2. • Third generation mobile system which provide
mobile users with rich services,
wireless broadband access to Internet, and
worldwide roaming.
• The users will be able to enjoy Voice-over-IP,
multimedia messaging, and videoconferencing
services with up to 2 Mbps data rate
2
3. TRADITIONAL INFRASTRUCTURE
• In traditional infrastructure of wire there
are vast radio resources and signaling
procedures so that traffic is not a big
problem to handle.
4. MOBILE INFRASTRUCTURE
• In mobile network there are limited
resources and signaling procedure for
radio resource management is complex
that’s why the traffic handling is a big
threat.
7. SECURITY THREATS IN 3G
NETWORK
• Resource consume of UE
• Resource consume of mobile network
• The abnormal termination of connected
services
8. RESOURCE COMSUME OF UE:
Power management in mobile devices is very
important because all work done by the device is
lead to power consumption. If there are so many
process which are running so the device need
more power to consume. Continuous
communication and high cost of process are the
two cases which are discuss below.
–Continuous communication
–High cost
9. CONTINUOUS COMMUNICATION
In this case if the resources are consumed due to
ongoing communication caused by an abnormal
service and communication with malicious host.
The UE is infected with malicious code because
of the continuous scanning inside the network.
Due to this reason the resources are consumed
unnecessarily.
10. HIGH COST OF PROCESS
There is a timer t is used by the system which is
automatically turn off if the attacker constantly
send packets over a longer period of time than t
these can reallocate the radio resources. From
the perspective of radio resources the allocation
and release is a high task.
11. RESOURCE CONSUME OF MOBILE
NETWORK:
If attacker sent packet to any mobile device
for a longer period of time than t than the
RNC keep the resources to that particular
UE and may prevent use for other devices.
This may cause the failure of voice and
data service to particular base station.
12. ABNORMAL TERMINATION OF
CONNECTED SERVICE:
The mobile network can have a serious problem of
abnormal termination of service. The UE will try
continuously in order to reconnect the mobile network. In
this case all UE devices are trying to reconnect at the
same time. Potential threats can be viewed in this
regards. UE resources are consumed in order to
reconnect to the server and occupying the wireless
resources. The RNC and SGSN will be failing by
massive retry in short period of time. DDOS attack will
cause the failure of both data and voice services. It is an
“SYNC FLOOD “attack to the network.
14. TRAFFIC ACQUISITION SYSTEM
This system collects the useful information from
the traffic in packet network. Iu-PS and Gn, Gi
which are the main interface of PN and TAS
designed able to analyze the communication
session. To analyze the communication must
see the inside tunnel of mobile network.
15. ABNORMAL TRAFFIC DETECTION
SYSTEM
There are two engine used in this system one
engine used for the detection of revealed attack
and the other is used to detect the unknown
abnormal traffic. We need to detect two type of
attack the false-positive attack and the false
negative-attack. In false-negative attack we
need to detect the unknown abnormal attacks
and in false-positive attack we need to detect the
known attacks.
16. ABNORMAL UE MONITOR AND
CONTROL SYSTEM
This system is use to monitor and control the
information that is come into the UE. Detection
and control system is not able to identify the
accrual user so only need to identify user by
other information such as hash table.
17. CONCLUSION
Mobile Network development is in progress and
many things are doing to enhance the bandwidth
and limited resources. The threats of security
can not be solve in 4F and LTE advance. We
research for the countermove and security
threats of 3g network. There are many other
development are ongoing for near future to
enhance the performance of mobile network.