  • 7. SECURITY THREATS IN 3G NETWORK • Resource consume of UE • Resource consume of mobile network • The abnormal termination of connected services
  • 8. RESOURCE COMSUME OF UE: Power management in mobile devices is very important because all work done by the device is lead to power consumption. If there are so many process which are running so the device need more power to consume. Continuous communication and high cost of process are the two cases which are discuss below. –Continuous communication –High cost
  • 9. CONTINUOUS COMMUNICATION In this case if the resources are consumed due to ongoing communication caused by an abnormal service and communication with malicious host. The UE is infected with malicious code because of the continuous scanning inside the network. Due to this reason the resources are consumed unnecessarily.
  • 10. HIGH COST OF PROCESS There is a timer t is used by the system which is automatically turn off if the attacker constantly send packets over a longer period of time than t these can reallocate the radio resources. From the perspective of radio resources the allocation and release is a high task.
  • 11. RESOURCE CONSUME OF MOBILE NETWORK: If attacker sent packet to any mobile device for a longer period of time than t than the RNC keep the resources to that particular UE and may prevent use for other devices. This may cause the failure of voice and data service to particular base station.
  • 12. ABNORMAL TERMINATION OF CONNECTED SERVICE: The mobile network can have a serious problem of abnormal termination of service. The UE will try continuously in order to reconnect the mobile network. In this case all UE devices are trying to reconnect at the same time. Potential threats can be viewed in this regards. UE resources are consumed in order to reconnect to the server and occupying the wireless resources. The RNC and SGSN will be failing by massive retry in short period of time. DDOS attack will cause the failure of both data and voice services. It is an “SYNC FLOOD “attack to the network.
  • 14. TRAFFIC ACQUISITION SYSTEM This system collects the useful information from the traffic in packet network. Iu-PS and Gn, Gi which are the main interface of PN and TAS designed able to analyze the communication session. To analyze the communication must see the inside tunnel of mobile network.
  • 15. ABNORMAL TRAFFIC DETECTION SYSTEM There are two engine used in this system one engine used for the detection of revealed attack and the other is used to detect the unknown abnormal traffic. We need to detect two type of attack the false-positive attack and the false negative-attack. In false-negative attack we need to detect the unknown abnormal attacks and in false-positive attack we need to detect the known attacks.
  • 16. ABNORMAL UE MONITOR AND CONTROL SYSTEM This system is use to monitor and control the information that is come into the UE. Detection and control system is not able to identify the accrual user so only need to identify user by other information such as hash table.
  • 17. CONCLUSION Mobile Network development is in progress and many things are doing to enhance the bandwidth and limited resources. The threats of security can not be solve in 4F and LTE advance. We research for the countermove and security threats of 3g network. There are many other development are ongoing for near future to enhance the performance of mobile network.