A SURVEY ON THREATS, VULNERABILITIES AND SECURITY
SOLUTIONS FOR CELLULAR NETWORK 文章里提到

4GSystem (LTE) Security
Modern LTE cellular networks provide advanced services for billions of users, which exceed
traditional voice and short messaging traffic. The coming attack in LTE is Distributed Denial of
Service (DDoS) attacks. The availability of communication systems, explains the importance of
strengthening the flexibility of mobility networks against Denial of Service (DoS) and DDoS threats
to ensure the LTE network availability against security attacks.
Examples of threats are spam over VoIP, spoofing and misdirection, SIP registration hijacking and
interception and cryptanalysis of IP traffic

There are interfaces in the LTE system which are exposed to different attacks such as Radio access
network, Core evolved packet system (EPC) and Packet data network (PDN). DoS and DDoS
attacks in LTE mobility networks can be classified based on the traffic load maliciously generated
into one single attacker or low traffic volume (DoS) and a large set of multiple simultaneous
attackers or high traffic volume (DDoS).
Denial of Service attacks (DoS)
Radio jamming is the intended transmission of radio signals which disrupt communications by
decreasing the signal to noise ratio. The way of blocking an attack is to locate and stop the jamming
device where that the large amount of power required reduces the effectiveness of the attack.——无线电干扰设备!!!是Dos恶意攻击的源头之一。

Smart jamming consists of attacks that aim to locally disrupt the communications of an LTE
network without sending alerts. It can be implemented by saturating one or more of the important
control channels which required by all mobile devices to access the spectrum(仅仅控制某些重要信道来发起攻击). Saturation of these
channels causes the network unresponsive. In addition to, this attack requires low transmitted power
and requires no authentication, detection and reduction. This type of attack can be started against
essential control channels in both the downlink and the uplink. This attack concentrates on the much
narrower control channels instead of saturating the entire channel and so it consumes less power.
Classic computer vulnerabilities that cellular equipment and the software running on mobile
networks are the same as any other computer system, so it can be affected by the same
vulnerabilities. [21]
Distributed Denial of Service attacks (DDoS)
Botnet of mobile devices——当然僵尸网络设备也是导致Dos的一个可能因素: a smartphone botnet presents a new and very powerful attack vector
against mobility networks. So, a new set of DDoS attacks is affected when large volumes of traffic
and signaling messages can be generated from within the network.
Signaling amplification attacks: A botnet of infected mobile devices can be used to generate a
signaling amplification attack by forcing each terminal to continually establish and release IP
connections to an external server. Such saturation of the EPC could occur legitimately due to the
large amount of traffic.
HSS saturation: The HSS is a key node of the EPC which stores information(攻击HSS节点) for every subscriber in
the network. The stored parameters per user or the phone number, international mobile subscriber
identity (IMSI), billing and account information, cryptographic primitives, keys which perform
authentication of subscribers and the last known location of the user. A DDoS attack against this
node could prevent the network from being operated.
DDoS against external nodes/networks: The attacks are generated from a number of servers which
are remotely controlled by an attacker and have been able to inject large traffic loads into the
network. The high volume of traffic aimed at a specific target during a DDoS attack which could
generate at a botnet of mobile phones, so it could impact the performance of the mobile network.
[21]

3G WCDMA Mobile Network DoS Attack and Detection Technology 这个文章里

说的是使用GTP echo消息来发起DoS攻击

also released a DoS attack on the 3G
mobile network, using the GTP Echo scan message [9][10].

当然,也可以发送其他信令

A.GTP-in-GTP based DoS Attack 第一种方式使用GTP消息(信令???应该不是)

If the GTP-C message for 3G WCDMA mobile network
control, such as IP address allocation for the 3G mobile
network, sends the GGSN’s IP address to the destination via the
terminal, the IP address resource can be allocated abnormally.
This type of GTP-in-GTP packet processing vulnerability can
be exploited in most GGSNs installed in the domestic
commercial service environment, and the P-GATEWAT
equipment in the 4G LTE network that performs a similar
function to the 3G network’s GGSN as well.
If the terminal creates many “GTP-C Create PDP Context”
messages and sends them to the GGSN’s IP address, the TEID
and IP address of the GGSN are allocated abnormally.
Likewise, a DoS attack can be launched against normal users
that use the 3G mobile Internet service, if the TEID and IP
address of the GGSN are exhausted by exploiting the GGSN’s
GTP-in-GTP packet processing vulnerability.

google翻译就是:

如果GTP-C消息为3G WCDMA移动网络
控制,如3G手机的IP地址分配
网络,通过发送GGSN的IP地址到目的地
终端,IP地址资源可以异常分配。
这种类型的GTP-in-GTP数据包处理漏洞可以
在国内安装的大多数GGSN中被利用
商业服务环境和P-GATEWAT
执行类似的4G LTE网络中的设备
也适用于3G网络的GGSN。
如果终端创建了许多“GTP-C创建PDP上下文”
消息并将它们发送到GGSN的IP地址TEID
GGSN的IP地址异常分配。
同样,可以针对普通用户启动DoS攻击
使用3G移动互联网服务,如果是TEID和IP
通过利用GGSN,GGSN的地址已经耗尽
GTP-in-GTP数据包处理漏洞。

看原文的图就知道确实可能。

B. Signaling DoS Attack
The 3G mobile network releases the allocated wireless
resource, if the mobile terminal doesn’t transmit the data for a
certain period of time, in order to use the limited wireless
resource efficiently. By taking advantage of this architecture, a
DoS attack that causes RNC and SGSN overload using multiple
signaling messages can be launched.
The signal message can be created by maliciously and
abnormally repeating wireless resource re-allocation right after
resource release [5].

这里说的就应该RRC导致的信令风暴。

As shown in Fig.3, if the active terminal doesn’t establish the
data communication for a certain period of time, a wireless
resource release request message will be sent to the SGSN to
switch to the dormant mode. In addition, if the terminal in a
dormant mode transmits the data, the terminal can be switched
to an active mode again by sending a wireless resource
allocation message to the SGSN. Using this mode switching
method, the 3G mobile network manages the limited wireless
resource efficiently. When the wireless resource is maliciously
and abnormally allocated/released, small traffic is sent at a
particular interval to switch the dormant mode of the terminal
to the active mode, and many signaling messages are created,
which results in a DoS attack by causing overload on the RNC
and SGSN.

说的就是3G状态切换导致的信令风暴。不进行数据传输。

转载于:https://www.cnblogs.com/bonelee/p/9528881.html

信令风暴问题根因分析相关推荐

  1. 无线基站侧的信令风暴根因——频繁的释放和连接RRC产生大量信令、设备移动导致小区重选信令增加、寻呼信令多...

    全局思维(核心网和无线基站侧都会有信令风暴): LTE网络系统可能出现信令风暴的原因,大致可以总结出以下几点: 1.网络架构的变化,导致4G核心网信令流量较2G/3G大幅增加 a)架构扁平化:LTE网 ...

  2. 5G信令(就是用户身份信息)风暴——就是客户端通过公钥加密的消息(携带手机IMSI号)发给服务端,服务器需用私钥解密,这个解密比较消耗资源,如果短时间大量请求到来就会触发信令风暴...

    信令:手机开机后,先从USIM中读取之前运营商分配的临时身份信息GUTI/TMSI,发送携带该身份信息的信令给基站,请求接入运营商网络. 如果每个设备的每条消息都需要单独认证,则网络侧安全信令的验证需 ...

  3. 【华为云技术分享】根因分析

    1.  什么是根因分析 在工作中我们经常会遇到根因分析的提法,有时也称作根原因分析或简称RCA(Root Cause Analysis),那什么是根因分析呢?目前还没有一个公认的定义,一般都是从操作层 ...

  4. 《根原因分析·简化的工具和技术》读书笔记

    第二章 根原因分析的定义  根原因分析是一种结构化的调查活动,其目的是识别问题的真正原因和消除它所必需的措施. 第三章 问题理解的工具 3.1 流程图 用于梳理过程,展示问题发生的地方 常用流程图如: ...

  5. 根因分析初探:一种报警聚类算法在业务系统的落地实施

    背景 众所周知,日志是记录应用程序运行状态的一种重要工具,在业务服务中,日志更是十分重要.通常情况下,日志主要是记录关键执行点.程序执行错误时的现场信息等.系统出现故障时,运维人员一般先查看错误日志, ...

  6. 信令风暴研究现状总结

    Signalling Storms in 3G Mobile Networks--使用HMM模型,参数: the key parameters of mobile user device behavi ...

  7. P6 根轨迹分析法-《Matlab/Simulink与控制系统仿真》程序指令总结

    上一篇 回到目录 下一篇 <Matlab/Simulink与控制系统仿真>程序指令总结 Matlab_Simulink_BookExample 6. 根轨迹分析法 6.1 函数 6.2 根 ...

  8. 【控制】根轨迹分析及绘制

    根轨迹分析及绘制 1. 根轨迹定义 2. 根轨迹绘制规则 3. 根轨迹性质 From: 自动控制原理(西北工业大学 卢京潮)-P25

  9. 根因分析初探:一种报警聚类算法在业务系统的落地实施 1

    背景 众所周知,日志是记录应用程序运行状态的一种重要工具,在业务服务中,日志更是十分重要.通常情况下,日志主要是记录关键执行点.程序执行错误时的现场信息等.系统出现故障时,运维人员一般先查看错误日志, ...

最新文章

  1. windows下编译openssl
  2. *CI框架装载器Loader.php源码分析
  3. 用java智能锁远程,从生产者-消费者模型了解线程、同步、锁(java)
  4. String.prototype.substr()
  5. Android中http断点下载,Android HttpURLConnection断点下载(单线程)
  6. golang开发环境配置及Beego框架安装
  7. kettle分批处理大表数据_采用Kettle分页处理大数据量抽取任务
  8. 【“互联网+”大赛华为云赛道】CloudIDE命题攻略:明确业务场景,快速开发插件
  9. 深入理解Angular2变化监测和ngZone
  10. 一款基于ijkplayer框架的音乐播放器(已开源)
  11. mysql备份工具命令xtra_mysql xtrabackup备份工具使用
  12. 三维点云数据处理软件供技术原理说明_三维点云处理软件需求说明
  13. SoapUI接口测试-基本操作
  14. 合成分红游戏源码_趣合成app开发(现成源码演示案例)
  15. ie浏览器html播放器,ie浏览器播放不了网页视频
  16. java实现pdf旋转_Java实现PDF文本旋转倾斜的方法
  17. java对象为什么要实现序列化
  18. ForkJoinPool的使用及基本原理
  19. 天勤python_天勤量化策略库:网格交易策略(难度:中级)
  20. 每周推荐阅读第一季结束

热门文章

  1. Java常用的设计模式总结
  2. matlab 林智仁,机器学习:林智仁libsvm 工具箱 在matlab下的应用总结
  3. mysql源码如何解析where字句_MySQL解析器源码分析--对select语句中子查询处理逻辑的分析(一)...
  4. 单元格格式_你最想要的自定义单元格格式来了!
  5. springboot的jsp应该放在哪_详解SpringBoot 添加对JSP的支持(附常见坑点)
  6. sqlu8多阶级层次bom_男性比女性多3164万:性别比例失衡,为何还有那么多剩女?...
  7. 计算机应用基础课程建设规划,计算机应用基础课程建设方案(6页)-原创力文档...
  8. java导入自定义类_导入自定义Java类
  9. linux下查找某个文件位置的方法
  10. 【深度学习】图像输入网络必要的处理流程