Light Reading
Arbor extends its network security reach into the packet core.

Defending the Mobile Core

Michelle Donegan
News Analysis
Michelle Donegan
2/28/2014
50%
50%

BARCELONA -- Mobile World Congress 2014 -- Network security specialist Arbor Networks this week launched a traffic analysis product designed to give mobile operators visibility into their packet core networks so that they can detect attacks and prevent potentially widespread service outages.

With the new Peakflow Mobile Network Analysis, the company has extended its Peakflow product line, which tracks and detects anomalies in traffic flows in fixed-line backbone and datacenter networks, to provide the same level of visibility into mobile operators' core networks. And when used together, operators can have visibility and threat detection across their fixed and mobile networks from one management console.

One of the biggest challenges for mobile operators when it comes to network security is the lack of traffic visibility in the packet core and radio access network, as well as real-time insight into the sources of potential attacks, according to Arbor Networks Inc.

The company points to recent research from Heavy Reading which found that 60% of mobile operators have had a network outage or service degradation lasting at least an hour due to malicious attacks. In addition, 60% of respondents said they do not have visibility into their mobile packet core infrastructure.

Heavy Reading senior analyst Patrick Donegan said in a statement: "In today's environment, no one security approach is going to prevent all malicious traffic from reaching the mobile network. And nothing is going to stop the increasingly complex mix of protocols within the network from generating anomalous traffic behaviour. Mobile operators are increasingly looking for new ways to quickly visualize, identify and reduce security risks within the packet core."


Mobile network security is one of a number of key topics that will feature at The Big Telecom Event (BTE), June 17/18 at the Sheraton Chicago Hotel and Towers.


According to Tom Bienkowski, director of product marketing at Arbor, mobile operators' networks are threatened from both sides of the packet core -- that is, network attacks can originate from the fixed-line network over the Gi and SGi interfaces that sit between the packet core and external IP networks/public Internet, or they can come from devices, through malicious malware or non-malicious signalling storms.

"Today, the majority of threats are coming from the fixed-line networks, but the emerging trend is for attacks to come from the other side of the network, through mobile malware," said Bienkowski. "That's why operators need a holistic view."

But traffic anomalies do not always indicate a malicious attack on the network. Sometimes the unusual traffic patterns can be the result of a malfunction in the network or a signalling overload from user devices.

The Peakflow Mobile Network Analysis provides a view of this signalling activity by collecting telemetry from the packet core and reporting operational and security insights. For example, the product provides detailed signalling flow behaviour between the serving GPRS support node (SGSN)/serving gateway (SGW)/ mobility management entity (MME) elements and the gateway GPRS support node (GGSN)/packet gateway (PGW) nodes, for real-time and retrospective analytics. It also detects and alerts operators to signalling message volumes, so that they can quickly identify causes.

"Whether it's malicious or not, a threat is a threat and operators need to stop it," said Bienkowski. He added that Arbor has been doing IP traffic threat detection for 13 years in the fixed-line networks, and now that mobile packet core networks are IP-based, the company can apply its expertise in mobile networks.

The Peakflow Mobile Network Analysis is currently in trials with an operator in Asia-Pacific and will soon start another trial with an operator in the Nordic region, according to Arbor.

For more coverage of these issues, check out our Mobile Security content track.

— Michelle Donegan, contributing editor, special to Light Reading


Want to learn more about this topic? Check out the agenda for The Big Telecom Event (BTE), which will take place on June 17 and 18 at the Sheraton Chicago Hotel and Towers. The event combines the educational power of interactive conference sessions devised and hosted by Heavy Reading's experienced industry analysts with multi-vendor interoperability and proof-of-concept networking and application showcases. For more on the event, the topics and the stellar service provider speaker line-up, see Telecommunication Luminaries to Discuss the Hottest Industry Trends at Light Reading's Big Telecom Event in June.


(5)  | 
Comment  | 
Print  | 
Newest First  |  Oldest First  |  Threaded View
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Light Sabre
2/28/2014 | 11:48:26 PM
60%!?!!
Wow.  Those are some statistics, Michelle.  Any information or insight as to how this is impacting cyber insurance policy sales?
Michelle
50%
50%
Michelle,
User Rank: Moderator
2/28/2014 | 3:11:24 PM
Tidy packets
This sounds really impressive. I'm glad to see this kind of progress being made at the packet level. Mobile malware is absolutely growing. I'm curious to know if U.S. carriers plan to take advantage of this technology to defend their networks.
mendyk
50%
50%
mendyk,
User Rank: Light Sabre
2/28/2014 | 2:21:26 PM
Blanket security
In addition to being part of BTE, mobile security actually has two dedicated LR events this year, in May (London) and December (New York). Details are in the "Upcoming Live Events" box in the right-hand column of this page. Patrick Donegan of Heavy Reading is at the forefront of the mobile security awareness movement, and he is leading all LR events in this area. Operators need to find out now what they DON'T know about mobile network security, and from what we've seen so far, they DON'T know a lot.
Carol Wilson
50%
50%
Carol Wilson,
User Rank: Blogger
2/28/2014 | 11:04:24 AM
Re: Amazing that there is so little visibilty
I'm not shocked at all - and I don't think it's a simple as a vendor issue. As Michelle's piece points out, the important thing is the holistic view and without the tools to create that, having a lot of information about how your network is performing scattered all around doesn't help you identify anomalies and potential problems/threats. 

Sometimes it's shocking there haven't been more problems...
Ray@LR
50%
50%
Ray@LR,
User Rank: Blogger
2/28/2014 | 8:22:00 AM
Amazing that there is so little visibilty
I am shocked at the lack of visibiity into the mobile packet core.... shouldn't this have been addressed by te IP router vendors?
Flash Poll
From The Founder
It's clear to me that the communications industry is divided into two types of people, and only one is living in the real world.
LRTV Huawei Video Resource Center
Interview With Rick Talbot, Principal Analyst, Current Analysis

10|31|14   |   2:12   |   (0) comments


At the NFV Open Cloud Forum 2014, Rick Talbot shared his positive feedback about the holistic and open approach that Huawei adopts for SDN and NFV. He also found the open sharing at the event valuable as it features different perspectives from Huawei experts, telecom operators, industry analysts as well as security experts.
LRTV Huawei Video Resource Center
Interview With David Snow, Principal Analyst, Current Analysis

10|31|14   |   2:24   |   (0) comments


David Snow talked about his understanding of Huawei and its SoftCOM strategy at the NFV Open Cloud Forum 2014, saying that Huawei's wide approach combining IT and CT expertise, introducing big data and analytics into solutions and contributing to the OpenStack community particularly resonate with him and make the company stand out in the industry.
LRTV Huawei Video Resource Center
Interview With Roz Roseboro, Senior Analyst, Heavy Reading

10|31|14   |   3:13   |   (0) comments


Roz Roseboro commented on Huawei's data center capabilities and NFV solutions at the NFV Open Cloud Forum 2014, saying that in addition to covering all three key domains of compute, storage and networking, the company also emphasizes the importance of management capabilities and professional services, which are essential in making NFV a reality.
LRTV Huawei Video Resource Center
Interview With Michael Howard, Co-founder & Principal Analyst, Infonetics Research

10|31|14   |   5:25   |   (0) comments


Michael Howard talked about SDN, NFV, and OpenStack adoption at Huawei's NFV Open Cloud Forum 2014. Particularly, he pointed out that Virtual Enterprise CPE is the top NFV use case that operators plan to invest in over 2014 and 2015 to deliver new enterprise services through virtualized functions.
LRTV Huawei Video Resource Center
Interview With Jerry Caron, Senior Vice President, Current Analysis

10|31|14   |   3:11   |   (0) comments


At Huawei's NFV Open Cloud Forum 2014, Jerry Caron from Current Analysis said that orchestration and management are key to realizing SDN and NFV for global carriers, and the approach that Huawei is taking, with its FusionSphere Cloud OS at the core, is in the right direction to address the challenges.
LRTV Documentaries
Broadband Battles

10|31|14   |   01:39   |   (0) comments


This year's Broadband World Forum featured a number of show floor battles focused on access gear, components and coffee.
Jonestown
Mobile Backhaul: Going to the Dark Side?

10|30|14   |   2:26   |   (1) comment


Heavy Reading's Patrick Donegan shares his view on a dark trend that bubbled up at Light Reading's annual backhaul conference in NYC.
LRTV Huawei Video Resource Center
2014 Huawei Electric Power Industry Summit: Interview With CEO of SwitchCom

10|30|14   |   4:13   |   (0) comments


SwitchCom, an IT company based in Angola, recommends a variety of Huawei solutions and hardware to their customers in the energy industry.
LRTV Huawei Video Resource Center
2014 Huawei Electric Power Industry Summit: Interview With Ethiopia's Ministry of Water Irrigation & Energy

10|30|14   |   4:08   |   (0) comments


Gosaye Mengistie of Ethiopia's Ministry of Water Irrigation & Energy discusses the collaboration with Huawei in that country.
LRTV Huawei Video Resource Center
2014 Huawei Electric Power Industry Summit: Interview with Dongfang Electronics Corporation

10|30|14   |   5:46   |   (0) comments


Dongfang Electronics Corporation, headquartered in Chengdu, China, is one of China's largest manufacturers of power generators and contractors of power station projects.
LRTV Huawei Video Resource Center
2014 Huawei Electric Power Industry Summit: Interview with Zimbabwe's Customers

10|30|14   |   3:31   |   (0) comments


Representatives of Zimbabwe's Ministry of Power and Development discuss the energy needs of their country as well as new areas of improvement due to enhanced ICT capabilities.
LRTV Huawei Video Resource Center
2014 Huawei Electric Power Industry Summit: Interview With Colbún Chile

10|30|14   |   4:29   |   (0) comments


In Chile, an aging energy infrastructure was in dire need of a modern update. Claudio Valenzuela of Colbún discusses how Huawei's ICT solutions continue to provide crucial information to improve the grid and how an in-country engineer is a cricial asset.
Upcoming Live Events
November 6, 2014, Santa Clara
November 11, 2014, Atlanta, GA
December 2, 2014, New York City
December 3, 2014, New York City
December 9-10, 2014, Reykjavik, Iceland
February 10, 2015, Atlanta, GA
May 6, 2015, McCormick Convention Center, Chicago, IL
May 30, 2015, The Westin Peachtree, Atlanta, GA
June 9-10, 2015, Chicago, IL
Infographics
WhoIsHostingThis.com presents six of the world's most extreme WiFi hotspots, enabling the most epic selfies you can imagine.
Hot Topics
Microsoft's Skype Embraces WebRTC on IE
Sarah Reedy, Senior Editor, 10/27/2014
FTC Slaps AT&T With Throttling Lawsuit
Sarah Reedy, Senior Editor, 10/28/2014
Wheeler Gets Down With OTT
Mari Silbey, Independent Technology Editor, 10/29/2014
China's MVNOs Hit the Wall
Robert Clark, 10/27/2014
Let's Not Kill SDN & NFV With Silos
Francois Locoh-Donou, Senior VP, Global Products Group, Ciena, 10/28/2014
Like Us on Facebook
Twitter Feed