YoVDO

LTE Network Automation Under Threat

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Cybersecurity Courses

Course Description

Overview

Explore the vulnerabilities in automated 4G/LTE networks through an in-depth examination of rogue base station operations. Delve into the exploitation of weaknesses in 4G/LTE mobile phones and SON protocols for malicious packet injection. Gain insights into mobile network architecture, telco attacks, and Self Organized Network (SON) operations. Analyze LTE PCI optimization, Automatic Neighbor Relation (ANR), and LTE handover processes. Discover the impact of rogue data injection, vulnerable mobile network functions, and handover hijacking. Learn about remotely killing and restarting LTE base stations, and understand the grand-scale implications of these vulnerabilities. Examine proposed solutions and key takeaways for securing LTE network automation against potential threats.

Syllabus

Intro
Overview
Mobile Network Architecture
Recap - Telco Attacks
Self Organized Network (SON)
SON Operation in Practice
SON Operation Modes
SON Design Issue
Key Question
Automation in LTE - Vulnerable Points
LTE PCI Optimization
Automatic Neighbor Relation (ANR)
LTE Handover
Handover Analysis
Rogue Data Injection
Vulnerable Mobile Network Functions
Rogue eNodeB
Remotely Kill & Restart LTE Base Station
Handover Hijacking (Dropping Calls)
Impact of Handover Hijacking
Impact - Grand Scale
Vulnerability Status
Solutions
Takeaways


Taught by

Black Hat

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network