Evaluating security of korean cellular networks한국 이동 통신망 안전성 분석

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 652
  • Download : 0
DC FieldValueLanguage
dc.contributor.advisorKim, Yong-Dae-
dc.contributor.advisor김용대-
dc.contributor.authorKwon, Min-Hee-
dc.contributor.author권민희-
dc.date.accessioned2015-04-29-
dc.date.available2015-04-29-
dc.date.issued2014-
dc.identifier.urihttp://library.kaist.ac.kr/search/detail/view.do?bibCtrlNo=592461&flag=dissertation-
dc.identifier.urihttp://hdl.handle.net/10203/197959-
dc.description학위논문(석사) - 한국과학기술원 : 정보보호대학원, 2014.8, [ iv, 29p ]-
dc.description.abstractSince various mobile applications have been introduced, the use of cellular data networks has been dramatically increased. As a consequence, cellular network carriers have started to face difficult challenges to provide high quality services while protecting their networks and clients. In order to cope with these issues, cellular network carriers have deployed middleboxes in their networks. The middleboxes are network devices which can be used to inspects, filters, and forwards traffics to improve security and overall performance. However, even these middleboxes can be targeted by adversaries, and therefore, if insecure polices are applied on these middleboxes, a lot of attacks could be occur. In this thesis, middleboxes policies of three major cellular carriers in Korea are systematically evaluated. Among various types of middleboxes, we focus on NAT and Firewall as they are keys to improve security. As the experiment results show that two carriers allowed IP spoofing which encounters the overbilling and battery drain attack. Moreover, one carrier did not block incoming and outgoing unsolicited packets which allow SYN flooding attack through established connections. In addition to middleboxes, we evaluate whether GTP attacks are well protected by Korean cellular carriers. In this thesis, we demonstrate that GTP attacks are possible on Korean cellular network which can be used to identify core components in cellular networks. Once the core components are identified, DoS attack could be launched by taking down these components.eng
dc.languageeng-
dc.publisher한국과학기술원-
dc.subjectCellular Network Security-
dc.subjectNAT-
dc.subjectFirewall-
dc.subjectGTP-
dc.subjectCellular Network-
dc.subject미들박스-
dc.subject셀룰러 네트워크 보안-
dc.titleEvaluating security of korean cellular networks-
dc.title.alternative한국 이동 통신망 안전성 분석-
dc.typeThesis(Master)-
dc.identifier.CNRN592461/325007 -
dc.description.department한국과학기술원 : 정보보호대학원, -
dc.identifier.uid020124342-
dc.contributor.localauthorKim, Yong-Dae-
dc.contributor.localauthor김용대-
Appears in Collection
IS-Theses_Master(석사논문)
Files in This Item
There are no files associated with this item.

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0