Powered by OpenAIRE graph
Found an issue? Give us feedback
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/ Norwegian Open Resea...arrow_drop_down
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
versions View all 1 versions
addClaim

Improving SS7 Security Using Machine Learning Techniques

Authors: Jensen, Kristoffer;

Improving SS7 Security Using Machine Learning Techniques

Abstract

The Signaling System No. 7 is the nervous system of telecommunication networks based on 2G and 3G technologies. Previously confined in a walled garden, SS7 has become more exposed due to increased liberalization of the market in conjunction with the industry switching to IP technology. In the walled garden of trusted operators, security have received minimal attention. SS7 has become more vulnerable in the recent years, with attackers exploiting network communications to track subscribers, intercept calls, perform denial of services, and commit fraud. This master thesis is a part of the effort to reduce the vulnerabilities contained in the old, yet crucial protocols that the telecommunication operators cannot function without. Subscribers, operators, and national governments are dependent on one of societies critical infrastructures, it needs to be adequately protected. In this thesis, a detailed overview of SS7 threats and vulnerabilities is presented. In an effort to mitigate these attacks, open source technology has been used to simulate network traffic. This generated traffic were used to analyse and detect attacks against SS7 in an effort to propose detection mechanisms. Machine learning, big data, and anomaly detection techniques have been used as tools in order to propose an improved online protection system for SS7 networks. The results achieved in this master’s thesis have been submitted in the form of a paper to the International Conference on IT Convergence and Security 2016, Appendix A presents the submitted paper in its current form.

Keywords

IT, Signaling System, Telecommunication, 3G, SS7, 2G, The Signaling System No. 7

  • BIP!
    Impact byBIP!
    selected citations
    These citations are derived from selected sources.
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    0
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Average
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Average
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Average
Powered by OpenAIRE graph
Found an issue? Give us feedback
selected citations
These citations are derived from selected sources.
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
0
Average
Average
Average
Green