A Mimic Defense Mechanism for Mobile Communication User Data Based on MSISDN Virtualization
Cai-Xia LIU,Xin-Sheng JI,Jiang-Xing WU
DOI: https://doi.org/10.11897/SP.J.1016.2018.00275
2018-01-01
Abstract:In this study,we focus on addressing the issue of cellphone user data security in mobile communication networks.The cellphone user data (Hereinafter referred to as user data)contain cellphone users' identification,location identification,routing identification,security parameter set,service profile,and the like.In recent years,facts and studies have shown that these user data are facing serious security problems like being illegally acquired and tampered due to the vulnerabilities in the No.7 Signaling System (SS7) that is used as one of the fundamental protocols in mobile communication networks.User data,as carriers of user's privacy as well as the fundamental data related to mobile communication,once being illegally acquired or tampered,will lead to user location tracking,fraud,denial of service,or even call interception.Some researchers have mentioned the abusing access way to SS7 networks to acquire or tamper user data,an through the abusing access way we infer that attackers can apply normal SS7 protocol to access core network databases or intercept signaling transmission paths to attack user data,so,conventional passive protection mechanisms powered by anomaly access detections are inadequate.On the other hand,cellphone user's MSISDN numbers (i.e.,cellphone number),which are used as communication identifiers,are normally open to the public,while MSISDN numbers are usually stored and transmitted in mapping state with other data (e.g.,IMSI,location identification,subscribed service list,security parameters set),and based on the mapping relationship,almost all the other data items can be retrieved according to MSISDN numbers.Thus,once a cellphone users' MSISDN numbers have been known,it is easy for attackers to access to the user's other data.We infer that user data's mapping-relationship may be a main way that leads to user data leakage.As a result,we dope out a proactive cellphone user data security defense thoughts:to break or conceal the mapping-relationships between users' MSISDN numbers and other data in the insecure SS7 networks.The basic idea of our solution is to establish a Dynamic and Virtual Mapping between cellphone user's MSISDN numbers and other data through adopting dynamic manipulation technique,as such to diversify the mapping relationship.We call this defense mechanism MDM (Mimic Defense Mechanism).The mechanism is characterized by no change in the existing mobile communication network protocol system,and to ensure that one cellphone user's open MSISDN number is the only real.We investigated MSISDN number's attributes,spatiotemporal characteristics,and spatiotemporal mapping-characteristic,demonstrated its feasibility,presented the core idea of MSISDN number dynamics and virtualization,and gave the implementation scheme.In the end,a theoretical analysis model is built to evaluate the MDM's security efficiency.The results show that the proposed MDM mechanism can achieve security improvement without changing the existing network architecture,communication protocol and traffic provision mechanism.In addition,we studied the impacts of multiple parameters (e.g.,MSISDN number dynamic-manipulation time interval and the occurrence probability) on security improvement.Such quantitative evaluations offer practical underpinnings of optimizing MDM for other specific application domains.