Home
/
Blog
/

RMLL / LSM 2013: Opening up mobile and telecommunications networks

Telecom networks differ from IP networks due to high availability, legacy support, complex addressing. New tools needed for analysis and visualization.

Research
Jul 11, 2013
RMLL / LSM 2013: Opening up mobile and telecommunications networks

As part of our effort to further the knowledge on telecommunications technologies in the open source and security community we have presented an introduction into mobile and telecom networks and

From walled garden to open and reviewed security

Telecommunication networks differ from IP networks in several important aspects. First, telecom networks have to provide the infrastructure ensuring high-availability, high throughput as well as resilience for a wide range of services. Second, telecom networks must offer support for legacy network elements and services as old as 40 years, requiring a multitude of protocols for backward compatibility and interoperability.

Third, telecom networks support multiple addressing schemes making analysis and mapping more difficult than IP networks. The Internet is based in essence on a comparably small set of basic protocols that offer all the needed capabilities for higher layer services. The existing tools designed for the analysis of IP based networks offer little support for telecom networks and hence necessitate the development of dedicated tools. Here we present the techniques and tools that we have developed in order to better understand telecom networks.

These tools allow us to scan, communicate on and visualize telecom networks. SCTPscan allows us to reliably and efficiently scan hosts for open SCTP ports which are possible entry points to the SS7 network. pysctp is a python library providing a simple API to the SCTP protocol, which is the basis for communicating on telecom networks. Finally, we demonstrate the capabilities of our toolset by analysing a typical telecom network and highlighting the aforementioned properties of such networks.

network_arch
The network architecture of a typical mobile network operator. Telecom networks are powered by a large number of different technologies.
network_analysis
A passive network scan showing the different network elements (nodes) and the communication (edges) between them. The edge width is drawn proportional to the number of exchanged messages in the recorded period of time. (global titles have been anonymized)

We have recently presented this topic at the Libre Software Meeting, Security Track 2013.

Summary
Download our whitepaper

LTE Pwnage: Hacking HLR/HSS and MME Core Network Elements

By clicking download you confirm that you accept our terms and conditions.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Be informed

SS7 Attacker Heaven turns into Riot: How to make Nation-State and Intelligence Attackers’ lives much harder on mobile networks

By clicking download you confirm that you accept our terms and conditions.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Towards Harmonization: Mapping EU Telecom Security Regulations and their evolution

By clicking download you confirm that you accept our terms and conditions.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.