SlideShare une entreprise Scribd logo
1  sur  18
Quratulain Safdar CT-014
• Third generation mobile system which provide
mobile users with rich services,
wireless broadband access to Internet, and
worldwide roaming.
• The users will be able to enjoy Voice-over-IP,
multimedia messaging, and videoconferencing
services with up to 2 Mbps data rate
2
TRADITIONAL INFRASTRUCTURE
• In traditional infrastructure of wire there
are vast radio resources and signaling
procedures so that traffic is not a big
problem to handle.
MOBILE INFRASTRUCTURE
• In mobile network there are limited
resources and signaling procedure for
radio resource management is complex
that’s why the traffic handling is a big
threat.
STRUCTURE OF 3G NETWORK
STRUCTURE OF 3G PROTOCOL
STACK
SECURITY THREATS IN 3G
NETWORK
• Resource consume of UE
• Resource consume of mobile network
• The abnormal termination of connected
services
RESOURCE COMSUME OF UE:
Power management in mobile devices is very
important because all work done by the device is
lead to power consumption. If there are so many
process which are running so the device need
more power to consume. Continuous
communication and high cost of process are the
two cases which are discuss below.
–Continuous communication
–High cost
CONTINUOUS COMMUNICATION
In this case if the resources are consumed due to
ongoing communication caused by an abnormal
service and communication with malicious host.
The UE is infected with malicious code because
of the continuous scanning inside the network.
Due to this reason the resources are consumed
unnecessarily.
HIGH COST OF PROCESS
There is a timer t is used by the system which is
automatically turn off if the attacker constantly
send packets over a longer period of time than t
these can reallocate the radio resources. From
the perspective of radio resources the allocation
and release is a high task.
RESOURCE CONSUME OF MOBILE
NETWORK:
If attacker sent packet to any mobile device
for a longer period of time than t than the
RNC keep the resources to that particular
UE and may prevent use for other devices.
This may cause the failure of voice and
data service to particular base station.
ABNORMAL TERMINATION OF
CONNECTED SERVICE:
The mobile network can have a serious problem of
abnormal termination of service. The UE will try
continuously in order to reconnect the mobile network. In
this case all UE devices are trying to reconnect at the
same time. Potential threats can be viewed in this
regards. UE resources are consumed in order to
reconnect to the server and occupying the wireless
resources. The RNC and SGSN will be failing by
massive retry in short period of time. DDOS attack will
cause the failure of both data and voice services. It is an
“SYNC FLOOD “attack to the network.
COUNTERMEASURES
TRAFFIC ACQUISITION SYSTEM
This system collects the useful information from
the traffic in packet network. Iu-PS and Gn, Gi
which are the main interface of PN and TAS
designed able to analyze the communication
session. To analyze the communication must
see the inside tunnel of mobile network.
ABNORMAL TRAFFIC DETECTION
SYSTEM
There are two engine used in this system one
engine used for the detection of revealed attack
and the other is used to detect the unknown
abnormal traffic. We need to detect two type of
attack the false-positive attack and the false
negative-attack. In false-negative attack we
need to detect the unknown abnormal attacks
and in false-positive attack we need to detect the
known attacks.
ABNORMAL UE MONITOR AND
CONTROL SYSTEM
This system is use to monitor and control the
information that is come into the UE. Detection
and control system is not able to identify the
accrual user so only need to identify user by
other information such as hash table.
CONCLUSION
Mobile Network development is in progress and
many things are doing to enhance the bandwidth
and limited resources. The threats of security
can not be solve in 4F and LTE advance. We
research for the countermove and security
threats of 3g network. There are many other
development are ongoing for near future to
enhance the performance of mobile network.
Security threats and countermeasure in 3 g network

Contenu connexe

Tendances

Gsm – global system for mobile communication
Gsm – global system for mobile communicationGsm – global system for mobile communication
Gsm – global system for mobile communication
Muhammad Uzair Rasheed
 
Wireless Body Area network
Wireless Body Area networkWireless Body Area network
Wireless Body Area network
Rajeev N
 

Tendances (20)

Signal survey report
Signal survey reportSignal survey report
Signal survey report
 
Copy of saitejabaddam07
Copy of saitejabaddam07Copy of saitejabaddam07
Copy of saitejabaddam07
 
Mobile network structure
Mobile network structure Mobile network structure
Mobile network structure
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Gsm – global system for mobile communication
Gsm – global system for mobile communicationGsm – global system for mobile communication
Gsm – global system for mobile communication
 
Class 1
Class 1Class 1
Class 1
 
Understanding Bluetooth Technology and How to use in with Mobile Devices
Understanding Bluetooth Technology and How to use in with Mobile DevicesUnderstanding Bluetooth Technology and How to use in with Mobile Devices
Understanding Bluetooth Technology and How to use in with Mobile Devices
 
MOBILE COMPUTING and WIRELESS COMMUNICATION
MOBILE COMPUTING and WIRELESS COMMUNICATION MOBILE COMPUTING and WIRELESS COMMUNICATION
MOBILE COMPUTING and WIRELESS COMMUNICATION
 
Wireless Networking
Wireless NetworkingWireless Networking
Wireless Networking
 
WiMAX
WiMAXWiMAX
WiMAX
 
WIRELESS BODY AREA NETWORK
WIRELESS BODY AREA NETWORKWIRELESS BODY AREA NETWORK
WIRELESS BODY AREA NETWORK
 
Wireless Body Area Networks
Wireless Body Area Networks Wireless Body Area Networks
Wireless Body Area Networks
 
Advantages of ad hoc sensor network, driving application
Advantages of ad hoc sensor network, driving applicationAdvantages of ad hoc sensor network, driving application
Advantages of ad hoc sensor network, driving application
 
Wireless Body Area network
Wireless Body Area networkWireless Body Area network
Wireless Body Area network
 
Part 2: Technical Specification HAJJ Pilgrims Tracking System
Part 2:  Technical Specification HAJJ Pilgrims Tracking SystemPart 2:  Technical Specification HAJJ Pilgrims Tracking System
Part 2: Technical Specification HAJJ Pilgrims Tracking System
 
Mobile Technology
Mobile TechnologyMobile Technology
Mobile Technology
 
What is WPAN?
What is WPAN?What is WPAN?
What is WPAN?
 
Personal area networks (PAN)
Personal area networks (PAN)Personal area networks (PAN)
Personal area networks (PAN)
 
Umts system architecture
Umts system architectureUmts system architecture
Umts system architecture
 

En vedette (11)

Improving Web App Sec Microsoft
Improving Web App Sec MicrosoftImproving Web App Sec Microsoft
Improving Web App Sec Microsoft
 
Lcj pg sql-lt-kaigai
Lcj pg sql-lt-kaigaiLcj pg sql-lt-kaigai
Lcj pg sql-lt-kaigai
 
Collabor Tech Talk - Data Encryption 101
Collabor Tech Talk - Data Encryption 101Collabor Tech Talk - Data Encryption 101
Collabor Tech Talk - Data Encryption 101
 
Data encryption recommendation
Data encryption recommendationData encryption recommendation
Data encryption recommendation
 
CS_GA2009_Paper
CS_GA2009_PaperCS_GA2009_Paper
CS_GA2009_Paper
 
How to find Zero day vulnerabilities
How to find Zero day vulnerabilitiesHow to find Zero day vulnerabilities
How to find Zero day vulnerabilities
 
Encryption technology
Encryption technologyEncryption technology
Encryption technology
 
Cases
CasesCases
Cases
 
0-knowledge fuzzing
0-knowledge fuzzing0-knowledge fuzzing
0-knowledge fuzzing
 
Cryptography
CryptographyCryptography
Cryptography
 
Web application security: Threats & Countermeasures
Web application security: Threats & CountermeasuresWeb application security: Threats & Countermeasures
Web application security: Threats & Countermeasures
 

Similaire à Security threats and countermeasure in 3 g network

Interference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and ConfrontationInterference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and Confrontation
irjes
 
Impact of security breach on the upstream delay performance of next generatio...
Impact of security breach on the upstream delay performance of next generatio...Impact of security breach on the upstream delay performance of next generatio...
Impact of security breach on the upstream delay performance of next generatio...
journalBEEI
 
Wireless Communication Systems Are Developing Rapidly Essay
Wireless Communication Systems Are Developing Rapidly EssayWireless Communication Systems Are Developing Rapidly Essay
Wireless Communication Systems Are Developing Rapidly Essay
April Dillard
 
A wireless intrusion detection system and a new attack model (synopsis)
A wireless intrusion detection system and a new attack model (synopsis)A wireless intrusion detection system and a new attack model (synopsis)
A wireless intrusion detection system and a new attack model (synopsis)
Mumbai Academisc
 

Similaire à Security threats and countermeasure in 3 g network (20)

MANAGING INTERFERENCE IN COLLABORATIVE NETWORKS BY FLOW CONTROL AND SIGNAL PO...
MANAGING INTERFERENCE IN COLLABORATIVE NETWORKS BY FLOW CONTROL AND SIGNAL PO...MANAGING INTERFERENCE IN COLLABORATIVE NETWORKS BY FLOW CONTROL AND SIGNAL PO...
MANAGING INTERFERENCE IN COLLABORATIVE NETWORKS BY FLOW CONTROL AND SIGNAL PO...
 
Dd33630634
Dd33630634Dd33630634
Dd33630634
 
Dd33630634
Dd33630634Dd33630634
Dd33630634
 
A STRATEGY FOR DEFENDING PACKETS AGAINST RECOGNIZED INTERNAL JAMMERS IN WIREL...
A STRATEGY FOR DEFENDING PACKETS AGAINST RECOGNIZED INTERNAL JAMMERS IN WIREL...A STRATEGY FOR DEFENDING PACKETS AGAINST RECOGNIZED INTERNAL JAMMERS IN WIREL...
A STRATEGY FOR DEFENDING PACKETS AGAINST RECOGNIZED INTERNAL JAMMERS IN WIREL...
 
Interference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and ConfrontationInterference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and Confrontation
 
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...
 
DATA COM PRESENTATION-1.pptx
DATA COM PRESENTATION-1.pptxDATA COM PRESENTATION-1.pptx
DATA COM PRESENTATION-1.pptx
 
IRJET- Review on Multiple Access Techniques used in Mobile Telecommunication ...
IRJET- Review on Multiple Access Techniques used in Mobile Telecommunication ...IRJET- Review on Multiple Access Techniques used in Mobile Telecommunication ...
IRJET- Review on Multiple Access Techniques used in Mobile Telecommunication ...
 
Smart metering and control of transmission system
Smart metering and control of transmission systemSmart metering and control of transmission system
Smart metering and control of transmission system
 
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATIONSECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
 
IRJET- Data Transmission for Proximity Devices using Ultrasonic Sound Waves
IRJET- Data Transmission for Proximity Devices using Ultrasonic Sound WavesIRJET- Data Transmission for Proximity Devices using Ultrasonic Sound Waves
IRJET- Data Transmission for Proximity Devices using Ultrasonic Sound Waves
 
IRJET-QOS parameter analysis of UMTS networks based on Handovers and Sectoriz...
IRJET-QOS parameter analysis of UMTS networks based on Handovers and Sectoriz...IRJET-QOS parameter analysis of UMTS networks based on Handovers and Sectoriz...
IRJET-QOS parameter analysis of UMTS networks based on Handovers and Sectoriz...
 
Various Techniques Used in Wireless Sensor Networks for Data Transfer
Various Techniques Used in Wireless Sensor Networks for Data TransferVarious Techniques Used in Wireless Sensor Networks for Data Transfer
Various Techniques Used in Wireless Sensor Networks for Data Transfer
 
Impact of security breach on the upstream delay performance of next generatio...
Impact of security breach on the upstream delay performance of next generatio...Impact of security breach on the upstream delay performance of next generatio...
Impact of security breach on the upstream delay performance of next generatio...
 
Design computing architecture ~ Mobile Technologies
Design computing architecture ~ Mobile TechnologiesDesign computing architecture ~ Mobile Technologies
Design computing architecture ~ Mobile Technologies
 
Remote Monitoring 2020 Vison
Remote Monitoring 2020 VisonRemote Monitoring 2020 Vison
Remote Monitoring 2020 Vison
 
Consistent Access of Internet in Vehicular Networks
Consistent Access of Internet in Vehicular NetworksConsistent Access of Internet in Vehicular Networks
Consistent Access of Internet in Vehicular Networks
 
Wireless Communication Systems Are Developing Rapidly Essay
Wireless Communication Systems Are Developing Rapidly EssayWireless Communication Systems Are Developing Rapidly Essay
Wireless Communication Systems Are Developing Rapidly Essay
 
Requisite Trust Based Routing Protocol for WSN
Requisite Trust Based Routing Protocol for WSNRequisite Trust Based Routing Protocol for WSN
Requisite Trust Based Routing Protocol for WSN
 
A wireless intrusion detection system and a new attack model (synopsis)
A wireless intrusion detection system and a new attack model (synopsis)A wireless intrusion detection system and a new attack model (synopsis)
A wireless intrusion detection system and a new attack model (synopsis)
 

Plus de mmubashirkhan

Two factor authentication presentation mcit
Two factor authentication presentation mcitTwo factor authentication presentation mcit
Two factor authentication presentation mcit
mmubashirkhan
 
Situational awareness for computer network security
Situational awareness for computer network securitySituational awareness for computer network security
Situational awareness for computer network security
mmubashirkhan
 
Comparison between traditional vpn and mpls vpn
Comparison between traditional vpn and mpls vpnComparison between traditional vpn and mpls vpn
Comparison between traditional vpn and mpls vpn
mmubashirkhan
 
Security in wireless la ns
Security in wireless la ns Security in wireless la ns
Security in wireless la ns
mmubashirkhan
 
Saa s multitenant database architecture
Saa s multitenant database architectureSaa s multitenant database architecture
Saa s multitenant database architecture
mmubashirkhan
 
Improving intrusion detection system by honeypot
Improving intrusion detection system by honeypotImproving intrusion detection system by honeypot
Improving intrusion detection system by honeypot
mmubashirkhan
 
Drive by downloads-cns
Drive by downloads-cnsDrive by downloads-cns
Drive by downloads-cns
mmubashirkhan
 
Cyber security issues
Cyber security issuesCyber security issues
Cyber security issues
mmubashirkhan
 
Biometric security tech
Biometric security techBiometric security tech
Biometric security tech
mmubashirkhan
 
Authentication in manet
Authentication in manetAuthentication in manet
Authentication in manet
mmubashirkhan
 
Advanced persistent threat (apt)
Advanced persistent threat (apt)Advanced persistent threat (apt)
Advanced persistent threat (apt)
mmubashirkhan
 

Plus de mmubashirkhan (11)

Two factor authentication presentation mcit
Two factor authentication presentation mcitTwo factor authentication presentation mcit
Two factor authentication presentation mcit
 
Situational awareness for computer network security
Situational awareness for computer network securitySituational awareness for computer network security
Situational awareness for computer network security
 
Comparison between traditional vpn and mpls vpn
Comparison between traditional vpn and mpls vpnComparison between traditional vpn and mpls vpn
Comparison between traditional vpn and mpls vpn
 
Security in wireless la ns
Security in wireless la ns Security in wireless la ns
Security in wireless la ns
 
Saa s multitenant database architecture
Saa s multitenant database architectureSaa s multitenant database architecture
Saa s multitenant database architecture
 
Improving intrusion detection system by honeypot
Improving intrusion detection system by honeypotImproving intrusion detection system by honeypot
Improving intrusion detection system by honeypot
 
Drive by downloads-cns
Drive by downloads-cnsDrive by downloads-cns
Drive by downloads-cns
 
Cyber security issues
Cyber security issuesCyber security issues
Cyber security issues
 
Biometric security tech
Biometric security techBiometric security tech
Biometric security tech
 
Authentication in manet
Authentication in manetAuthentication in manet
Authentication in manet
 
Advanced persistent threat (apt)
Advanced persistent threat (apt)Advanced persistent threat (apt)
Advanced persistent threat (apt)
 

Dernier

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Dernier (20)

Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 

Security threats and countermeasure in 3 g network

  • 2. • Third generation mobile system which provide mobile users with rich services, wireless broadband access to Internet, and worldwide roaming. • The users will be able to enjoy Voice-over-IP, multimedia messaging, and videoconferencing services with up to 2 Mbps data rate 2
  • 3. TRADITIONAL INFRASTRUCTURE • In traditional infrastructure of wire there are vast radio resources and signaling procedures so that traffic is not a big problem to handle.
  • 4. MOBILE INFRASTRUCTURE • In mobile network there are limited resources and signaling procedure for radio resource management is complex that’s why the traffic handling is a big threat.
  • 5. STRUCTURE OF 3G NETWORK
  • 6. STRUCTURE OF 3G PROTOCOL STACK
  • 7. SECURITY THREATS IN 3G NETWORK • Resource consume of UE • Resource consume of mobile network • The abnormal termination of connected services
  • 8. RESOURCE COMSUME OF UE: Power management in mobile devices is very important because all work done by the device is lead to power consumption. If there are so many process which are running so the device need more power to consume. Continuous communication and high cost of process are the two cases which are discuss below. –Continuous communication –High cost
  • 9. CONTINUOUS COMMUNICATION In this case if the resources are consumed due to ongoing communication caused by an abnormal service and communication with malicious host. The UE is infected with malicious code because of the continuous scanning inside the network. Due to this reason the resources are consumed unnecessarily.
  • 10. HIGH COST OF PROCESS There is a timer t is used by the system which is automatically turn off if the attacker constantly send packets over a longer period of time than t these can reallocate the radio resources. From the perspective of radio resources the allocation and release is a high task.
  • 11. RESOURCE CONSUME OF MOBILE NETWORK: If attacker sent packet to any mobile device for a longer period of time than t than the RNC keep the resources to that particular UE and may prevent use for other devices. This may cause the failure of voice and data service to particular base station.
  • 12. ABNORMAL TERMINATION OF CONNECTED SERVICE: The mobile network can have a serious problem of abnormal termination of service. The UE will try continuously in order to reconnect the mobile network. In this case all UE devices are trying to reconnect at the same time. Potential threats can be viewed in this regards. UE resources are consumed in order to reconnect to the server and occupying the wireless resources. The RNC and SGSN will be failing by massive retry in short period of time. DDOS attack will cause the failure of both data and voice services. It is an “SYNC FLOOD “attack to the network.
  • 14. TRAFFIC ACQUISITION SYSTEM This system collects the useful information from the traffic in packet network. Iu-PS and Gn, Gi which are the main interface of PN and TAS designed able to analyze the communication session. To analyze the communication must see the inside tunnel of mobile network.
  • 15. ABNORMAL TRAFFIC DETECTION SYSTEM There are two engine used in this system one engine used for the detection of revealed attack and the other is used to detect the unknown abnormal traffic. We need to detect two type of attack the false-positive attack and the false negative-attack. In false-negative attack we need to detect the unknown abnormal attacks and in false-positive attack we need to detect the known attacks.
  • 16. ABNORMAL UE MONITOR AND CONTROL SYSTEM This system is use to monitor and control the information that is come into the UE. Detection and control system is not able to identify the accrual user so only need to identify user by other information such as hash table.
  • 17. CONCLUSION Mobile Network development is in progress and many things are doing to enhance the bandwidth and limited resources. The threats of security can not be solve in 4F and LTE advance. We research for the countermove and security threats of 3g network. There are many other development are ongoing for near future to enhance the performance of mobile network.