Senin, 13 Juli 2020

Vulnerabilities in LTE and 5G networks 2020

With new 5G networks, mobile operators face numerous challenges. One of them is the GTP protocol, used alongside SS7 and Diameter on core networks to transmit user and control traffic.
The problem for operators is that the GTP protocol can be exploited by attackers. Vulnerabilities leave the door open to denial of service and fraud.
To foresee GTP-related issues in the 5G context and outline preventive measures to ensure full 5G network protection, Positive Technologies has released its latest report on GTP security.
This is the concluding paper in our four-part research series on core vulnerabilities and threats in the mobile ecosystem. Operators can refer to it for a picture of GTP threats and expert recommendations on how to proactively counter fraud.
https://positive-tech.com/storage/articles/gtp-2020/threat-vector-gtp-2020-eng.pdf

Tidak ada komentar:

Posting Komentar

My Headlines