An Empirical Study of Deep Learning-Based SS7 Attack Detection

Author:

Guo Yuejun1ORCID,Ermis Orhan1ORCID,Tang Qiang1ORCID,Trang Hoang2,De Oliveira Alexandre2

Affiliation:

1. Luxembourg Institute of Science and Technology, L-4362 Esch-sur-Alzette, Luxembourg

2. Cyberforce Department, Entreprise des Postes et Télécommunications, L-1616 Luxembourg, Luxembourg

Abstract

Signalling protocols are responsible for fundamental tasks such as initiating and terminating communication and identifying the state of the communication in telecommunication core networks. Signalling System No. 7 (SS7), Diameter, and GPRS Tunneling Protocol (GTP) are the main protocols used in 2G to 4G, while 5G uses standard Internet protocols for its signalling. Despite their distinct features, and especially their security guarantees, they are most vulnerable to attacks in roaming scenarios: the attacks that target the location update function call for subscribers who are located in a visiting network. The literature tells us that rule-based detection mechanisms are ineffective against such attacks, while the hope lies in deep learning (DL)-based solutions. In this paper, we provide a large-scale empirical study of state-of-the-art DL models, including eight supervised and five semi-supervised, to detect attacks in the roaming scenario. Our experiments use a real-world dataset and a simulated dataset for SS7, and they can be straightforwardly carried out for other signalling protocols upon the availability of corresponding datasets. The results show that semi-supervised DL models generally outperform supervised ones since they leverage both labeled and unlabeled data for training. Nevertheless, the ensemble-based supervised model NODE outperforms others in its category and some in the semi-supervised category. Among all, the semi-supervised model PReNet performs the best regarding the Recall and F1 metrics when all unlabeled data are used for training, and it is also the most stable one. Our experiment also shows that the performances of different semi-supervised models could differ a lot regarding the size of used unlabeled data in training.

Funder

Luxembourg Ministry of the Economy

Publisher

MDPI AG

Subject

Information Systems

Reference38 articles.

1. A systematic analysis of 5G networks with a focus on 5G core security;Tang;IEEE Access,2022

2. ENISA (2023, September 11). Signalling Security in Telecom SS7/Diameter/5G. Available online: https://www.enisa.europa.eu/publications/signalling-security-in-telecom-ss7-diameter-5g.

3. Metzler, J. (2023, September 11). Security Implications of 5G Networks. Available online: https://cltc.berkeley.edu/wp-content/uploads/2020/09/Security_Implications_5G.pdf.

4. 5G core network security issues and attack classification from network protocol perspective;Kim;J. Internet Serv. Inf. Secur.,2020

5. SS7 vulnerabilities—A survey and implementation of machine learning vs. rule based filtering for detection of SS7 network attacks;Ullah;IEEE Commun. Surv. Tutor.,2020

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3