New Attack Vectors for Mobile Core Networks
New Attack Vectors for Mobile Core Networks
Silke Holtmanns
published in Magdeburger Journal zur Sicherheitsforschung (2019, #18, p. 943-951)
Mobile network operators connect towards each other through the private interconnection network (IPX). This closed private network enables international calls, data, messages and many other services across network and country borders. It connects billions of users and Internet of Things devices. In the last years, evidence arose that the network has been misused for various kind of attacks. We will introduce the foundations of the interconnection network, give the security background. Outline existing attacks and describe a new charging attack. Various activities are ongoing to improve the security of the IPX network, which we will describe. We close with an overview of potential risk areas for 5G core networks.
BibTeX-Entry für mjs:Holtmanns:MobileCoreNetworks
1@article{mjs:Holtmanns:MobileCoreNetworks,
2 year = {2019},
3 author = {Silke Holtmanns},
4 title = {New Attack Vectors for Mobile Core Networks},
5 journaltitle = {Magdeburger Journal zur Sicherheitsforschung},
6 pages = {943-951},
7 issn = {2192-4260},
8 url = {https://d-nb.info/1202697631/34},
9 codeberg = {https://codeberg.org/0xKaishakunin/Publikationen/src/branch/main/MagdeburgerJournalSicherheitsforschung/MJS_064_Holtmanns_MobileCoreNetworks.pdf},
10 language = {EN},
11 issue = {2},
12 volume = {18},
13 urldate = {2019-08-05},
14 keywords = {mjsarticle ,ds19,editor,ipx, ss7, interconnection, diameter, charging, 4g, 5g mobile network},
15 abstract = {Mobile network operators connect towards each other through the private interconnection network (IPX). This closed private network enables international calls, data, messages and many other services across network and country borders. It connects billions of users and Internet of Things devices. In the last years, evidence arose that the network has been misused for various kind of attacks. We will introduce the foundations of the interconnection network, give the security background. Outline existing attacks and describe a new charging attack. Various activities are ongoing to improve the security of the IPX network, which we will describe. We close with an overview of potential risk areas for 5G core networks.},
16}
AsciiDoc citation commands
1. citenp:[mjs:Holtmanns:MobileCoreNetworks]
2. cite:[mjs:Holtmanns:MobileCoreNetworks]
3. bibitem[mjs:Holtmanns:MobileCoreNetworks]
LaTeX citation commands
1. \textcite{mjs:Holtmanns:MobileCoreNetworks}
2. \parencite{mjs:Holtmanns:MobileCoreNetworks}
3. \cite{mjs:Holtmanns:MobileCoreNetworks}
generated at Mon May 12 10:48:34 2025