Affiliation:
1. Luxembourg Institute of Science and Technology, L-4362 Esch-sur-Alzette, Luxembourg
2. Cyberforce Department, Entreprise des Postes et Télécommunications, L-1616 Luxembourg, Luxembourg
Abstract
Signalling protocols are responsible for fundamental tasks such as initiating and terminating communication and identifying the state of the communication in telecommunication core networks. Signalling System No. 7 (SS7), Diameter, and GPRS Tunneling Protocol (GTP) are the main protocols used in 2G to 4G, while 5G uses standard Internet protocols for its signalling. Despite their distinct features, and especially their security guarantees, they are most vulnerable to attacks in roaming scenarios: the attacks that target the location update function call for subscribers who are located in a visiting network. The literature tells us that rule-based detection mechanisms are ineffective against such attacks, while the hope lies in deep learning (DL)-based solutions. In this paper, we provide a large-scale empirical study of state-of-the-art DL models, including eight supervised and five semi-supervised, to detect attacks in the roaming scenario. Our experiments use a real-world dataset and a simulated dataset for SS7, and they can be straightforwardly carried out for other signalling protocols upon the availability of corresponding datasets. The results show that semi-supervised DL models generally outperform supervised ones since they leverage both labeled and unlabeled data for training. Nevertheless, the ensemble-based supervised model NODE outperforms others in its category and some in the semi-supervised category. Among all, the semi-supervised model PReNet performs the best regarding the Recall and F1 metrics when all unlabeled data are used for training, and it is also the most stable one. Our experiment also shows that the performances of different semi-supervised models could differ a lot regarding the size of used unlabeled data in training.
Funder
Luxembourg Ministry of the Economy
Reference38 articles.
1. A systematic analysis of 5G networks with a focus on 5G core security;Tang;IEEE Access,2022
2. ENISA (2023, September 11). Signalling Security in Telecom SS7/Diameter/5G. Available online: https://www.enisa.europa.eu/publications/signalling-security-in-telecom-ss7-diameter-5g.
3. Metzler, J. (2023, September 11). Security Implications of 5G Networks. Available online: https://cltc.berkeley.edu/wp-content/uploads/2020/09/Security_Implications_5G.pdf.
4. 5G core network security issues and attack classification from network protocol perspective;Kim;J. Internet Serv. Inf. Secur.,2020
5. SS7 vulnerabilities—A survey and implementation of machine learning vs. rule based filtering for detection of SS7 network attacks;Ullah;IEEE Commun. Surv. Tutor.,2020