& cplSiteName &

Defending the Mobile Core

Michelle Donegan
News Analysis
Michelle Donegan
2/28/2014
50%
50%

BARCELONA -- Mobile World Congress 2014 -- Network security specialist Arbor Networks this week launched a traffic analysis product designed to give mobile operators visibility into their packet core networks so that they can detect attacks and prevent potentially widespread service outages.

With the new Peakflow Mobile Network Analysis, the company has extended its Peakflow product line, which tracks and detects anomalies in traffic flows in fixed-line backbone and datacenter networks, to provide the same level of visibility into mobile operators' core networks. And when used together, operators can have visibility and threat detection across their fixed and mobile networks from one management console.

One of the biggest challenges for mobile operators when it comes to network security is the lack of traffic visibility in the packet core and radio access network, as well as real-time insight into the sources of potential attacks, according to Arbor Networks

The company points to recent research from Heavy Reading which found that 60% of mobile operators have had a network outage or service degradation lasting at least an hour due to malicious attacks. In addition, 60% of respondents said they do not have visibility into their mobile packet core infrastructure.

Heavy Reading senior analyst Patrick Donegan said in a statement: "In today's environment, no one security approach is going to prevent all malicious traffic from reaching the mobile network. And nothing is going to stop the increasingly complex mix of protocols within the network from generating anomalous traffic behaviour. Mobile operators are increasingly looking for new ways to quickly visualize, identify and reduce security risks within the packet core."


Mobile network security is one of a number of key topics that will feature at The Big Telecom Event (BTE), June 17/18 at the Sheraton Chicago Hotel and Towers.


According to Tom Bienkowski, director of product marketing at Arbor, mobile operators' networks are threatened from both sides of the packet core -- that is, network attacks can originate from the fixed-line network over the Gi and SGi interfaces that sit between the packet core and external IP networks/public Internet, or they can come from devices, through malicious malware or non-malicious signalling storms.

"Today, the majority of threats are coming from the fixed-line networks, but the emerging trend is for attacks to come from the other side of the network, through mobile malware," said Bienkowski. "That's why operators need a holistic view."

But traffic anomalies do not always indicate a malicious attack on the network. Sometimes the unusual traffic patterns can be the result of a malfunction in the network or a signalling overload from user devices.

The Peakflow Mobile Network Analysis provides a view of this signalling activity by collecting telemetry from the packet core and reporting operational and security insights. For example, the product provides detailed signalling flow behaviour between the serving GPRS support node (SGSN)/serving gateway (SGW)/ mobility management entity (MME) elements and the gateway GPRS support node (GGSN)/packet gateway (PGW) nodes, for real-time and retrospective analytics. It also detects and alerts operators to signalling message volumes, so that they can quickly identify causes.

"Whether it's malicious or not, a threat is a threat and operators need to stop it," said Bienkowski. He added that Arbor has been doing IP traffic threat detection for 13 years in the fixed-line networks, and now that mobile packet core networks are IP-based, the company can apply its expertise in mobile networks.

The Peakflow Mobile Network Analysis is currently in trials with an operator in Asia-Pacific and will soon start another trial with an operator in the Nordic region, according to Arbor.

For more coverage of these issues, check out our Mobile Security content track.

— Michelle Donegan, contributing editor, special to Light Reading


Want to learn more about this topic? Check out the agenda for The Big Telecom Event (BTE), which will take place on June 17 and 18 at the Sheraton Chicago Hotel and Towers. The event combines the educational power of interactive conference sessions devised and hosted by Heavy Reading's experienced industry analysts with multi-vendor interoperability and proof-of-concept networking and application showcases. For more on the event, the topics and the stellar service provider speaker line-up, see Telecommunication Luminaries to Discuss the Hottest Industry Trends at Light Reading's Big Telecom Event in June.


(5)  | 
Comment  | 
Print  | 
Newest First  |  Oldest First  |  Threaded View        ADD A COMMENT
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Light Sabre
2/28/2014 | 11:48:26 PM
60%!?!!
Wow.  Those are some statistics, Michelle.  Any information or insight as to how this is impacting cyber insurance policy sales?
Michelle
50%
50%
Michelle,
User Rank: Light Sabre
2/28/2014 | 3:11:24 PM
Tidy packets
This sounds really impressive. I'm glad to see this kind of progress being made at the packet level. Mobile malware is absolutely growing. I'm curious to know if U.S. carriers plan to take advantage of this technology to defend their networks.
mendyk
50%
50%
mendyk,
User Rank: Light Sabre
2/28/2014 | 2:21:26 PM
Blanket security
In addition to being part of BTE, mobile security actually has two dedicated LR events this year, in May (London) and December (New York). Details are in the "Upcoming Live Events" box in the right-hand column of this page. Patrick Donegan of Heavy Reading is at the forefront of the mobile security awareness movement, and he is leading all LR events in this area. Operators need to find out now what they DON'T know about mobile network security, and from what we've seen so far, they DON'T know a lot.
Carol Wilson
50%
50%
Carol Wilson,
User Rank: Blogger
2/28/2014 | 11:04:24 AM
Re: Amazing that there is so little visibilty
I'm not shocked at all - and I don't think it's a simple as a vendor issue. As Michelle's piece points out, the important thing is the holistic view and without the tools to create that, having a lot of information about how your network is performing scattered all around doesn't help you identify anomalies and potential problems/threats. 

Sometimes it's shocking there haven't been more problems...
Ray@LR
50%
50%
Ray@LR,
User Rank: Blogger
2/28/2014 | 8:22:00 AM
Amazing that there is so little visibilty
I am shocked at the lack of visibiity into the mobile packet core.... shouldn't this have been addressed by te IP router vendors?
Educational Resources
sponsor supplied content
Educational Resources Archive
Light Reading’s Upskill U is a FREE, interactive, online educational resource that delivers must-have education on themes that relate to the overall business transformation taking place in the communications industry.
NEXT COURSE
Friday, September 30, 1:00PM EDT
Gigabit & the Great Migration
Robert Howald, Vice President, Network Architecture, Comcast
UPCOMING COURSE SCHEDULE
Wednesday, October 5, 1:00PM EDT
Gigabit & Smart Cities
Joe Kochan, COO & Co-Founder, US Ignite
Friday, October 7, 1:00PM EDT
Gigabit & DOCSIS 3.1
Ty Pearman, Director, Access Architecture, Comcast
Wednesday, October 19, 1:00PM EDT
Securing a Virtual World
Rita Marty, Executive Director, Mobility and Cloud Security, Chief Security Office, AT&T
in association with:
From The Founder
Light Reading today starts a new voyage as part of a larger Enterprise.
Flash Poll
Live Streaming Video
Charting the CSP's Future
Six different communications service providers join to debate their visions of the future CSP, following a landmark presentation from AT&T on its massive virtualization efforts and a look back on where the telecom industry has been and where it's going from two industry veterans.
LRTV Custom TV
Flexible Deployment Approaches for the Gigabit Services Evolution

9|29|16   |     |   (0) comments


For many operators, the gigabit evolution begins with the shift from DOCSIS 3.0 to DOCSIS 3.1. But that move represents a change not only in the protocol itself, but in the approach to architecting their entire DOCSIS delivery chain -- from the headend to the outside plant and home gateway components.

Jonathan Ruff, senior director of global technical ...

LRTV Interviews
Level 3 VP: Enterprises Need More for Less

9|29|16   |   05:27   |   (0) comments


Andrew Dugan, Level 3 group vice president of global technology and IT, says enterprises need more bandwidth and they need it faster and with greater security, but they want to spend less, if possible. They are looking to carriers to reduce their network complexity and help protect them from cyberattacks as well.
LRTV Interviews
CenturyLink: SDN/NFV Pose New Interconnection Possibilities

9|28|16   |   04:37   |   (0) comments


Network operators should develop new APIs and business processes for reselling virtual assets to each other, says CenturyLink's Bill Walker. That will enable them to build digital business portfolios that help them avoid becoming commodity transport providers.
LRTV Interviews
Level 3: Overcoming Terror of Being Supplier, Integrator & Developer

9|28|16   |     |   (0) comments


At Light Reading's NFV & Carrier SDN event in Denver, Travis Ewert of Level 3 Communications said there is terror in becoming supplier, integrator and developer, but it can be overcome and be cost effective.
LRTV Custom TV
Introducing IoT World News

9|27|16   |   01:43   |   (0) comments


Self-driving cars, medical sensors, smart cities... and refrigerators. In order to address the huge scope of IoT, KNect365 has created a unique online community that will help businesses to understand and monetize the opportunities that live within the IoT market. We look forward to welcoming you to IoT World News -- your gateway to a better connected future.
LRTV Interviews
AT&T: Reusable Functions Next NFV Key

9|27|16   |   06:03   |   (0) comments


The next generation of NFV has to break functions down into reusable software chunks, making everything much more cloud-like.
LRTV Interviews
Masergy on Security: Attackers Gaining Upper Hand

9|27|16   |   5:10   |   (2) comments


At Light Reading's NFV & Carrier SDN event in Denver, Ray Watson, vice president of Global Technology at Masergy, says that because of the growth in virtualization, the threat landscape is shifting in favor of the attackers. As a result, service providers need to think beyond just defending the perimeter and take a more holistic approach to security.
LRTV Interviews
Verizon Takes Next Step on Biz Virtualization Journey

9|26|16   |   4:38   |   (2) comments


At September's NFV & Carrier SDN event in Denver, Light Reading sat down with Victoria Lonker, director of Product and New Business Innovation at Verizon, to chat about where the carrier is with delivering virtualized services to business customers.
LRTV Interviews
Global Services: The $40B Face-Off

9|26|16   |   05:53   |   (1) comment


More service providers than ever before are battling it out to win a slice of what is now a $40 billion global communications services pie, explains Ovum Principal Analyst David Molony.
LRTV Documentaries
MEC Congress: The Key Takeaways

9|22|16   |   03:25   |   (3) comments


Three key takeaways from the Mobile Edge Computing (MEC) Congress in Munich, Germany.
Wagner’s Ring
Time to Shut Up About 'Dumb Pipes'

9|22|16   |     |   (19) comments


Service providers can't compete with OTT players. It just isn't in their DNA. Instead, service providers need to embrace what they're good at -- providing reliable, secure connectivity.
Wagner’s Ring
Keeping Your Tech Career Going After 50

9|21|16   |     |   (13) comments


How do you keep your career moving forward when you're past the half-century mark?
Upcoming Live Events
November 3, 2016, The Montcalm Marble Arch, London
November 30, 2016, The Westin Times Square, New York City
December 1, 2016, The Westin Times Square, New York, NY
December 6-8, 2016, The Westin Excelsior, Rome
May 16-17, 2017, Austin Convention Center, Austin, TX
All Upcoming Live Events
Infographics
Hot Topics
WiCipedia: The Women Helping Women Edition
Eryn Leavens, Special Features & Copy Editor, 9/23/2016
Eurobites: Telefónica Taps Juniper for Network Security
Paul Rainford, Assistant Editor, Europe, 9/26/2016
Open Source Getting on My Nerves
Carol Wilson, Editor-at-large, 9/26/2016
Powell Kills the Cable Show
Mari Silbey, Senior Editor, Cable/Video, 9/29/2016
Telstra Sees Quadrupled Data Capacity by 2020
Carol Wilson, Editor-at-large, 9/28/2016
Like Us on Facebook
Twitter Feed
BETWEEN THE CEOs - Executive Interviews
Light Reading CEO Steve Saunders and UXP Systems CEO Gemini Waghmare discuss the strategic importance of digital identity for operators in the midst of transformation.
Join us for an in-depth interview between Steve Saunders of Light Reading and Alexis Black Bjorlin of Intel as they discuss the release of the company's Silicon Photonics platform, its performance, long-term prospects, customer expectations and much more.
Animals with Phones
There's Nothing Like Missing a Full Minute of Pokémon Go Click Here
Live Digital Audio

A vital part of increasing the number of women in comms is transforming the ways companies can support and empower women. While progressive company policies that support both men and women in achieving work-life balance are a step in the right direction, creating a company culture that supports those policies can at times be more challenging.

During this show, we'll talk to Lynn Comp, Senior Director of Industry and Sales Enabling (ISE) in the Network Platforms Group at Intel, about why those challenges exist and how companies can overcome them. She'll provide insight into how Intel has worked to create a culture that supports work-life balance, and provide steps and guidance for other companies wishing to do the same. We will also leave plenty of time to get your questions answered live on the air.