The problem for operators is that the GTP protocol can be exploited by attackers. Vulnerabilities leave the door open to denial of service and fraud.
To foresee GTP-related issues in the 5G context and outline preventive measures to ensure full 5G network protection, Positive Technologies has released its latest report on GTP security.
This is the concluding paper in our four-part research series on core vulnerabilities and threats in the mobile ecosystem. Operators can refer to it for a picture of GTP threats and expert recommendations on how to proactively counter fraud.
https://positive-tech.com/storage/articles/gtp-2020/threat-vector-gtp-2020-eng.pdf
Tidak ada komentar:
Posting Komentar