Agenda
					  			            -  SS7 security
                  				  	  -  State of the art
-  Challenges in detection 
 
- Testing environment
                  			        	-  SS7 attack simulator: A demo 
-  Big data platform 
-  Test results with machine learning. 
 
- Challenges and ways forward
 
				
					  Agenda
					  			            -  SS7 security
                  				  	  -  State of the art
-  Challenges in detection 
 
- Testing environment
                  			        	 - SS7 attack simulator: A demo 
- Big data platform 
- Test results with machine learning.
 
- Challenges and ways forward
 
				
					The Signaling System 7 aka SS7
					- The nervous system
                  					-  Of both he telecommunication network and the mobile communication network.
-  Allows network elements to communicate, collaborate and 
deliver telecommunication services to the users. 
 
-  Used to be a walled garden system
                  			        	-  Network of trusted operators.
-  No need for security. 
 
 
				
					New era: Emergence of threats
					- Deregulation
                  					- Removed the monopoly of telecom operators.
- Opened the market for less trusted parties.
 
- Transition to IP
                  					- Paved the way for innovative services.
- Inherited weaknesses of IP.
 
- Advances in microelectronics
                  					- Cheaper equipment to launch attacks.
 
- Open source mobile communication
                  					- Enabled the construction of fake base station.
 
 
				
					Publicly disclosed SS7 attacks
					- Attackers are able to
                  					- Track the location of subscribers.
- Intercept calls and SMS.
- Commit fraud.
- Deny service to subscribers..
 
- Requirements for attackers
                  					- Must be connected to the SS7 network.
- Be able to generate arbitrary messages.
- Must be able to imitate an element in the core network by providing SS7 capability.
 
 
				
					SS7 Messages used in attacks
					- Category 1: 
                  					- Messages that has no legitimate use case for external exposures are as follows:.
- sendIdentification (SI) – anyTimeInterrogation (ATI) – anyTImeModification (ATM) – provideSubscriberLocation (PSL).
 
- Category 2:
                  					-  Messages that has no legitimate need to be exposed externally for the operator’s own subscribers, but can be received for other operator’s roaming subscribers as follows:
- provideSubscriberInformation (PSI) – insertSubscriberData (ISD) + gsmSCF – insertSubscriberData – deletedSubscriberData (DSL).
 
- Category 3: 
                  					- Messages that has legitimate need for external exposure. These are the following:
- updateLocation (UL) – sendAuthenticatioInfo (SAI) – registerSS – eraseSS – processUnstructuredSS (PSU) – cancelLocation (CL) - sendRoutingInfor-mation(SRI-SM, SRI-LCS).
 
 
				
					How is the situation with other operators
					- To be updated if approved for publishing
 
				
					SS7 security
					- SS7 is no longer secured.
- It is necessary to separate their home SS7 portion from the global network and provide adequate protection.
- It is necessary to perform border control to block illegitimate SS7 messages to penetrate the network.
 
				
					Detection methods and challenges
						- Category 1
                  					- Simple filter can be used to identify and block them to prevent attacks.
 
- Category 2	
                  					- More advanced filters using the correlation between roaming users and their home operators can be employed to block unwanted messages.
- Unfortunately, such filtering will not be able to protect roaming users.
 
- Category 3
                  					- No usable filter to detect attacks because complex correlations with further information on the current user state e.g. last cell ID. 
- Indeed the signatures for attacks using category 3 messages can hardly be determined.
 
 
				
					  Agenda
					  			            -  SS7 security
                  				  	  - State of the art
-  Challenges in detection
 
- Testing environment
                  			        	-  SS7 attack simulator: A demo 
-  Big data platform 
-  Test results with machine learning. 
 
- Challenges and ways forward
 
				
					Testing environment: Purposes
						-  Simulate SS7 attacks 
-  Test machine learning for detection 
 
				
					
Testing environment: SS7 stack simulator 
                  		        
				
					
Testing environment: SS7 attack simulator
                  		        
				
					SS7 attack simulator: Different simulated attacks
						- Location tracking by sending ATI message.
- Location tracking by sending PSI message.
- Intercepting SMS.
 
				
					
SS7 attack simulator: Simulated nodes
                  		        
				
					
SS7 attack simulator: Flow chart
                  		        
				
					SS7 attack simulator: A scenario
					- 10 subcribers including a VIP user.
- The VIP user is attacked by Intercept SMS.
 
				
					
SS7 attack simulator: A demo
	        		 
				
					
Location tracking ATI attack
					
				
					
Location tracking PSI attack
					
				
					
Big data platform to support SS7 attack detection
				
				
					
How machine learning can help
	        		 
				
					
SMS intercepting attack: Faking a subcriber and updating a false location. 
					
				
					
SMS intercepting attack: Receiving all SMS set to the subcriber. 
					
				
					
Test results: K-mean clustering of user behavior
					
				
					
Test results: Anomaly detection of user behavior
					
				
					  Agenda
					  			            - SS7 security
                  				  	   - State of the art
- Challenges in detection
 
- Testing environment
                  			        	 - SS7 attack simulator: A demo 
- Big data platform 
- Test results with machine learning.
 
- Challenges and ways forward
 
				
					Challenges and ways forward
					- Still ongoing activity to develop and simulate more attacks in the testing environment.
- Develop a SS7 data collection and a scanning tool for SS7 vulnerabilities. 
- Develop real-time machine learning-based toolbox for SS7 attack detection. 
- We need real data and real cases for research and development. 
 
				 
		
				  
					SS7 security
					The potential of machine learning
					    
					
						Do Van Thanh, Hai Nguyen and Kristoffer Jensen
					
					
						Momchil Nikolov and Karl Walter Høye