Cybersecurity in mobile telecommunication networks and management risk

Authors

  • Miguel Angel Roldan Alvarez Instituto Tecnológico Metropolitano
  • Hector Fernando Vargas Montoya Instituto Tecnológico Metropolitano

DOI:

https://doi.org/10.14482/inde.38.2.006.31

Keywords:

3.5G, 4G, Computer attack, Cybersecurity, Risk management

Abstract

The 3.5G and 4G network technology are currently the most used in Colombia, given the great deployment that Internet service providers have made, which represents a security challenge with respect to the different attacks on these networks. The interception of data with "Man in the middle attacks" (MiTM) and denial of service - DoS (in the smartphone or in the mobile network) are very feasible. In this article of applied research, some risk and security vulnerabilities in mobile networks and their possibility of exploitation, as well as the general recommendations for risk reduction. To achieve the above, an investigation of different vulnerabilities in these telecommunications networks was carried out, a risk map was made, in order to visualize the possible impacts, then, a technical test was run to capture traffic with the MiTM attack (which was successful), and as a final result, deliver recommendations in the event that they can execute cyber-attacks.

References

Ministerio de Tecnologías de la Información y las Comunicaciones. (31 en. 2020). Boletín trimestral de las TIC, enero de 2020 [En línea]. Disponible en: https://colombiatic.mintic.gov.co/679/w3-article-125648.html

Ministerio de Tecnologías de la Información y las Comunicaciones. (24 abr. 2020). Boletín trimestral de las TIC: cifras primer trimestre de 2019 [En línea]. Disponible en: https://colombiatic.mintic.gov.co/679/w3-article-135691.html

Ministerio de Tecnologías de la Información y las Comunicaciones. (5 mzo. 2019). Boletín trimestral de las TIC: cifras tercer trimestre 2018 [En línea]. Disponible en: https://colombiatic.mintic.gov.co/679/w3-article-82350.html

Gartner Group. (26 sep. 2019). Gartner says global device shipments will decline 3.7 % in 2019[En línea]. Disponible en: https://www.gartner.com/en/newsroom/press-releases/2019-09-26-gartner-says-global-device-shipments-will-decline-1-percent-in-2019

ESET. (2019). ESET Security Report América Latina 2019 [En línea]. Disponible en: https://es.readkong.com/page/eset-security-report-latinoamerica-2019-4355431

A. Almanza. XIX Encuesta Nacional de Seguridad Informática. Sistemas, no. 151, pp. 12-41, 2019. https://doi.org/10.29236/sistemas.n151a3

Dinero. (1 en. 2018). Sistemas operativos iOS y Android se volvieron menos confiables en el 2017 [En línea]. Disponible en: https://www.dinero.com/empresas/artículo/ios-y-android-tuvieron-mas-vulnerabilidades-durante-el-2017/253771

J. Domenech. (2 en. 2018). 2017 registró un aumento de las vulnerabilidades en plataformas móviles [En línea]. Disponible en: https://www.silicon.es/2017-registro-aumento-las-vulnerabilidades-plataformas-moviles-2368302?inf_by=5a6a2fb8671db8a70c8b4692

National Vulnerability Database. (2019). Statistics results of android [En línea]. Disponible en: https://nvd.nist.gov/vuln/search/statistics?adv_search=false&form_type=basic&results_type=statistics&search_type=last3years&query=android

Kaspersky Labs. (10 abr. 2013). ¿Qué es un ataque Man-in-the-Middle? [En línea]. Disponible en: https://www.kaspersky.es/blog/que-es-un-ataque-man-in-the-middle/648/

D. Pérez y J. Pico. (2011). A practical attack against GPRS/EDGE/UMTS/HSPA mobile data communi-cations [En línea]. Disponible en: http://www.cic.ipn.mx/~pescamilla/MS/papers_2014/PerezandPico2011.pdf

S. Prowell, R. Kraus y M. Borkin, “Man-in-the-Middle”, en Seven deadliest network attacks, C. Grimes, Ed. Syngress: Elsevier, 2010, pp. 101-120.

M. Conti, N. Dragoni y V. Lesyk, “A survey of man in the middle attacks”, IEEE Journal, vol. 18, no. 3, 2016, pp. 2027-2051. Doi: 10.1109/COMST.2016.2548426

Instituto Nacional de Ciberseguridad. (20 mzo. 2017). Amenaza vs. vulnerabilidad, ¿sabes en qué se diferencian? [En línea]. Disponible en: https://www.incibe.es/protege-tu-empresa/blog/amenaza-vs-vulnerabilidad-sabes-se-diferencian

A. Kumar1, Y. Liu y J. Sengupta. (2010, ag.). Evolution of mobile wireless communication networks-1G to 5G as well as future prospective of next generation communication network. IJECT [En línea]. 1 (1), pp. 68-72. Disponible en: http://chenweixiang.github.io/docs/Evolution_of_Mobile_Wireless_Communication_Networks.pdf

O. Rodríguez, R. Hernández, L. Torno, L. García y R. Rodríguez. (2005, en.-mzo.). Telefonía móvil celular: origen, evolución, perspectivas. Ciencias Holguín [En línea]. 11 (1), pp. 1-8. Disponible en: https://www.redalyc.org/artículo.oa?id=181517913002

National Vulnerability Database. (7 mzo. 2019). CVE-2018-11422 details [En línea]. Disponible en: https://nvd.nist.gov/vuln/detail/CVE-2018-11422

National Vulnerability Database. (7 mzo. 2019). CVE-2018-11421 detail [En línea]. Disponible en: https://nvd.nist.gov/vuln/detail/CVE-2018-11421

National Vulnerability Database. (3 my. 2018). CVE-2018-5455 detail [En línea]. Disponible en: https://nvd.nist.gov/vuln/detail/CVE-2018-5455

National Vulnerability Database. (29 my. 2017). CVE-2017-7913 detail [En línea]. Disponible en: https://nvd.nist.gov/vuln/detail/CVE-2017-7913

A. L. García Reis, A. F. Barros, K. Gusso Lenzi, L. G. Pedroso Meloni y S. E. Barbin, “Introduction to the software-defined radio approach”, IEEE Latin America Transactions, vol. 10, no. 1, pp. 1156-1161, en. 2012. Doi: 10.1109/TLA.2012.6142453

R. Díaz y Y. García. (2017, nov. 10). Desarrollo de un sistema receptor de FM utilizando radio definida por software [En línea]. Disponible en: https://www.academia.edu/download/57598047/Ciencias_economicas-aportaciones_de_las_tecnologias_de_neuroimagen_p._127-129.pdf#page=295

GNU Radio Foundation. (2020). About GNU Radio [En línea]. Disponible en: https://www.gnuradio.org/about/

B. Bhushan, G. Sahoo y A. K. Rai, “Man-in-the-middle attack in wireless and computer networking: a review”, en 2017 3rd International Conference on Advances in Computing, Communication & Automation (ICACCA) (Fall), IEEE, Dehradun, 2017, pp. 1-6. Doi: 10.1109/ICACCAF.2017.8344724

S. Yubo, K. Zhou y X. Chen, “Fake BTS attacks of GSM system on software radio platform”, Journal of Networks, vol. 7, no. 2, 2012. Doi: 10.4304/jnw.7.2.275-281

H. Alrashede y R. A. Shaikh, “IMSI Catcher Detection Method for Cellular Networks”, 2019 2nd International Conference on Computer Applications & Information Security (ICCAIS), IEEE, Riyadh, 2019, pp. 1-6. Doi:10.1109/CAIS.2019.8769507

Kaspersky Labs. (2019). Amenazas de seguridad móvil dirigidas a dispositivos Android [En línea]. Disponible en: https://latam.kaspersky.com/resource-center/threats/mobile

National Vulnerability Database. (12 sep. 2019). CVE-2019 detail [En línea]. Disponible en: https://nvd.nist.gov/vuln/search/results?form_type=Basic&results_type=overview&query=Simjacker&search_type=all

K. Lee, B. Kaiser, J. Mayer y A. Narayanan. (2020). An Empirical study of wireless carrier authentication for SIM Swaps [En línea]. Disponible en: https://www.usenix.org/conference/soups2020/presentation/lee

Portal IsSMS2FASecure.com. (2020). Security analysis of SMS-enabled websites [En línea]. Disponible en: https://www.issms2fasecure.com/dataset

International Organization for Standardization. ISO/IEC 27005:2018 Information technology - Security techniques - Information security risk management. Suiza: International Organization for Standardization, 2018.

Municipio de Viterbo Carlas. (2019). Plan de tratamiento de riesgos de seguridad y privacidad de la información [En línea]. Disponible en: http://www.viterbo-caldas.gov.co/planes/plan-de-tratamiento-de-riesgos-de-seguridad-y-privacidad

National Institute of Standards and Technology. (2012). Guide for Conducting Risk Assessments - NIST 800-30 [En línea]. Disponible en: https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-30r1.pdf

International Organization for Standardization. Norma técnica ISO/IEC 27001:2013, 2.ª ed. Suiza: International Organization for Standardization, 2013.

Unión Internacional de Telecomunicaciones. (2019). X.500: Information technology - Open Systems Interconnection - The Directory: Overview of concepts, models and services [En línea]. Disponible en: https://www.itu.int/rec/T-REC-X.500/e

National Institute of Standards and Technology. (2013). 800-53 Rev 4, Security and Privacy Controls for Federal Information Systems and Organization. [En línea]. Disponible en: https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf

Published

2020-07-03

How to Cite

[1]
M. A. Roldan Alvarez and H. F. Vargas Montoya, “Cybersecurity in mobile telecommunication networks and management risk”, Ing. y Des., vol. 38, no. 2, pp. 279–297, Jul. 2020.