The Advanced Intelligent Network—A Security Opportunity

نویسنده

  • Thomas A. Casey
چکیده

The public switched telephone network (PSTN) is evolving from a closed network made up of specialized equipment into an open network employing many of the same components and protocols that are used in the Internet. The security vulnerabilities of the Internet are well known. The possible introduction of these vulnerabilities into the PSTN provides opportunities—for hackers to exploit the vulnerabilities and for security professionals to eliminate them. The current PSTN is evolving into what is known as the Advanced Intelligent Network (AIN). In the old PSTN, the control functions for telephone services (service logic) are implemented in software that runs in telephone switches. In the AIN, service logic is implemented by Service Logic Programs (SLPs) that run in Service Control Points (SCPs). SCPs are, in most cases, ordinary commercially available microprocessor-based workstations or servers, running the same insecure operating systems that are used on most Internet hosts. SCPs communicate with switches through the SS7 network. In addition, SCPs will have connections (sometimes via other machines) to the telephone companies' corporate data networks to support such functions as customer service and billing. There are also plans to offer customers an Internet interface for changing their service parameters—such as the number to which their calls should be forwarded. The obvious and very interesting potential security problems created by these changes in the PSTN have received comparatively little attention from the information security community. It is the objective of this paper to change that.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Adaptive Protection Based on Intelligent Distribution Networks with the Help of Network Factorization in the Presence of Distributed Generation Resources

Factorizing a system is one of the best ways to make a system intelligent. Factorizing the protection system, providing the right connecting agents, and transmitting the information faster and more reliably can improve the performance of a protection system and maintain system reliability against distributed generation resources. This study presents a new method for coordinating network protect...

متن کامل

An Advanced Hybrid Honeypot for Providing Effective Resistance in Automatic Network Generation

Increasing usage of Internet and computer networks by individuals and organizations and also attackers’ usage of new methods and tools in an attempt to endanger network security, have led to the emergence of a wide range of threats to networks. A honeypot is one of the basic techniques employed for network security improvement. It is basically designed to be attacked so as to get the attackers’...

متن کامل

An ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure

Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication.  This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...

متن کامل

Pedestrians Tracking in a Camera Network

With the increase of the number of cameras installed across a video surveillance network, the ability of security staffs to attentively scan all the video feeds actually decreases. Therefore, the need for an intelligent system that operates as a tracking system is vital for security personnel to do their jobs well. Tracking people as they move through a camera network with non-overlapping field...

متن کامل

A survey on RPL attacks and their countermeasures

RPL (Routing Protocol for Low Power and Lossy Networks) has been designed for low power networks with high packet loss. Generally, devices with low processing power and limited memory are used in this type of network. IoT (Internet of Things) is a typical example of low power lossy networks. In this technology, objects are interconnected through a network consisted of low-power circuits. Exampl...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1996