Главная
Study mode:
on
1
Speaker Bio
2
Overview
3
Mobile Network Architecture
4
Recap - Telco Attacks
5
Our Focus - Network Automation
6
Self Organized Network (SON)
7
SON Operation in Practice
8
SON Technical Features
9
SON Operation Modes
10
SON Design Issue
11
Key Question
12
LTE PCI Optimization
13
Automatic Neighbor Relation (ANR)
14
LTE Handover
15
Handover Analysis
16
Rogue Data Injection
17
Vulnerable Mobile Network Functions
18
Rogue eNodeB
19
Exploiting X2 signaling
20
Å - Remotely Kill & Restart LTE Base Station
21
Handover Hijacking (Dropping Calls)
22
Impact of Handover Hijacking
23
Impact - Grand Scale
24
Affected Products
25
Vulnerability Status
26
Solutions
27
Takeaways
Description:
Explore the vulnerabilities in LTE network automation and Self Organized Network (SON) technology in this 50-minute conference talk from HITB GSEC 2018. Delve into the potential security risks associated with automated LTE networks, including methods for remote disruption using low-cost tools. Learn about the speakers' research methodology for evaluating attacks in operational LTE networks, and gain insights into countermeasures for both mobile end-users and network operators. Discover how attackers can exploit features like PCI optimization, Automatic Neighbor Relation (ANR), and handover processes to compromise network security. Understand the impact of these vulnerabilities on a grand scale and the affected products. Gain valuable takeaways on securing next-generation mobile networks and protecting against potential threats in automated LTE systems.

Exploiting Automation in LTE Mobile Networks

Hack In The Box Security Conference
Add to list