SlideShare une entreprise Scribd logo
1  sur  15
A SEMINAR REPORT ON
“GPRS SECURITY THREATS AND
SOLUTION”
PRESENTED BY
SYED JAUWAD
GUIDED BY
Miss. Sarita Agrawal
TOPICS COVERED ….
• INTRODUCTION
• GPRS CORE NETWORK NETWORK ARCHITECTURE
• CLASSIFICATION OF SECURITY SREVICES
• DATA SERVICES ON Gp AND Gi INTERFACE
• THREATS ON Gp INTERFACE
• THREATS ON Gi INTERFACE
• SECURITY SOLUTION FOR THE Gp INTERFACE
• Gp NETWORK SOLUTION
• SECURITY SOLUTION FOR THE Gi INTERFACE
• Gi NETWORK SOLUTION
• DEPLOYING GPRS SECURITY SOLUTION ON
NETSCREEN SECURITY SYSTEM
• CONCLUSION
INTRODUCTION
 DEFINATION OF GPRS
 PROVIDE AN OPPORTUNITY
 BENEFITS FROM GPRS
 CONNECTED TO EXTERNAL DATA
 OPERATOR PROTECTS NETWORK
FROM EXTERNAL NETWORK
GPRS CORE NETWORK ARCHITECTURE
CLASSIFICATION OF SECURITY SERVICESCLASSIFICATION OF SECURITY SERVICES
 INTEGRITYINTEGRITY
 CONFIDENTIALITYCONFIDENTIALITY
 AUTHENTICATIONAUTHENTICATION
 AUTHORIZATIONAUTHORIZATION
 AVAILABILITYAVAILABILITY
DATA SERVICES ON THE Gp AND Gi INTERFACESDATA SERVICES ON THE Gp AND Gi INTERFACES
 DATA SERVICES ON GpDATA SERVICES ON Gp
 GTPGTP
 BGPBGP
 DNSDNS
 DATA SERVICES ON GiDATA SERVICES ON Gi
 MS SENT OUT TOWORDS INTERNETMS SENT OUT TOWORDS INTERNET
 TRAFIC SENT OUT FROM GGSN ON GiTRAFIC SENT OUT FROM GGSN ON Gi
INTERFACEINTERFACE
THREATS ON Gp INTERFACETHREATS ON Gp INTERFACE
 AVAILABILITYAVAILABILITY
o DNS FLOODDNS FLOOD
o GTP FLOODGTP FLOOD
o SPOOFED GTP PDP CONTEXT DELETESPOOFED GTP PDP CONTEXT DELETE
o BAD BGP ROUTING INFORMATIONBAD BGP ROUTING INFORMATION
 AUTHENTICATION AND AUTHORIZATIONAUTHENTICATION AND AUTHORIZATION
o SPOOFED CREATE PDP CONTEXT REQUESTSPOOFED CREATE PDP CONTEXT REQUEST
o SPOOFED UPDATE PDP CONTEXT REQUESTSPOOFED UPDATE PDP CONTEXT REQUEST
THREATS ON Gi INTERFACETHREATS ON Gi INTERFACE
 AVAILABILITYAVAILABILITY
o Gi BANDWIDTH SATURATIONGi BANDWIDTH SATURATION
o FLOODING ON MSFLOODING ON MS
 CONFIDENTIALITYCONFIDENTIALITY
o NO PROTECTION OF DATA FROM AN MSNO PROTECTION OF DATA FROM AN MS
o CAN BE SEEN BY THIRD PARTY IF IP SECURITY IS NOTCAN BE SEEN BY THIRD PARTY IF IP SECURITY IS NOT
BEING USEDBEING USED
 INTEGRITYINTEGRITY
o DATA SENT OVER NETWORK CAN CHANGE BYDATA SENT OVER NETWORK CAN CHANGE BY
INTERMEDIARIES IF HIGHER SECURITY IS NOT USEDINTERMEDIARIES IF HIGHER SECURITY IS NOT USED
SECURITY SOLUTION FOR THE Gp INTERFACESECURITY SOLUTION FOR THE Gp INTERFACE
 INGRESS AND EGRESS PACKET FILTERINGINGRESS AND EGRESS PACKET FILTERING
 STATEFUL GTP PACKET FILTERINGSTATEFUL GTP PACKET FILTERING
 GTP TRAFFIC SHAPPINGGTP TRAFFIC SHAPPING
 IMPLEMENT IPSEC TUNNELS WITH ROMINGIMPLEMENT IPSEC TUNNELS WITH ROMING
PARTNERSPARTNERS
Gp NETWORK SOLUTION DIAGRAMGp NETWORK SOLUTION DIAGRAM
SECURITY SOLUTION ON THE Gi INTERFACESECURITY SOLUTION ON THE Gi INTERFACE
 LOGICAL TUNNELS FROM THE GGSN TOLOGICAL TUNNELS FROM THE GGSN TO
CORPPORATE NETWORKCORPPORATE NETWORK
 TRAFFIC RATE LIMITINGTRAFFIC RATE LIMITING
 INGRESS AND EGRESS PACKET FILTERINGINGRESS AND EGRESS PACKET FILTERING
Gi NETWORK SOLUTION DIAGRAMGi NETWORK SOLUTION DIAGRAM
DEPLOYING GPRS SECURITY SOLUTIONDEPLOYING GPRS SECURITY SOLUTION
ON NETSCREEN SECURITY SYSTEMON NETSCREEN SECURITY SYSTEM
 GTP stateful packet filteringGTP stateful packet filtering
 GTP security policies includingGTP security policies including
 GTP management and logging featuresGTP management and logging features
 High availability fail over includingHigh availability fail over including
 Virtual router supports to separateVirtual router supports to separate
intranet destined trafficintranet destined traffic
CONCLUSIONCONCLUSION
GPRS promises to benefit mobile data users
greatly by providing always on higher
bandwidth connections than are widely
available today. In order to be successful,
data connections must be secure and be
available all the time from anywhere.
Gprs security threats and solutions

Contenu connexe

Tendances

6G Training Course Part 4: 6G Timeline
6G Training Course Part 4: 6G Timeline6G Training Course Part 4: 6G Timeline
6G Training Course Part 4: 6G Timeline3G4G
 
6G Training Course Part 6: 6G Groups
6G Training Course Part 6: 6G Groups6G Training Course Part 6: 6G Groups
6G Training Course Part 6: 6G Groups3G4G
 
Misc: What Else Does ‘G’ Mean?
Misc: What Else Does ‘G’ Mean?Misc: What Else Does ‘G’ Mean?
Misc: What Else Does ‘G’ Mean?3G4G
 
Recent advances in Broadcasting standards and research
Recent advances in Broadcasting standards and researchRecent advances in Broadcasting standards and research
Recent advances in Broadcasting standards and research3G4G
 
Beginners: Top 10 Misconceptions About 5G
Beginners: Top 10 Misconceptions About 5GBeginners: Top 10 Misconceptions About 5G
Beginners: Top 10 Misconceptions About 5G3G4G
 
Telecom incidents investigation: daily work behind the scenes
Telecom incidents investigation: daily work behind the scenesTelecom incidents investigation: daily work behind the scenes
Telecom incidents investigation: daily work behind the scenesPositiveTechnologies
 
6G Training Course Part 5: 6G Requirements
6G Training Course Part 5: 6G Requirements6G Training Course Part 5: 6G Requirements
6G Training Course Part 5: 6G Requirements3G4G
 
Signals Flash Nov 2017: 5G in Americas | Signals Research Group
Signals Flash Nov 2017: 5G in Americas | Signals Research GroupSignals Flash Nov 2017: 5G in Americas | Signals Research Group
Signals Flash Nov 2017: 5G in Americas | Signals Research Group3G4G
 
Beginners: Open RAN Terminology – Virtualization, Disaggregation & Decomposition
Beginners: Open RAN Terminology – Virtualization, Disaggregation & DecompositionBeginners: Open RAN Terminology – Virtualization, Disaggregation & Decomposition
Beginners: Open RAN Terminology – Virtualization, Disaggregation & Decomposition3G4G
 
6G Training Course Part 7: 6G Technologies - Introduction
6G Training Course Part 7: 6G Technologies - Introduction6G Training Course Part 7: 6G Technologies - Introduction
6G Training Course Part 7: 6G Technologies - Introduction3G4G
 
2015 ISA Calgary Show: IACS Cyber Incident Preparation
2015 ISA Calgary Show: IACS Cyber Incident Preparation2015 ISA Calgary Show: IACS Cyber Incident Preparation
2015 ISA Calgary Show: IACS Cyber Incident PreparationCimation
 
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...BGA Cyber Security
 
NTXISSACSC3 - Cyber Warfare: Identifying Attackers Hiding Amongst the Flock b...
NTXISSACSC3 - Cyber Warfare: Identifying Attackers Hiding Amongst the Flock b...NTXISSACSC3 - Cyber Warfare: Identifying Attackers Hiding Amongst the Flock b...
NTXISSACSC3 - Cyber Warfare: Identifying Attackers Hiding Amongst the Flock b...North Texas Chapter of the ISSA
 
Using ATTACK to Create Cyber DBTS for Nuclear Power Plants
Using ATTACK to Create Cyber DBTS for Nuclear Power PlantsUsing ATTACK to Create Cyber DBTS for Nuclear Power Plants
Using ATTACK to Create Cyber DBTS for Nuclear Power PlantsMITRE - ATT&CKcon
 
Part 9: 5G Launches - 5G for Absolute Beginners
Part 9: 5G Launches - 5G for Absolute BeginnersPart 9: 5G Launches - 5G for Absolute Beginners
Part 9: 5G Launches - 5G for Absolute Beginners3G4G
 
Mobile Security Assessment
Mobile Security AssessmentMobile Security Assessment
Mobile Security AssessmentSylvain Martinez
 
Reporte a cerca de 6G
Reporte a cerca de 6GReporte a cerca de 6G
Reporte a cerca de 6GMiguel Mora
 
How Mobile Technology Works
How Mobile Technology WorksHow Mobile Technology Works
How Mobile Technology Works3G4G
 
Are you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security ChecklistAre you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security ChecklistMyNOG
 

Tendances (20)

6G Training Course Part 4: 6G Timeline
6G Training Course Part 4: 6G Timeline6G Training Course Part 4: 6G Timeline
6G Training Course Part 4: 6G Timeline
 
6G Training Course Part 6: 6G Groups
6G Training Course Part 6: 6G Groups6G Training Course Part 6: 6G Groups
6G Training Course Part 6: 6G Groups
 
Misc: What Else Does ‘G’ Mean?
Misc: What Else Does ‘G’ Mean?Misc: What Else Does ‘G’ Mean?
Misc: What Else Does ‘G’ Mean?
 
Recent advances in Broadcasting standards and research
Recent advances in Broadcasting standards and researchRecent advances in Broadcasting standards and research
Recent advances in Broadcasting standards and research
 
Beginners: Top 10 Misconceptions About 5G
Beginners: Top 10 Misconceptions About 5GBeginners: Top 10 Misconceptions About 5G
Beginners: Top 10 Misconceptions About 5G
 
Telecom incidents investigation: daily work behind the scenes
Telecom incidents investigation: daily work behind the scenesTelecom incidents investigation: daily work behind the scenes
Telecom incidents investigation: daily work behind the scenes
 
6G Training Course Part 5: 6G Requirements
6G Training Course Part 5: 6G Requirements6G Training Course Part 5: 6G Requirements
6G Training Course Part 5: 6G Requirements
 
Signals Flash Nov 2017: 5G in Americas | Signals Research Group
Signals Flash Nov 2017: 5G in Americas | Signals Research GroupSignals Flash Nov 2017: 5G in Americas | Signals Research Group
Signals Flash Nov 2017: 5G in Americas | Signals Research Group
 
Beginners: Open RAN Terminology – Virtualization, Disaggregation & Decomposition
Beginners: Open RAN Terminology – Virtualization, Disaggregation & DecompositionBeginners: Open RAN Terminology – Virtualization, Disaggregation & Decomposition
Beginners: Open RAN Terminology – Virtualization, Disaggregation & Decomposition
 
OFFENSIVE IDS
OFFENSIVE IDSOFFENSIVE IDS
OFFENSIVE IDS
 
6G Training Course Part 7: 6G Technologies - Introduction
6G Training Course Part 7: 6G Technologies - Introduction6G Training Course Part 7: 6G Technologies - Introduction
6G Training Course Part 7: 6G Technologies - Introduction
 
2015 ISA Calgary Show: IACS Cyber Incident Preparation
2015 ISA Calgary Show: IACS Cyber Incident Preparation2015 ISA Calgary Show: IACS Cyber Incident Preparation
2015 ISA Calgary Show: IACS Cyber Incident Preparation
 
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...
 
NTXISSACSC3 - Cyber Warfare: Identifying Attackers Hiding Amongst the Flock b...
NTXISSACSC3 - Cyber Warfare: Identifying Attackers Hiding Amongst the Flock b...NTXISSACSC3 - Cyber Warfare: Identifying Attackers Hiding Amongst the Flock b...
NTXISSACSC3 - Cyber Warfare: Identifying Attackers Hiding Amongst the Flock b...
 
Using ATTACK to Create Cyber DBTS for Nuclear Power Plants
Using ATTACK to Create Cyber DBTS for Nuclear Power PlantsUsing ATTACK to Create Cyber DBTS for Nuclear Power Plants
Using ATTACK to Create Cyber DBTS for Nuclear Power Plants
 
Part 9: 5G Launches - 5G for Absolute Beginners
Part 9: 5G Launches - 5G for Absolute BeginnersPart 9: 5G Launches - 5G for Absolute Beginners
Part 9: 5G Launches - 5G for Absolute Beginners
 
Mobile Security Assessment
Mobile Security AssessmentMobile Security Assessment
Mobile Security Assessment
 
Reporte a cerca de 6G
Reporte a cerca de 6GReporte a cerca de 6G
Reporte a cerca de 6G
 
How Mobile Technology Works
How Mobile Technology WorksHow Mobile Technology Works
How Mobile Technology Works
 
Are you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security ChecklistAre you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security Checklist
 

En vedette

Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security PresentationAllan Pratt MBA
 
Philippe Langlois - LTE Pwnage - P1security
Philippe Langlois - LTE Pwnage - P1securityPhilippe Langlois - LTE Pwnage - P1security
Philippe Langlois - LTE Pwnage - P1securityP1Security
 
Telecom security from ss7 to all ip all-open-v3-zeronights
Telecom security from ss7 to all ip all-open-v3-zeronightsTelecom security from ss7 to all ip all-open-v3-zeronights
Telecom security from ss7 to all ip all-open-v3-zeronightsP1Security
 
Philippe Langlois - Hacking HLR HSS and MME core network elements
Philippe Langlois - Hacking HLR HSS and MME core network elementsPhilippe Langlois - Hacking HLR HSS and MME core network elements
Philippe Langlois - Hacking HLR HSS and MME core network elementsP1Security
 
Modul 7 gprs operation
Modul 7    gprs operationModul 7    gprs operation
Modul 7 gprs operationWijaya Kusuma
 
Philippe Langlois - SCTPscan Finding entry points to SS7 Networks & Telecommu...
Philippe Langlois - SCTPscan Finding entry points to SS7 Networks & Telecommu...Philippe Langlois - SCTPscan Finding entry points to SS7 Networks & Telecommu...
Philippe Langlois - SCTPscan Finding entry points to SS7 Networks & Telecommu...P1Security
 
Attacking GRX - GPRS Roaming eXchange
Attacking GRX - GPRS Roaming eXchangeAttacking GRX - GPRS Roaming eXchange
Attacking GRX - GPRS Roaming eXchangeP1Security
 
Connector losses Optical Fiber Cable
Connector losses Optical Fiber CableConnector losses Optical Fiber Cable
Connector losses Optical Fiber CableKalyan Acharjya
 
Hacking Telco equipment: The HLR/HSS, by Laurent Ghigonis
Hacking Telco equipment: The HLR/HSS, by Laurent GhigonisHacking Telco equipment: The HLR/HSS, by Laurent Ghigonis
Hacking Telco equipment: The HLR/HSS, by Laurent GhigonisP1Security
 
Web & Wireless Hacking
Web & Wireless HackingWeb & Wireless Hacking
Web & Wireless HackingDon Anto
 
Rashed al kamdah network security threats
Rashed al kamdah network security threatsRashed al kamdah network security threats
Rashed al kamdah network security threatsrashidalkamdah
 
Wifi Password Hack v2.85 - The best software to hack the Wifi networks !
Wifi Password Hack v2.85 - The best software to hack the Wifi networks !Wifi Password Hack v2.85 - The best software to hack the Wifi networks !
Wifi Password Hack v2.85 - The best software to hack the Wifi networks !Home
 
Worldwide attacks on SS7/SIGTRAN network
Worldwide attacks on SS7/SIGTRAN networkWorldwide attacks on SS7/SIGTRAN network
Worldwide attacks on SS7/SIGTRAN networkP1Security
 
Optical fiber communication
Optical fiber communicationOptical fiber communication
Optical fiber communicationRaj Kumar Morya
 
Evolution of mobile technology
Evolution of mobile technologyEvolution of mobile technology
Evolution of mobile technologyKiran Kumar
 
Difference between i3 and i5 and i7 and core 2 duo pdf
Difference between i3 and i5 and i7 and core 2 duo pdfDifference between i3 and i5 and i7 and core 2 duo pdf
Difference between i3 and i5 and i7 and core 2 duo pdfnavendu shekhar
 
Wireless technology from 0G to 7.5G
Wireless technology from 0G to 7.5GWireless technology from 0G to 7.5G
Wireless technology from 0G to 7.5GShashikanth M
 

En vedette (20)

Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
Philippe Langlois - LTE Pwnage - P1security
Philippe Langlois - LTE Pwnage - P1securityPhilippe Langlois - LTE Pwnage - P1security
Philippe Langlois - LTE Pwnage - P1security
 
Telecom security from ss7 to all ip all-open-v3-zeronights
Telecom security from ss7 to all ip all-open-v3-zeronightsTelecom security from ss7 to all ip all-open-v3-zeronights
Telecom security from ss7 to all ip all-open-v3-zeronights
 
Philippe Langlois - Hacking HLR HSS and MME core network elements
Philippe Langlois - Hacking HLR HSS and MME core network elementsPhilippe Langlois - Hacking HLR HSS and MME core network elements
Philippe Langlois - Hacking HLR HSS and MME core network elements
 
Modul 7 gprs operation
Modul 7    gprs operationModul 7    gprs operation
Modul 7 gprs operation
 
Philippe Langlois - SCTPscan Finding entry points to SS7 Networks & Telecommu...
Philippe Langlois - SCTPscan Finding entry points to SS7 Networks & Telecommu...Philippe Langlois - SCTPscan Finding entry points to SS7 Networks & Telecommu...
Philippe Langlois - SCTPscan Finding entry points to SS7 Networks & Telecommu...
 
Attacking GRX - GPRS Roaming eXchange
Attacking GRX - GPRS Roaming eXchangeAttacking GRX - GPRS Roaming eXchange
Attacking GRX - GPRS Roaming eXchange
 
Connector losses Optical Fiber Cable
Connector losses Optical Fiber CableConnector losses Optical Fiber Cable
Connector losses Optical Fiber Cable
 
Hacking Telco equipment: The HLR/HSS, by Laurent Ghigonis
Hacking Telco equipment: The HLR/HSS, by Laurent GhigonisHacking Telco equipment: The HLR/HSS, by Laurent Ghigonis
Hacking Telco equipment: The HLR/HSS, by Laurent Ghigonis
 
Web & Wireless Hacking
Web & Wireless HackingWeb & Wireless Hacking
Web & Wireless Hacking
 
Rashed al kamdah network security threats
Rashed al kamdah network security threatsRashed al kamdah network security threats
Rashed al kamdah network security threats
 
Wifi Password Hack v2.85 - The best software to hack the Wifi networks !
Wifi Password Hack v2.85 - The best software to hack the Wifi networks !Wifi Password Hack v2.85 - The best software to hack the Wifi networks !
Wifi Password Hack v2.85 - The best software to hack the Wifi networks !
 
Worldwide attacks on SS7/SIGTRAN network
Worldwide attacks on SS7/SIGTRAN networkWorldwide attacks on SS7/SIGTRAN network
Worldwide attacks on SS7/SIGTRAN network
 
Optical fiber communication
Optical fiber communicationOptical fiber communication
Optical fiber communication
 
Evolution of mobile technology
Evolution of mobile technologyEvolution of mobile technology
Evolution of mobile technology
 
VTU ECE 7th sem VLSI lab manual
VTU ECE 7th sem VLSI lab manualVTU ECE 7th sem VLSI lab manual
VTU ECE 7th sem VLSI lab manual
 
Difference between i3 and i5 and i7 and core 2 duo pdf
Difference between i3 and i5 and i7 and core 2 duo pdfDifference between i3 and i5 and i7 and core 2 duo pdf
Difference between i3 and i5 and i7 and core 2 duo pdf
 
I3 Vs I5 Vs I7
I3 Vs I5 Vs I7I3 Vs I5 Vs I7
I3 Vs I5 Vs I7
 
Wireless technology from 0G to 7.5G
Wireless technology from 0G to 7.5GWireless technology from 0G to 7.5G
Wireless technology from 0G to 7.5G
 
I3,i5,i7 ppt
I3,i5,i7 pptI3,i5,i7 ppt
I3,i5,i7 ppt
 

Similaire à Gprs security threats and solutions

SecurityGen GTP Vulnerabilities.pptx
SecurityGen GTP Vulnerabilities.pptxSecurityGen GTP Vulnerabilities.pptx
SecurityGen GTP Vulnerabilities.pptxSecurityGen
 
5G Cybersecurity Bootcamp - 3GPP Version - Tonex Training
5G Cybersecurity Bootcamp - 3GPP Version - Tonex Training5G Cybersecurity Bootcamp - 3GPP Version - Tonex Training
5G Cybersecurity Bootcamp - 3GPP Version - Tonex TrainingBryan Len
 
5G Cybersecurity Bootcamp, 3GPP Version - Tonex Training
5G Cybersecurity Bootcamp, 3GPP Version - Tonex Training5G Cybersecurity Bootcamp, 3GPP Version - Tonex Training
5G Cybersecurity Bootcamp, 3GPP Version - Tonex TrainingBryan Len
 
OPTIMIZING PERFORMANCE OF 4G NETWORK USING VERTICAL HANDOFF
OPTIMIZING PERFORMANCE OF 4G NETWORK USING VERTICAL HANDOFFOPTIMIZING PERFORMANCE OF 4G NETWORK USING VERTICAL HANDOFF
OPTIMIZING PERFORMANCE OF 4G NETWORK USING VERTICAL HANDOFFHarshal Solao
 
Data sheet c78-607121
Data sheet c78-607121Data sheet c78-607121
Data sheet c78-607121hassanard
 
39587457 slide-gprs-06std
39587457 slide-gprs-06std39587457 slide-gprs-06std
39587457 slide-gprs-06stdÁnh Lê Thị
 
6G Training Course Part 2: 6G Vision
6G Training Course Part 2: 6G Vision6G Training Course Part 2: 6G Vision
6G Training Course Part 2: 6G Vision3G4G
 
5G: The Greatest Show on Earth!
5G: The Greatest Show on Earth!5G: The Greatest Show on Earth!
5G: The Greatest Show on Earth!Emil Olbrich
 
Perfect IoT solutions for business use cases
Perfect IoT solutions for business use casesPerfect IoT solutions for business use cases
Perfect IoT solutions for business use casescypresslm
 
Cellular J So
Cellular J SoCellular J So
Cellular J Soammar143
 
Shield Your Network: Prevent DDoS Attacks with SecurityGen
Shield Your Network: Prevent DDoS Attacks with SecurityGenShield Your Network: Prevent DDoS Attacks with SecurityGen
Shield Your Network: Prevent DDoS Attacks with SecurityGenSecurity Gen
 
Intermediate: 5G Applications Architecture - A look at Application Functions ...
Intermediate: 5G Applications Architecture - A look at Application Functions ...Intermediate: 5G Applications Architecture - A look at Application Functions ...
Intermediate: 5G Applications Architecture - A look at Application Functions ...3G4G
 
GPR Utility Locating Unveiling The Hidden World Beneath Our Feet
GPR Utility Locating Unveiling The Hidden World Beneath Our FeetGPR Utility Locating Unveiling The Hidden World Beneath Our Feet
GPR Utility Locating Unveiling The Hidden World Beneath Our FeetTec
 
Next Gen Optical Network: Scalability, Flexibility and Security
Next Gen Optical Network: Scalability, Flexibility and SecurityNext Gen Optical Network: Scalability, Flexibility and Security
Next Gen Optical Network: Scalability, Flexibility and SecurityFrancesco Fucelli
 
Mastering GTP Protocols: Your Roadmap to Success
Mastering GTP Protocols: Your Roadmap to SuccessMastering GTP Protocols: Your Roadmap to Success
Mastering GTP Protocols: Your Roadmap to SuccessSecurityGen1
 
Unraveling GTP: Threads of Efficient Communication
Unraveling GTP: Threads of Efficient CommunicationUnraveling GTP: Threads of Efficient Communication
Unraveling GTP: Threads of Efficient CommunicationSecurityGen1
 

Similaire à Gprs security threats and solutions (20)

Introduction to GPRS
Introduction to GPRSIntroduction to GPRS
Introduction to GPRS
 
SecurityGen GTP Vulnerabilities.pptx
SecurityGen GTP Vulnerabilities.pptxSecurityGen GTP Vulnerabilities.pptx
SecurityGen GTP Vulnerabilities.pptx
 
5G Cybersecurity Bootcamp - 3GPP Version - Tonex Training
5G Cybersecurity Bootcamp - 3GPP Version - Tonex Training5G Cybersecurity Bootcamp - 3GPP Version - Tonex Training
5G Cybersecurity Bootcamp - 3GPP Version - Tonex Training
 
5G Cybersecurity Bootcamp, 3GPP Version - Tonex Training
5G Cybersecurity Bootcamp, 3GPP Version - Tonex Training5G Cybersecurity Bootcamp, 3GPP Version - Tonex Training
5G Cybersecurity Bootcamp, 3GPP Version - Tonex Training
 
OPTIMIZING PERFORMANCE OF 4G NETWORK USING VERTICAL HANDOFF
OPTIMIZING PERFORMANCE OF 4G NETWORK USING VERTICAL HANDOFFOPTIMIZING PERFORMANCE OF 4G NETWORK USING VERTICAL HANDOFF
OPTIMIZING PERFORMANCE OF 4G NETWORK USING VERTICAL HANDOFF
 
Data sheet c78-607121
Data sheet c78-607121Data sheet c78-607121
Data sheet c78-607121
 
39587457 slide-gprs-06std
39587457 slide-gprs-06std39587457 slide-gprs-06std
39587457 slide-gprs-06std
 
6G Training Course Part 2: 6G Vision
6G Training Course Part 2: 6G Vision6G Training Course Part 2: 6G Vision
6G Training Course Part 2: 6G Vision
 
5G: The Greatest Show on Earth!
5G: The Greatest Show on Earth!5G: The Greatest Show on Earth!
5G: The Greatest Show on Earth!
 
Perfect IoT solutions for business use cases
Perfect IoT solutions for business use casesPerfect IoT solutions for business use cases
Perfect IoT solutions for business use cases
 
Cellular J So
Cellular J SoCellular J So
Cellular J So
 
Shield Your Network: Prevent DDoS Attacks with SecurityGen
Shield Your Network: Prevent DDoS Attacks with SecurityGenShield Your Network: Prevent DDoS Attacks with SecurityGen
Shield Your Network: Prevent DDoS Attacks with SecurityGen
 
Intermediate: 5G Applications Architecture - A look at Application Functions ...
Intermediate: 5G Applications Architecture - A look at Application Functions ...Intermediate: 5G Applications Architecture - A look at Application Functions ...
Intermediate: 5G Applications Architecture - A look at Application Functions ...
 
GPR Utility Locating Unveiling The Hidden World Beneath Our Feet
GPR Utility Locating Unveiling The Hidden World Beneath Our FeetGPR Utility Locating Unveiling The Hidden World Beneath Our Feet
GPR Utility Locating Unveiling The Hidden World Beneath Our Feet
 
Next Gen Optical Network: Scalability, Flexibility and Security
Next Gen Optical Network: Scalability, Flexibility and SecurityNext Gen Optical Network: Scalability, Flexibility and Security
Next Gen Optical Network: Scalability, Flexibility and Security
 
GPRS : Architecture and Applications
GPRS : Architecture and ApplicationsGPRS : Architecture and Applications
GPRS : Architecture and Applications
 
Mastering GTP Protocols: Your Roadmap to Success
Mastering GTP Protocols: Your Roadmap to SuccessMastering GTP Protocols: Your Roadmap to Success
Mastering GTP Protocols: Your Roadmap to Success
 
Unraveling GTP: Threads of Efficient Communication
Unraveling GTP: Threads of Efficient CommunicationUnraveling GTP: Threads of Efficient Communication
Unraveling GTP: Threads of Efficient Communication
 
Security model evaluation of 3 g
Security  model  evaluation  of  3 gSecurity  model  evaluation  of  3 g
Security model evaluation of 3 g
 
GPRS
GPRSGPRS
GPRS
 

Plus de JauwadSyed

Data mining / data extraction 2024
Data mining       / data extraction 2024Data mining       / data extraction 2024
Data mining / data extraction 2024JauwadSyed
 
Fractal and Bayesian Networks Inference
Fractal  and  Bayesian Networks InferenceFractal  and  Bayesian Networks Inference
Fractal and Bayesian Networks InferenceJauwadSyed
 
The Koch Snowflake SELF SIMILAR CONCEPTS
The Koch Snowflake SELF SIMILAR CONCEPTSThe Koch Snowflake SELF SIMILAR CONCEPTS
The Koch Snowflake SELF SIMILAR CONCEPTSJauwadSyed
 
Fractal Geometry A new branch of mathematics
Fractal GeometryA new branch of mathematicsFractal GeometryA new branch of mathematics
Fractal Geometry A new branch of mathematicsJauwadSyed
 
BRAIN COMPUTER INTERFACE AND TECHNOLOGY
BRAIN  COMPUTER  INTERFACE AND TECHNOLOGYBRAIN  COMPUTER  INTERFACE AND TECHNOLOGY
BRAIN COMPUTER INTERFACE AND TECHNOLOGYJauwadSyed
 
EYE GAZE IN TURNTAKING IN SIGN LANGUAGE INTERACTION
EYE GAZE IN TURNTAKING IN SIGN LANGUAGE INTERACTIONEYE GAZE IN TURNTAKING IN SIGN LANGUAGE INTERACTION
EYE GAZE IN TURNTAKING IN SIGN LANGUAGE INTERACTIONJauwadSyed
 
Trojan Backdoors
Trojan                         BackdoorsTrojan                         Backdoors
Trojan BackdoorsJauwadSyed
 
WIRELESS COMMUNICATION IN HEALTH CARE.ppt
WIRELESS COMMUNICATION IN HEALTH CARE.pptWIRELESS COMMUNICATION IN HEALTH CARE.ppt
WIRELESS COMMUNICATION IN HEALTH CARE.pptJauwadSyed
 
zigbee operates TRENDING TECHNOLOGY 2024
zigbee operates TRENDING TECHNOLOGY  2024zigbee operates TRENDING TECHNOLOGY  2024
zigbee operates TRENDING TECHNOLOGY 2024JauwadSyed
 
Interdisciplinary
InterdisciplinaryInterdisciplinary
InterdisciplinaryJauwadSyed
 
Cognitive development
Cognitive developmentCognitive development
Cognitive developmentJauwadSyed
 
Noise abatement training presentation
Noise abatement training presentationNoise abatement training presentation
Noise abatement training presentationJauwadSyed
 
GREEN CLOUD COMPUTING
GREEN CLOUD COMPUTINGGREEN CLOUD COMPUTING
GREEN CLOUD COMPUTINGJauwadSyed
 
wildlife-conseravtion
wildlife-conseravtionwildlife-conseravtion
wildlife-conseravtionJauwadSyed
 
Presentation on eu ets & aviation for iffaad
Presentation on eu ets & aviation for iffaadPresentation on eu ets & aviation for iffaad
Presentation on eu ets & aviation for iffaadJauwadSyed
 
Disaster Management in India Past, Present and Future
Disaster Management in India Past, Present and FutureDisaster Management in India Past, Present and Future
Disaster Management in India Past, Present and FutureJauwadSyed
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsJauwadSyed
 
Noise Reduction for Internal Combustion Engines
 Noise Reduction for Internal Combustion Engines Noise Reduction for Internal Combustion Engines
Noise Reduction for Internal Combustion EnginesJauwadSyed
 

Plus de JauwadSyed (20)

Data mining / data extraction 2024
Data mining       / data extraction 2024Data mining       / data extraction 2024
Data mining / data extraction 2024
 
Fractal and Bayesian Networks Inference
Fractal  and  Bayesian Networks InferenceFractal  and  Bayesian Networks Inference
Fractal and Bayesian Networks Inference
 
The Koch Snowflake SELF SIMILAR CONCEPTS
The Koch Snowflake SELF SIMILAR CONCEPTSThe Koch Snowflake SELF SIMILAR CONCEPTS
The Koch Snowflake SELF SIMILAR CONCEPTS
 
Fractal Geometry A new branch of mathematics
Fractal GeometryA new branch of mathematicsFractal GeometryA new branch of mathematics
Fractal Geometry A new branch of mathematics
 
BRAIN COMPUTER INTERFACE AND TECHNOLOGY
BRAIN  COMPUTER  INTERFACE AND TECHNOLOGYBRAIN  COMPUTER  INTERFACE AND TECHNOLOGY
BRAIN COMPUTER INTERFACE AND TECHNOLOGY
 
EYE GAZE IN TURNTAKING IN SIGN LANGUAGE INTERACTION
EYE GAZE IN TURNTAKING IN SIGN LANGUAGE INTERACTIONEYE GAZE IN TURNTAKING IN SIGN LANGUAGE INTERACTION
EYE GAZE IN TURNTAKING IN SIGN LANGUAGE INTERACTION
 
Trojan Backdoors
Trojan                         BackdoorsTrojan                         Backdoors
Trojan Backdoors
 
WIRELESS COMMUNICATION IN HEALTH CARE.ppt
WIRELESS COMMUNICATION IN HEALTH CARE.pptWIRELESS COMMUNICATION IN HEALTH CARE.ppt
WIRELESS COMMUNICATION IN HEALTH CARE.ppt
 
zigbee operates TRENDING TECHNOLOGY 2024
zigbee operates TRENDING TECHNOLOGY  2024zigbee operates TRENDING TECHNOLOGY  2024
zigbee operates TRENDING TECHNOLOGY 2024
 
Interdisciplinary
InterdisciplinaryInterdisciplinary
Interdisciplinary
 
Cognitive development
Cognitive developmentCognitive development
Cognitive development
 
Noise abatement training presentation
Noise abatement training presentationNoise abatement training presentation
Noise abatement training presentation
 
GREEN CLOUD COMPUTING
GREEN CLOUD COMPUTINGGREEN CLOUD COMPUTING
GREEN CLOUD COMPUTING
 
wildlife-conseravtion
wildlife-conseravtionwildlife-conseravtion
wildlife-conseravtion
 
Presentation on eu ets & aviation for iffaad
Presentation on eu ets & aviation for iffaadPresentation on eu ets & aviation for iffaad
Presentation on eu ets & aviation for iffaad
 
Bearing
BearingBearing
Bearing
 
Technology
TechnologyTechnology
Technology
 
Disaster Management in India Past, Present and Future
Disaster Management in India Past, Present and FutureDisaster Management in India Past, Present and Future
Disaster Management in India Past, Present and Future
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Noise Reduction for Internal Combustion Engines
 Noise Reduction for Internal Combustion Engines Noise Reduction for Internal Combustion Engines
Noise Reduction for Internal Combustion Engines
 

Dernier

Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...SUHANI PANDEY
 
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICSUNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICSrknatarajan
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfRagavanV2
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLManishPatel169454
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdfSuman Jyoti
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 

Dernier (20)

Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICSUNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 

Gprs security threats and solutions

  • 1. A SEMINAR REPORT ON “GPRS SECURITY THREATS AND SOLUTION” PRESENTED BY SYED JAUWAD GUIDED BY Miss. Sarita Agrawal
  • 2. TOPICS COVERED …. • INTRODUCTION • GPRS CORE NETWORK NETWORK ARCHITECTURE • CLASSIFICATION OF SECURITY SREVICES • DATA SERVICES ON Gp AND Gi INTERFACE • THREATS ON Gp INTERFACE • THREATS ON Gi INTERFACE • SECURITY SOLUTION FOR THE Gp INTERFACE • Gp NETWORK SOLUTION • SECURITY SOLUTION FOR THE Gi INTERFACE • Gi NETWORK SOLUTION • DEPLOYING GPRS SECURITY SOLUTION ON NETSCREEN SECURITY SYSTEM • CONCLUSION
  • 3. INTRODUCTION  DEFINATION OF GPRS  PROVIDE AN OPPORTUNITY  BENEFITS FROM GPRS  CONNECTED TO EXTERNAL DATA  OPERATOR PROTECTS NETWORK FROM EXTERNAL NETWORK
  • 4. GPRS CORE NETWORK ARCHITECTURE
  • 5. CLASSIFICATION OF SECURITY SERVICESCLASSIFICATION OF SECURITY SERVICES  INTEGRITYINTEGRITY  CONFIDENTIALITYCONFIDENTIALITY  AUTHENTICATIONAUTHENTICATION  AUTHORIZATIONAUTHORIZATION  AVAILABILITYAVAILABILITY
  • 6. DATA SERVICES ON THE Gp AND Gi INTERFACESDATA SERVICES ON THE Gp AND Gi INTERFACES  DATA SERVICES ON GpDATA SERVICES ON Gp  GTPGTP  BGPBGP  DNSDNS  DATA SERVICES ON GiDATA SERVICES ON Gi  MS SENT OUT TOWORDS INTERNETMS SENT OUT TOWORDS INTERNET  TRAFIC SENT OUT FROM GGSN ON GiTRAFIC SENT OUT FROM GGSN ON Gi INTERFACEINTERFACE
  • 7. THREATS ON Gp INTERFACETHREATS ON Gp INTERFACE  AVAILABILITYAVAILABILITY o DNS FLOODDNS FLOOD o GTP FLOODGTP FLOOD o SPOOFED GTP PDP CONTEXT DELETESPOOFED GTP PDP CONTEXT DELETE o BAD BGP ROUTING INFORMATIONBAD BGP ROUTING INFORMATION  AUTHENTICATION AND AUTHORIZATIONAUTHENTICATION AND AUTHORIZATION o SPOOFED CREATE PDP CONTEXT REQUESTSPOOFED CREATE PDP CONTEXT REQUEST o SPOOFED UPDATE PDP CONTEXT REQUESTSPOOFED UPDATE PDP CONTEXT REQUEST
  • 8. THREATS ON Gi INTERFACETHREATS ON Gi INTERFACE  AVAILABILITYAVAILABILITY o Gi BANDWIDTH SATURATIONGi BANDWIDTH SATURATION o FLOODING ON MSFLOODING ON MS  CONFIDENTIALITYCONFIDENTIALITY o NO PROTECTION OF DATA FROM AN MSNO PROTECTION OF DATA FROM AN MS o CAN BE SEEN BY THIRD PARTY IF IP SECURITY IS NOTCAN BE SEEN BY THIRD PARTY IF IP SECURITY IS NOT BEING USEDBEING USED  INTEGRITYINTEGRITY o DATA SENT OVER NETWORK CAN CHANGE BYDATA SENT OVER NETWORK CAN CHANGE BY INTERMEDIARIES IF HIGHER SECURITY IS NOT USEDINTERMEDIARIES IF HIGHER SECURITY IS NOT USED
  • 9. SECURITY SOLUTION FOR THE Gp INTERFACESECURITY SOLUTION FOR THE Gp INTERFACE  INGRESS AND EGRESS PACKET FILTERINGINGRESS AND EGRESS PACKET FILTERING  STATEFUL GTP PACKET FILTERINGSTATEFUL GTP PACKET FILTERING  GTP TRAFFIC SHAPPINGGTP TRAFFIC SHAPPING  IMPLEMENT IPSEC TUNNELS WITH ROMINGIMPLEMENT IPSEC TUNNELS WITH ROMING PARTNERSPARTNERS
  • 10. Gp NETWORK SOLUTION DIAGRAMGp NETWORK SOLUTION DIAGRAM
  • 11. SECURITY SOLUTION ON THE Gi INTERFACESECURITY SOLUTION ON THE Gi INTERFACE  LOGICAL TUNNELS FROM THE GGSN TOLOGICAL TUNNELS FROM THE GGSN TO CORPPORATE NETWORKCORPPORATE NETWORK  TRAFFIC RATE LIMITINGTRAFFIC RATE LIMITING  INGRESS AND EGRESS PACKET FILTERINGINGRESS AND EGRESS PACKET FILTERING
  • 12. Gi NETWORK SOLUTION DIAGRAMGi NETWORK SOLUTION DIAGRAM
  • 13. DEPLOYING GPRS SECURITY SOLUTIONDEPLOYING GPRS SECURITY SOLUTION ON NETSCREEN SECURITY SYSTEMON NETSCREEN SECURITY SYSTEM  GTP stateful packet filteringGTP stateful packet filtering  GTP security policies includingGTP security policies including  GTP management and logging featuresGTP management and logging features  High availability fail over includingHigh availability fail over including  Virtual router supports to separateVirtual router supports to separate intranet destined trafficintranet destined traffic
  • 14. CONCLUSIONCONCLUSION GPRS promises to benefit mobile data users greatly by providing always on higher bandwidth connections than are widely available today. In order to be successful, data connections must be secure and be available all the time from anywhere.