SlideShare une entreprise Scribd logo
1  sur  34
Telco Cybersecurity Trusted Advisor
Migrating mobile networks to 5G:
a smooth and secure approach
18 years
of experience
in R&D for enterprise
cybersecurity services and
products
9 years
of dedication to telecom
cybersecurity
2 R&D
centers in EU
41countries
where we have done projects
60 assessments
per year
are performed by our experts
for telecom companies
5G leader
for cybersecurity
Positive Technologies is a leading global provider of
cybersecurity solutions for telecom & mobile operators.
PT is a pioneer in signaling security research and active
contributor to industry standards.
1
telecom
cybersecurity vendor
We are the only company in the
world focused on end-to-end
cybersecurity for mobile operators
Company profile
PT is present at the most valuable security and telecom
industry conferences
Positive evolution
2002 2014 2016 20182012 2019 2020
Started as
enterprise
cybersecurity
services
company
Telecom
cybersecurity
services launched
World’s first
fundamental SS7
security research
released
Second
R&D
center
opened
in Brno
Portfolio extended with
cutting-edge 5G services
Service portfolio extended with
IoT security, anti-fraud, and
monitoring offerings
Telecom
Network Attack
Discovery
IP network
traffic analysis
solution released
Telecom
Attack Discovery
NGFW
Next Generation
Signaling Firewall
released
#1 Signaling
Firewall Award
Telecom
Attack Discovery
Included in
market guide
Telecom
Attack Discovery
IDS
Signaling IDS
released
Starting as a cybersecurity services company, PT has enhanced its service portfolio with
products that help to continuously deliver expertise and intelligence
Bio
Pavel Novikov
Lead of telecom security research team
 GTP security
 Diameter security
 RAN security
 SIP security
 IoT security
 5G security
Introduction
MNOs are paying close attention to the network
architecture changes coming with the 5G
migration.
This evolutionary advance over fourth-generation
(4G/LTE) networks is expected to enable a new
level of service and features for clients.
Most 5G subscribers will actually be Internet of
Things (IoT) devices.
But how to deploy 5G?
image: Freepik.com
 Non-standalone
 Standalone
 Slicing
 MEC
2G 3G 4G 5G
NSA
Early
IoT
Dual mode
packet core
Pure 5G SA
and IoT
What is about security in 5G?
 New protocols (HTTP/2, PFCP)
 New architecture (Service-based)
 New functions
https://blog.logsign.com/it-security-vs-cyber-security-what-is-the-difference/
Current LTE network
UE S-GWeNodeB P-GW
MME HSS
Internet
EPC
S1-U S5/S8
S6a
IMS
How to build 5G ASAP
The current approach to 5G by most operators and
vendors consists of relying on previous-generation
4G LTE networks with the Non-Standalone
architecture and opting for Option 3 NSA.
This is a rapid way for operators to provide
subscribers with 5G access, since they do not need to
build a new core network and can instead focus on
the 5G radio area network (RAN).
5G now & near future
https://blog.logsign.com/it-security-vs-cyber-security-what-is-the-difference/
5G NSA security
=
4G security
 Low latency
 V2X (Vehicle to everything)
 MEC (Multi-access edge computing)
 Slicing
How to bring 5G benefits in
this network?
Current 4G network architecture
Target 5G architecture
How to migrate?
Transition CUPS architecture
CUPS – Control and User plane separation
Hybrid 4G & 5G network
Migration
4G and 5G (NSA Option 3) subscribers without 5G specific benefits
Migration
 4G subscribers in old part of network
 5G subscribers in new network with 5G benefits and possibility to connect via 4G
network to 5G core (interconnect)
Migration
 4G & 5G subscribers in hybrid network with 5G benefits and interconnect
What is about security?
https://blog.devolutions.net/2019/08/gartner-publishes-top-10-security-projects-for-2019
5G security – control plane
SEPP – Security Edge Protection Proxy
5G security – user plane
UPF – User Plane Function
IPUPS – Inter-PLMN User Plane Security
 Old and new function aggregation
 Misconfiguration
 Accessibility to new functions via old
networks
https://www.thedailybeast.com/you-can-spy-like-the-nsa-for-a-few-thousand-bucks
Possible security issues
More aggregation
New functions – old protocols
New functions – old protocols
Misconfiguration
PT SECURITY APPROACH
The trend nowadays is that telecom industry is
changing rapidly. A convergence of the telco and IoT
technologies starts to spread. The former and current
IT security teams are step by step taking
responsibility for the telecom security assets.
However, for a smooth transformation, telecoms
require help from security experts to perform a test
and trial approach – to assess network security,
evaluate the current signaling network protection
level and ensure that core network security is fully
compliant with the best practices and guidelines.
1: Security assessment
2: Security monitoring
3: Efficient protection
IDS
How does it work
 Onboard telecom security monitoring
 Train staff to monitor security posture of
telecom infrastructure
 Develop and apply security controls for
network elements
 Deploy security measures and verify
compliance
 Conduct regular security assessments
Assess
Monitor
Protect
Auditing provides essential
visibility to fully understand your
ever changing network risks.
Continuous real
time monitoring is
essential to
measure network
security efficiency
and provide rapid
detection and
mitigation.
Secure your network completely by
addressing both generic vulnerabilities
(GSMA) and threats that actually affect
you as an ongoing process.
Thank you
@positive-tech.com Positive Technologies
Pavel Novikov, Lead of Telecom Security Research Team
Pavel.Novikov@positive-tech.com
Contact@positive-tech.com

Contenu connexe

Tendances

5 g reference network architecture techplayon
5 g reference network architecture   techplayon5 g reference network architecture   techplayon
5 g reference network architecture techplayonRobertHsiung
 
Technical Paper: 5G Standalone Architecture
Technical Paper: 5G Standalone ArchitectureTechnical Paper: 5G Standalone Architecture
Technical Paper: 5G Standalone ArchitectureMassimo Talia
 
5G RAN fundamentals
5G RAN fundamentals5G RAN fundamentals
5G RAN fundamentalsRavi Sharma
 
Mobile Plots - From EPC to 5G
Mobile Plots - From EPC to 5GMobile Plots - From EPC to 5G
Mobile Plots - From EPC to 5GAlberto Diez
 
5G and Open Reference Platforms
5G and Open Reference Platforms5G and Open Reference Platforms
5G and Open Reference PlatformsMichelle Holley
 
5G Network| What's Next | December 2018
5G Network| What's Next | December 20185G Network| What's Next | December 2018
5G Network| What's Next | December 2018paul young cpa, cga
 
Keynote Address: Critical communications standards supporting a multi-vendor ...
Keynote Address: Critical communications standards supporting a multi-vendor ...Keynote Address: Critical communications standards supporting a multi-vendor ...
Keynote Address: Critical communications standards supporting a multi-vendor ...3G4G
 
5G Network Architecture, Planning and Design
5G Network Architecture, Planning and Design5G Network Architecture, Planning and Design
5G Network Architecture, Planning and DesignTonex
 
Self interference cancellation of full duplex technology in 5G
Self interference cancellation of full duplex technology in 5GSelf interference cancellation of full duplex technology in 5G
Self interference cancellation of full duplex technology in 5GRumana Afrose
 
Advanced: Private Networks & 5G Non-Public Networks
Advanced: Private Networks & 5G Non-Public NetworksAdvanced: Private Networks & 5G Non-Public Networks
Advanced: Private Networks & 5G Non-Public Networks3G4G
 
5 g mobile phone concept
5 g mobile phone    concept5 g mobile phone    concept
5 g mobile phone conceptjonesdaniel
 
‘Small Cells’ and the City
‘Small Cells’ and the City‘Small Cells’ and the City
‘Small Cells’ and the CityeXplanoTech
 
Light Reading Webinar: Defining the 5G Network Connectivity Challenge
Light Reading Webinar: Defining the 5G Network Connectivity Challenge Light Reading Webinar: Defining the 5G Network Connectivity Challenge
Light Reading Webinar: Defining the 5G Network Connectivity Challenge ECI – THE ELASTIC NETWORK™
 
5G Network Architecture, Design and Optimisation
5G Network Architecture, Design and Optimisation5G Network Architecture, Design and Optimisation
5G Network Architecture, Design and Optimisation3G4G
 
Samir's whitepaper5g
Samir's whitepaper5gSamir's whitepaper5g
Samir's whitepaper5gSamir Mohanty
 
Advanced: Control and User Plane Separation of EPC nodes (CUPS)
Advanced: Control and User Plane Separation of EPC nodes (CUPS)Advanced: Control and User Plane Separation of EPC nodes (CUPS)
Advanced: Control and User Plane Separation of EPC nodes (CUPS)3G4G
 
NG-PON2 converged access for 5G Transport
NG-PON2 converged access for 5G TransportNG-PON2 converged access for 5G Transport
NG-PON2 converged access for 5G TransportMichael Gronovius
 

Tendances (20)

5 g reference network architecture techplayon
5 g reference network architecture   techplayon5 g reference network architecture   techplayon
5 g reference network architecture techplayon
 
Technical Paper: 5G Standalone Architecture
Technical Paper: 5G Standalone ArchitectureTechnical Paper: 5G Standalone Architecture
Technical Paper: 5G Standalone Architecture
 
5G RAN fundamentals
5G RAN fundamentals5G RAN fundamentals
5G RAN fundamentals
 
Mobile Plots - From EPC to 5G
Mobile Plots - From EPC to 5GMobile Plots - From EPC to 5G
Mobile Plots - From EPC to 5G
 
Evolution to 5G happens Now
Evolution to 5G happens NowEvolution to 5G happens Now
Evolution to 5G happens Now
 
5G and Open Reference Platforms
5G and Open Reference Platforms5G and Open Reference Platforms
5G and Open Reference Platforms
 
5G Network| What's Next | December 2018
5G Network| What's Next | December 20185G Network| What's Next | December 2018
5G Network| What's Next | December 2018
 
Keynote Address: Critical communications standards supporting a multi-vendor ...
Keynote Address: Critical communications standards supporting a multi-vendor ...Keynote Address: Critical communications standards supporting a multi-vendor ...
Keynote Address: Critical communications standards supporting a multi-vendor ...
 
5G Fundamentals
5G Fundamentals5G Fundamentals
5G Fundamentals
 
5G Network Architecture, Planning and Design
5G Network Architecture, Planning and Design5G Network Architecture, Planning and Design
5G Network Architecture, Planning and Design
 
Self interference cancellation of full duplex technology in 5G
Self interference cancellation of full duplex technology in 5GSelf interference cancellation of full duplex technology in 5G
Self interference cancellation of full duplex technology in 5G
 
Advanced: Private Networks & 5G Non-Public Networks
Advanced: Private Networks & 5G Non-Public NetworksAdvanced: Private Networks & 5G Non-Public Networks
Advanced: Private Networks & 5G Non-Public Networks
 
5 g mobile phone concept
5 g mobile phone    concept5 g mobile phone    concept
5 g mobile phone concept
 
‘Small Cells’ and the City
‘Small Cells’ and the City‘Small Cells’ and the City
‘Small Cells’ and the City
 
Light Reading Webinar: Defining the 5G Network Connectivity Challenge
Light Reading Webinar: Defining the 5G Network Connectivity Challenge Light Reading Webinar: Defining the 5G Network Connectivity Challenge
Light Reading Webinar: Defining the 5G Network Connectivity Challenge
 
5G Network Architecture, Design and Optimisation
5G Network Architecture, Design and Optimisation5G Network Architecture, Design and Optimisation
5G Network Architecture, Design and Optimisation
 
Samir's whitepaper5g
Samir's whitepaper5gSamir's whitepaper5g
Samir's whitepaper5g
 
Advanced: Control and User Plane Separation of EPC nodes (CUPS)
Advanced: Control and User Plane Separation of EPC nodes (CUPS)Advanced: Control and User Plane Separation of EPC nodes (CUPS)
Advanced: Control and User Plane Separation of EPC nodes (CUPS)
 
NG-PON2 converged access for 5G Transport
NG-PON2 converged access for 5G TransportNG-PON2 converged access for 5G Transport
NG-PON2 converged access for 5G Transport
 
5G UE Simulator
5G UE Simulator5G UE Simulator
5G UE Simulator
 

Similaire à Migrating mobile networks to 5 g a smooth and secure approach 01.10.20

Security course: exclusive 5G SA pitfalls and new changes to legislation
Security course: exclusive 5G SA pitfalls and new changes to legislationSecurity course: exclusive 5G SA pitfalls and new changes to legislation
Security course: exclusive 5G SA pitfalls and new changes to legislationPositiveTechnologies
 
5G SA security: a comprehensive overview of threats, vulnerabilities and rem...
 5G SA security: a comprehensive overview of threats, vulnerabilities and rem... 5G SA security: a comprehensive overview of threats, vulnerabilities and rem...
5G SA security: a comprehensive overview of threats, vulnerabilities and rem...PositiveTechnologies
 
Security Gen Ensures Robust Telecom Security with Comprehensive Assessments
Security Gen Ensures Robust Telecom Security with Comprehensive AssessmentsSecurity Gen Ensures Robust Telecom Security with Comprehensive Assessments
Security Gen Ensures Robust Telecom Security with Comprehensive AssessmentsSecurityGen1
 
Best 5G Security Solutions - SecurityGen
Best 5G Security Solutions - SecurityGenBest 5G Security Solutions - SecurityGen
Best 5G Security Solutions - SecurityGenSecurity Gen
 
SecurityGen's OSS/BSS Solutions: Navigating the Complexity of Modern Operations
SecurityGen's OSS/BSS Solutions: Navigating the Complexity of Modern OperationsSecurityGen's OSS/BSS Solutions: Navigating the Complexity of Modern Operations
SecurityGen's OSS/BSS Solutions: Navigating the Complexity of Modern OperationsSecurityGen1
 
5G Security Program -Case Studies
5G Security Program -Case Studies 5G Security Program -Case Studies
5G Security Program -Case Studies Security Gen
 
5G Security Program Datasheet (2).pdf
5G Security Program Datasheet (2).pdf5G Security Program Datasheet (2).pdf
5G Security Program Datasheet (2).pdfSecurity Gen
 
15CS81- IoT- VTU- module 3
15CS81- IoT- VTU- module 315CS81- IoT- VTU- module 3
15CS81- IoT- VTU- module 3Syed Mustafa
 
Securing Private 5G Networks (1).pdf
Securing Private 5G Networks (1).pdfSecuring Private 5G Networks (1).pdf
Securing Private 5G Networks (1).pdfSecurity Gen
 
Securing Private 5G Networks (1).pdf
Securing Private 5G Networks (1).pdfSecuring Private 5G Networks (1).pdf
Securing Private 5G Networks (1).pdfSecurity Gen
 
Empower Your Defense: SecurityGen's Comprehensive Approach to DDoS Attack Pre...
Empower Your Defense: SecurityGen's Comprehensive Approach to DDoS Attack Pre...Empower Your Defense: SecurityGen's Comprehensive Approach to DDoS Attack Pre...
Empower Your Defense: SecurityGen's Comprehensive Approach to DDoS Attack Pre...SecurityGen1
 
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING MLSECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING MLIRJET Journal
 
5G report 2
5G report 25G report 2
5G report 2IGDTUW
 
SECURING FUTURE CONNECTIVITY: An Extensive Analysis on 5G Network Security
SECURING FUTURE CONNECTIVITY: An Extensive Analysis on 5G Network SecuritySECURING FUTURE CONNECTIVITY: An Extensive Analysis on 5G Network Security
SECURING FUTURE CONNECTIVITY: An Extensive Analysis on 5G Network SecurityIRJET Journal
 
Securing the Future Safeguarding 5G Networks with Advanced Security Solutions...
Securing the Future Safeguarding 5G Networks with Advanced Security Solutions...Securing the Future Safeguarding 5G Networks with Advanced Security Solutions...
Securing the Future Safeguarding 5G Networks with Advanced Security Solutions...SecurityGen1
 
Elevate Safety with Security Gen: Unraveling the Power of Signaling Security
Elevate Safety with Security Gen: Unraveling the Power of Signaling SecurityElevate Safety with Security Gen: Unraveling the Power of Signaling Security
Elevate Safety with Security Gen: Unraveling the Power of Signaling SecuritySecurityGen1
 
Protecting Your Text Messages: SecurityGen's SMS Fraud Detection Solutions
Protecting Your Text Messages: SecurityGen's SMS Fraud Detection SolutionsProtecting Your Text Messages: SecurityGen's SMS Fraud Detection Solutions
Protecting Your Text Messages: SecurityGen's SMS Fraud Detection SolutionsSecurityGen1
 
SecurityGen's Pioneering Approach to 5G Security Services
SecurityGen's Pioneering Approach to 5G Security ServicesSecurityGen's Pioneering Approach to 5G Security Services
SecurityGen's Pioneering Approach to 5G Security ServicesSecurityGen1
 

Similaire à Migrating mobile networks to 5 g a smooth and secure approach 01.10.20 (20)

Security course: exclusive 5G SA pitfalls and new changes to legislation
Security course: exclusive 5G SA pitfalls and new changes to legislationSecurity course: exclusive 5G SA pitfalls and new changes to legislation
Security course: exclusive 5G SA pitfalls and new changes to legislation
 
5G SA security: a comprehensive overview of threats, vulnerabilities and rem...
 5G SA security: a comprehensive overview of threats, vulnerabilities and rem... 5G SA security: a comprehensive overview of threats, vulnerabilities and rem...
5G SA security: a comprehensive overview of threats, vulnerabilities and rem...
 
Security Gen Ensures Robust Telecom Security with Comprehensive Assessments
Security Gen Ensures Robust Telecom Security with Comprehensive AssessmentsSecurity Gen Ensures Robust Telecom Security with Comprehensive Assessments
Security Gen Ensures Robust Telecom Security with Comprehensive Assessments
 
Best 5G Security Solutions - SecurityGen
Best 5G Security Solutions - SecurityGenBest 5G Security Solutions - SecurityGen
Best 5G Security Solutions - SecurityGen
 
SecurityGen's OSS/BSS Solutions: Navigating the Complexity of Modern Operations
SecurityGen's OSS/BSS Solutions: Navigating the Complexity of Modern OperationsSecurityGen's OSS/BSS Solutions: Navigating the Complexity of Modern Operations
SecurityGen's OSS/BSS Solutions: Navigating the Complexity of Modern Operations
 
5G Security Program -Case Studies
5G Security Program -Case Studies 5G Security Program -Case Studies
5G Security Program -Case Studies
 
5G Security Program Datasheet (2).pdf
5G Security Program Datasheet (2).pdf5G Security Program Datasheet (2).pdf
5G Security Program Datasheet (2).pdf
 
15CS81- IoT- VTU- module 3
15CS81- IoT- VTU- module 315CS81- IoT- VTU- module 3
15CS81- IoT- VTU- module 3
 
Securing Private 5G Networks (1).pdf
Securing Private 5G Networks (1).pdfSecuring Private 5G Networks (1).pdf
Securing Private 5G Networks (1).pdf
 
Securing Private 5G Networks (1).pdf
Securing Private 5G Networks (1).pdfSecuring Private 5G Networks (1).pdf
Securing Private 5G Networks (1).pdf
 
Empower Your Defense: SecurityGen's Comprehensive Approach to DDoS Attack Pre...
Empower Your Defense: SecurityGen's Comprehensive Approach to DDoS Attack Pre...Empower Your Defense: SecurityGen's Comprehensive Approach to DDoS Attack Pre...
Empower Your Defense: SecurityGen's Comprehensive Approach to DDoS Attack Pre...
 
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING MLSECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
 
5G report 2
5G report 25G report 2
5G report 2
 
SECURING FUTURE CONNECTIVITY: An Extensive Analysis on 5G Network Security
SECURING FUTURE CONNECTIVITY: An Extensive Analysis on 5G Network SecuritySECURING FUTURE CONNECTIVITY: An Extensive Analysis on 5G Network Security
SECURING FUTURE CONNECTIVITY: An Extensive Analysis on 5G Network Security
 
Securing the Future Safeguarding 5G Networks with Advanced Security Solutions...
Securing the Future Safeguarding 5G Networks with Advanced Security Solutions...Securing the Future Safeguarding 5G Networks with Advanced Security Solutions...
Securing the Future Safeguarding 5G Networks with Advanced Security Solutions...
 
Elevate Safety with Security Gen: Unraveling the Power of Signaling Security
Elevate Safety with Security Gen: Unraveling the Power of Signaling SecurityElevate Safety with Security Gen: Unraveling the Power of Signaling Security
Elevate Safety with Security Gen: Unraveling the Power of Signaling Security
 
Protecting Your Text Messages: SecurityGen's SMS Fraud Detection Solutions
Protecting Your Text Messages: SecurityGen's SMS Fraud Detection SolutionsProtecting Your Text Messages: SecurityGen's SMS Fraud Detection Solutions
Protecting Your Text Messages: SecurityGen's SMS Fraud Detection Solutions
 
SecurityGen's Pioneering Approach to 5G Security Services
SecurityGen's Pioneering Approach to 5G Security ServicesSecurityGen's Pioneering Approach to 5G Security Services
SecurityGen's Pioneering Approach to 5G Security Services
 
5G_Upload.docx
5G_Upload.docx5G_Upload.docx
5G_Upload.docx
 
An analysis of the security needs
An analysis of the security needsAn analysis of the security needs
An analysis of the security needs
 

Plus de PositiveTechnologies

Telecom incidents investigation: daily work behind the scenes
Telecom incidents investigation: daily work behind the scenesTelecom incidents investigation: daily work behind the scenes
Telecom incidents investigation: daily work behind the scenesPositiveTechnologies
 
Telecom under attack: demo of fraud scenarios and countermeasures
Telecom under attack: demo of fraud scenarios and countermeasuresTelecom under attack: demo of fraud scenarios and countermeasures
Telecom under attack: demo of fraud scenarios and countermeasuresPositiveTechnologies
 
SS7: the bad neighbor you're stuck with during the 5G migration and far beyond
SS7: the bad neighbor you're stuck with during the 5G migration and far beyondSS7: the bad neighbor you're stuck with during the 5G migration and far beyond
SS7: the bad neighbor you're stuck with during the 5G migration and far beyondPositiveTechnologies
 
5G mission diary: Houston, we have a problem
5G mission diary: Houston, we have a problem5G mission diary: Houston, we have a problem
5G mission diary: Houston, we have a problemPositiveTechnologies
 
Cybersecurity & Fraud Mitigation in Telcos
Cybersecurity & Fraud Mitigation in TelcosCybersecurity & Fraud Mitigation in Telcos
Cybersecurity & Fraud Mitigation in TelcosPositiveTechnologies
 
Positive approach to security of Core networks
Positive approach to security of Core networksPositive approach to security of Core networks
Positive approach to security of Core networksPositiveTechnologies
 
Attacks you can't combat: vulnerabilities of most robust MNOs
Attacks you can't combat: vulnerabilities of most robust MNOsAttacks you can't combat: vulnerabilities of most robust MNOs
Attacks you can't combat: vulnerabilities of most robust MNOsPositiveTechnologies
 
Simjacker: how to protect your network from the latest hot vulnerability
Simjacker: how to protect your network from the latest hot vulnerabilitySimjacker: how to protect your network from the latest hot vulnerability
Simjacker: how to protect your network from the latest hot vulnerabilityPositiveTechnologies
 
Creating a fuzzer for telecom protocol 4G LTE case study
Creating a fuzzer for telecom protocol 4G LTE case studyCreating a fuzzer for telecom protocol 4G LTE case study
Creating a fuzzer for telecom protocol 4G LTE case studyPositiveTechnologies
 
Signaling security essentials. Ready, steady, 5G!
 Signaling security essentials. Ready, steady, 5G! Signaling security essentials. Ready, steady, 5G!
Signaling security essentials. Ready, steady, 5G!PositiveTechnologies
 
Telecom Security in the Era of 5G and IoT
Telecom Security in the Era of 5G and IoTTelecom Security in the Era of 5G and IoT
Telecom Security in the Era of 5G and IoTPositiveTechnologies
 

Plus de PositiveTechnologies (14)

Telecom incidents investigation: daily work behind the scenes
Telecom incidents investigation: daily work behind the scenesTelecom incidents investigation: daily work behind the scenes
Telecom incidents investigation: daily work behind the scenes
 
Telecom under attack: demo of fraud scenarios and countermeasures
Telecom under attack: demo of fraud scenarios and countermeasuresTelecom under attack: demo of fraud scenarios and countermeasures
Telecom under attack: demo of fraud scenarios and countermeasures
 
SS7: the bad neighbor you're stuck with during the 5G migration and far beyond
SS7: the bad neighbor you're stuck with during the 5G migration and far beyondSS7: the bad neighbor you're stuck with during the 5G migration and far beyond
SS7: the bad neighbor you're stuck with during the 5G migration and far beyond
 
5G mission diary: Houston, we have a problem
5G mission diary: Houston, we have a problem5G mission diary: Houston, we have a problem
5G mission diary: Houston, we have a problem
 
Cybersecurity & Fraud Mitigation in Telcos
Cybersecurity & Fraud Mitigation in TelcosCybersecurity & Fraud Mitigation in Telcos
Cybersecurity & Fraud Mitigation in Telcos
 
Positive approach to security of Core networks
Positive approach to security of Core networksPositive approach to security of Core networks
Positive approach to security of Core networks
 
SS7: 2G/3G's weakest link
SS7: 2G/3G's weakest linkSS7: 2G/3G's weakest link
SS7: 2G/3G's weakest link
 
On the verge of fraud
On the verge of fraudOn the verge of fraud
On the verge of fraud
 
Attacks you can't combat: vulnerabilities of most robust MNOs
Attacks you can't combat: vulnerabilities of most robust MNOsAttacks you can't combat: vulnerabilities of most robust MNOs
Attacks you can't combat: vulnerabilities of most robust MNOs
 
Simjacker: how to protect your network from the latest hot vulnerability
Simjacker: how to protect your network from the latest hot vulnerabilitySimjacker: how to protect your network from the latest hot vulnerability
Simjacker: how to protect your network from the latest hot vulnerability
 
Creating a fuzzer for telecom protocol 4G LTE case study
Creating a fuzzer for telecom protocol 4G LTE case studyCreating a fuzzer for telecom protocol 4G LTE case study
Creating a fuzzer for telecom protocol 4G LTE case study
 
Signaling security essentials. Ready, steady, 5G!
 Signaling security essentials. Ready, steady, 5G! Signaling security essentials. Ready, steady, 5G!
Signaling security essentials. Ready, steady, 5G!
 
Telecom Security in the Era of 5G and IoT
Telecom Security in the Era of 5G and IoTTelecom Security in the Era of 5G and IoT
Telecom Security in the Era of 5G and IoT
 
SS7 Vulnerabilities
SS7 VulnerabilitiesSS7 Vulnerabilities
SS7 Vulnerabilities
 

Dernier

Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 

Dernier (20)

Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 

Migrating mobile networks to 5 g a smooth and secure approach 01.10.20

  • 1. Telco Cybersecurity Trusted Advisor Migrating mobile networks to 5G: a smooth and secure approach
  • 2. 18 years of experience in R&D for enterprise cybersecurity services and products 9 years of dedication to telecom cybersecurity 2 R&D centers in EU 41countries where we have done projects 60 assessments per year are performed by our experts for telecom companies 5G leader for cybersecurity Positive Technologies is a leading global provider of cybersecurity solutions for telecom & mobile operators. PT is a pioneer in signaling security research and active contributor to industry standards. 1 telecom cybersecurity vendor We are the only company in the world focused on end-to-end cybersecurity for mobile operators Company profile PT is present at the most valuable security and telecom industry conferences
  • 3. Positive evolution 2002 2014 2016 20182012 2019 2020 Started as enterprise cybersecurity services company Telecom cybersecurity services launched World’s first fundamental SS7 security research released Second R&D center opened in Brno Portfolio extended with cutting-edge 5G services Service portfolio extended with IoT security, anti-fraud, and monitoring offerings Telecom Network Attack Discovery IP network traffic analysis solution released Telecom Attack Discovery NGFW Next Generation Signaling Firewall released #1 Signaling Firewall Award Telecom Attack Discovery Included in market guide Telecom Attack Discovery IDS Signaling IDS released Starting as a cybersecurity services company, PT has enhanced its service portfolio with products that help to continuously deliver expertise and intelligence
  • 4. Bio Pavel Novikov Lead of telecom security research team  GTP security  Diameter security  RAN security  SIP security  IoT security  5G security
  • 5. Introduction MNOs are paying close attention to the network architecture changes coming with the 5G migration. This evolutionary advance over fourth-generation (4G/LTE) networks is expected to enable a new level of service and features for clients. Most 5G subscribers will actually be Internet of Things (IoT) devices.
  • 6. But how to deploy 5G? image: Freepik.com  Non-standalone  Standalone  Slicing  MEC
  • 7. 2G 3G 4G 5G NSA Early IoT Dual mode packet core Pure 5G SA and IoT What is about security in 5G?  New protocols (HTTP/2, PFCP)  New architecture (Service-based)  New functions https://blog.logsign.com/it-security-vs-cyber-security-what-is-the-difference/
  • 8. Current LTE network UE S-GWeNodeB P-GW MME HSS Internet EPC S1-U S5/S8 S6a IMS
  • 9. How to build 5G ASAP The current approach to 5G by most operators and vendors consists of relying on previous-generation 4G LTE networks with the Non-Standalone architecture and opting for Option 3 NSA. This is a rapid way for operators to provide subscribers with 5G access, since they do not need to build a new core network and can instead focus on the 5G radio area network (RAN).
  • 10. 5G now & near future
  • 12.  Low latency  V2X (Vehicle to everything)  MEC (Multi-access edge computing)  Slicing How to bring 5G benefits in this network?
  • 13. Current 4G network architecture
  • 16. Transition CUPS architecture CUPS – Control and User plane separation
  • 17. Hybrid 4G & 5G network
  • 18. Migration 4G and 5G (NSA Option 3) subscribers without 5G specific benefits
  • 19. Migration  4G subscribers in old part of network  5G subscribers in new network with 5G benefits and possibility to connect via 4G network to 5G core (interconnect)
  • 20. Migration  4G & 5G subscribers in hybrid network with 5G benefits and interconnect
  • 21. What is about security? https://blog.devolutions.net/2019/08/gartner-publishes-top-10-security-projects-for-2019
  • 22. 5G security – control plane SEPP – Security Edge Protection Proxy
  • 23. 5G security – user plane UPF – User Plane Function IPUPS – Inter-PLMN User Plane Security
  • 24.  Old and new function aggregation  Misconfiguration  Accessibility to new functions via old networks https://www.thedailybeast.com/you-can-spy-like-the-nsa-for-a-few-thousand-bucks Possible security issues
  • 26. New functions – old protocols
  • 27. New functions – old protocols
  • 29. PT SECURITY APPROACH The trend nowadays is that telecom industry is changing rapidly. A convergence of the telco and IoT technologies starts to spread. The former and current IT security teams are step by step taking responsibility for the telecom security assets. However, for a smooth transformation, telecoms require help from security experts to perform a test and trial approach – to assess network security, evaluate the current signaling network protection level and ensure that core network security is fully compliant with the best practices and guidelines.
  • 33. How does it work  Onboard telecom security monitoring  Train staff to monitor security posture of telecom infrastructure  Develop and apply security controls for network elements  Deploy security measures and verify compliance  Conduct regular security assessments Assess Monitor Protect Auditing provides essential visibility to fully understand your ever changing network risks. Continuous real time monitoring is essential to measure network security efficiency and provide rapid detection and mitigation. Secure your network completely by addressing both generic vulnerabilities (GSMA) and threats that actually affect you as an ongoing process.
  • 34. Thank you @positive-tech.com Positive Technologies Pavel Novikov, Lead of Telecom Security Research Team Pavel.Novikov@positive-tech.com Contact@positive-tech.com

Notes de l'éditeur

  1. Офисы?
  2. 4
  3. 5