TECHNOLOGY

Diameter Introduction

In the future, 5G network will still need to support the connection of existing 4G/3G networks, so attacks on existing communication networks will spread to 5G networks. The existing mobile communication evolution and its existing threats are 2G/3G uses Signaling System Number 7 (SS7) as the signal for communication between operators in the core network. Because of the lack of authentication mechanism between the messages, attackers can attack the core network easily. Due to the increased requirements for authentication, authorization, and billing, 4G network replaced SS7 with the Diameter protocol and maintained compatibility. Because of Diameter extended the design spirit of SS7, the lack of a verification mechanism for message exchange between core networks poses an attack threat. Since the 5G network also uses Diameter and needs to support the traditional network interface, the attacks of the traditional core network can be applied to 5G. Therefore, the integration of 5G networks and existing networks will face the ensuing core network control signaling attacks.

Among them, the Diameter protocol has a greater chance to affect the operation of 5G including the NSA and SA core networks. O'Prueba Technology Inc. conducts in-depth research on the possible attack methods of the Diameter protocol, and integrated various types and methods of Diameter attacks to promote related attack protection and provide Diameter-related attack detection services.

Sh UDR 獲取資訊攻擊流程圖
Sh UDR 獲取資訊攻擊流程
攻擊分類 攻擊手法

獲取用戶隱私

Sh UDR

S6a IDR

S6a ULR

S6a AIR

S6c SRR

獲取網路資訊

S6a AIR

詐欺

S6d IDR

中斷服務

S6a IDR

S6a DSR

S6a ULR

S6a CLR

S6a PUR

S6a NOR


Reference