| |
| |
| |
Introduction | |
| |
| |
| |
Telecommunications Networks | |
| |
| |
| |
Network Convergence and Security | |
| |
| |
| |
Outline of this Book | |
| |
| |
| |
Audience | |
| |
| |
| |
Other Sources of Information | |
| |
| |
| |
Network Architecture | |
| |
| |
| |
Security | |
| |
| |
| |
Overview | |
| |
| |
| |
What is security? | |
| |
| |
| |
Basic Terminology | |
| |
| |
| |
Attacks | |
| |
| |
| |
Trust | |
| |
| |
| |
Services and Tools | |
| |
| |
| |
Cryptography | |
| |
| |
| |
Authentication and Authorization | |
| |
| |
| |
Certificates and PKI | |
| |
| |
| |
Network Security | |
| |
| |
| |
IPsec | |
| |
| |
| |
SSL/TLS | |
| |
| |
| |
Firewalls | |
| |
| |
| |
Intrusion and Anomaly Detection | |
| |
| |
| |
Summary | |
| |
| |
| |
Cellular Architecture | |
| |
| |
| |
History of Cellular Telephony | |
| |
| |
| |
Cellular Voice Networks | |
| |
| |
| |
Voice Network Elements | |
| |
| |
| |
Home Location Register | |
| |
| |
| |
Mobile Switching Center/Visiting Location Register | |
| |
| |
| |
Base Station Subsystem | |
| |
| |
| |
Cellular Data Networks | |
| |
| |
| |
Data Network Elements | |
| |
| |
| |
Gateway GPRS Support Node | |
| |
| |
| |
Serving GPRS Support Node | |
| |
| |
| |
Signaling Network and Protocols | |
| |
| |
| |
Common Channel Signaling Network | |
| |
| |
| |
Message Transfer Part | |
| |
| |
| |
Signaling Connection Control Part | |
| |
| |
| |
Transaction Capabilities Application Part | |
| |
| |
| |
Mobile Application Part | |
| |
| |
| |
ISDN User Part | |
| |
| |
| |
Wireless Network | |
| |
| |
| |
Wireless Access Techniques | |
| |
| |
| |
Frequency Issues | |
| |
| |
| |
Voice Encoding | |
| |
| |
| |
Summary of Procedures | |
| |
| |
| |
Registration and Call Setup Procedures | |
| |
| |
| |
Core Network Security | |
| |
| |
| |
Air Interface Security | |
| |
| |
| |
Summary | |
| |
| |
| |
Vulnerability Analysis | |
| |
| |
| |
Vulnerabilities in the Telephony | |
| |
| |
| |
Weak Cryptographic Algorithms | |
| |
| |
| |
Vulnerabilities in the Network Core | |
| |
| |
| |
Wireless Eavesdropping | |
| |
| |
| |
Jamming | |
| |
| |
| |
Use Tracking and Privacy | |
| |
| |
| |
Overload | |
| |
| |
| |
Malware | |
| |
| |
| |
Vulnerabilities in the Short Messaging Service (SMS) | |
| |
| |
| |
History and Description | |
| |
| |
| |
Delivering Messages | |
| |
| |
| |
Submitting a Message | |
| |
| |
| |
Routing a Message | |
| |
| |
| |
Wireless Delivery | |
| |
| |
| |
Identifying System Bottlenecks | |
| |
| |
| |
Queue Management | |
| |
| |
| |
Message Injection | |
| |
| |
| |
Efficient Device Targeting | |
| |
| |
| |
NPA/NXX | |
| |
| |
| |
Web Scraping | |
| |
| |
| |
Testing Phone "Liveness" | |
| |
| |
| |
Additional Collection Methods | |
| |
| |
| |
Modeling Denial of Service | |
| |
| |
| |
Attacking Individuals | |
| |
| |
| |
Metropolitan Area Service | |
| |
| |
| |
Regional Service | |
| |
| |
| |
Network Characterization | |
| |
| |
| |
Attack Characterization | |
| |
| |
| |
Current Solutions | |
| |
| |
| |
Queue Management | |
| |
| |
| |
Weighted Fair Queuing | |
| |
| |
| |
Weighted Random Early Detection | |
| |
| |
| |
Summary | |
| |
| |
| |
Resource Provisioning | |
| |
| |
| |
Strict Resource Provisioning | |
| |
| |
| |
Dynamic Resource Provisioning | |
| |
| |
| |
Direct Channel Allocation | |
| |
| |
| |
Summary | |
| |
| |
| |
Combining Mechanisms | |
| |
| |
| |
Summary | |
| |
| |
| |
Vulnerabilities in Cellular Data Networks | |
| |
| |
| |
History and Description | |
| |
| |
| |
Delivering Packets from the Internet | |
| |
| |
| |
Device Registration | |
| |
| |
| |
Submitting Packets | |
| |
| |
| |
Routing Packets | |
| |
| |
| |
Wireless Delivery | |
| |
| |
| |
Packet Multiplexing | |
| |
| |
| |
Exploiting Cellular Data Services | |
| |
| |
| |
Determining Network Settings | |
| |
| |
| |
Exploiting Teardown Mechanisms | |
| |
| |
| |
Exploiting Setup Mechanisms | |
| |
| |
| |
Conflicts in Network Design | |
| |
| |
| |
Efficient Mitigation of Data Network Vulnerabilities | |
| |
| |
| |
Summary | |
| |
| |
| |
Vulnerabilities in Voice over IP | |
| |
| |
| |
History and Description | |
| |
| |
| |
Session Initiation Protocol | |
| |
| |
| |
Architecture | |
| |
| |
| |
SIP Messages | |
| |
| |
| |
Making Phone Calls | |
| |
| |
| |
IP-Multimedia Subsystem Network | |
| |
| |
| |
IMS Architecture | |
| |
| |
| |
Making Phone Calls | |
| |
| |
| |
IMS Versus Pure Internet Telephony | |
| |
| |
| |
Wireless Issues | |
| |
| |
| |
Security Issues | |
| |
| |
| |
Current Solutions | |
| |
| |
| |
Analysis of Emerging Vulnerabilities | |
| |
| |
| |
Building Secure IP Telephony Networks | |
| |
| |
| |
Summary | |
| |
| |
| |
Future Analyses | |
| |
| |
| |
Future Directions and Challenges | |
| |
| |
| |
Denial of Service Attacks | |
| |
| |
| |
Logical vs Flooding Attacks | |
| |
| |
| |
Problems in "Controlled" Networks | |
| |
| |
| |
End-To-End Arguments and Security | |
| |
| |
| |
The Future of Rigid Systems | |
| |
| |
| |
Moving Forward | |
| |
| |
Glossary | |
| |
| |
References | |
| |
| |
Index | |