Figure 1� Workflow: SS7 networks security analysis
HLR
VLR
MSC
GwSTP
PT Telecom Vulnerability Scanner
External SS7 network
VULNERABILITIES IN SS7 NETWORKS
Materials and methods
Every year, Positive Technologies experts analyze the security of SS7
signaling net-
works� During analysis, they simulate the actions of a potential intruder supposedly
attacking from a foreign or home network� The intruder can send application layer
protocol requests that lead to the realization of different
threats against the opera-
tor and its subscribers if the operator does not take adequate protection measures�
For malware host emulation, PT Telecom Vulnerability Scanner is used�
We selected 24 most informative projects in 2016 and 2017, during which maximum
security tests were performed� A comparative study includes data obtained during
an analysis we performed in 2015�
Dostları ilə paylaş: