Главная
Study mode:
on
1
Intro
2
Actual stack of technologies
3
TIDS global coverage
4
Diameter Monitoring - Actual setup
5
TIDS - Telecom IDS Diameter
6
Why building it
7
Monitored issues
8
IDR - Location tracking
9
Passively fingerprint vendors
10
Session-id vendor patterns
11
S6a Reset - Upgrade in progress
12
Spoofing - Topology hidding
13
Monitoring traffic rerouting
14
Behavior Analytics - Call SPAM
15
Advanced Data Analytics on Telecom Data
16
Regulation, data, and beyond
17
Predicting the present to detect anomalies
18
Clustering data to detect outliers
19
Questions?
Description:
Explore a comprehensive framework for detecting threats in telecommunication networks in this 25-minute conference talk from Hack.lu 2017. Dive into the TIDS (Telecom IDS) monitoring system developed by POST Luxembourg to protect critical telecom infrastructure from abuses, DoS attacks, and security issues affecting subscribers. Learn about the framework's two main components: a data collector for live signaling data and an analytics app utilizing statistical and machine-learning methods. Discover how TIDS addresses vulnerabilities in telecom networks, including location tracking, spoofing, and interception. Gain insights into the actual technology stack, Diameter monitoring setup, and advanced data analytics techniques used for detecting anomalies and predicting threats. Understand the importance of regulation and data in telecom security, and explore methods for passively fingerprinting vendors and monitoring traffic rerouting.

TIDS - A Framework for Detecting Threats in Telecom Networks

Cooper
Add to list