2020
DOI: 10.1109/comst.2020.2971757
|View full text |Cite
|
Sign up to set email alerts
|

SS7 Vulnerabilities—A Survey and Implementation of Machine Learning vs Rule Based Filtering for Detection of SS7 Network Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
60
0
1

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 179 publications
(62 citation statements)
references
References 46 publications
1
60
0
1
Order By: Relevance
“…While TRM has been investigated in access networks, it has not been well investigated in core networks. This is because core networks are traditionally closed trusted networks established by national or multinational corporations on the basis of trust among network operators [44]. Since the core networks are accessed by a few trusted network operators only, security measures are not incorporated in some core networks (e.g., SS7 core networks [44]).…”
Section: Which Part Of the 5g Network Uses Trm In Lower Layers?mentioning
confidence: 99%
See 2 more Smart Citations
“…While TRM has been investigated in access networks, it has not been well investigated in core networks. This is because core networks are traditionally closed trusted networks established by national or multinational corporations on the basis of trust among network operators [44]. Since the core networks are accessed by a few trusted network operators only, security measures are not incorporated in some core networks (e.g., SS7 core networks [44]).…”
Section: Which Part Of the 5g Network Uses Trm In Lower Layers?mentioning
confidence: 99%
“…This is because core networks are traditionally closed trusted networks established by national or multinational corporations on the basis of trust among network operators [44]. Since the core networks are accessed by a few trusted network operators only, security measures are not incorporated in some core networks (e.g., SS7 core networks [44]). Moreover, core networks can reject packets from malicious entities in the access networks [51].…”
Section: Which Part Of the 5g Network Uses Trm In Lower Layers?mentioning
confidence: 99%
See 1 more Smart Citation
“…The existing intrusion detection methods mainly use K-means clustering, decision trees, random forest, ANN, and generic rule-based filtering algorithm. The feature sets used by these methods are; distance travelled since the previous location, location update frequency, elapsed time since the previous location update message request, network the message originates from, and message request size [7][8][9]. Although, rule-based filtering algorithms outperform other machine learning algorithms mentioned above in terms of better accuracy and detection rate with decreased false alarm rates.…”
Section: Introductionmentioning
confidence: 99%
“…Intrusion Detection Systems (IDSes) play a critical role in the security of networked systems by monitoring and detecting malicious attacks against systems [3]. Machine Learning (ML) algorithms can assists an IDS to continuously learn and adapt to changes based on known attacks and to improve detection accuracy [9,10,13,19]. However, despite the benefits offered by the ML approaches, attackers with knowledge about the type of the model or the working/design of the system, can exploit weaknesses in the algorithm and evade the defense mechanism put in place.…”
Section: A Framework For Generating Evasion Attacks For Machine Learning Based Network Intrusion Detection Systems 1 Introductionmentioning
confidence: 99%