АНАЛІЗ РІВНЯ БЕЗПЕКИ МЕРЕЖ СИГНАЛІЗАЦІЇ SS7
Анотація
Security level analysis of SS7 signaling networks
The publication examines the risks associated with the vulnerability of the SS7 system, which leads to the leakage of information when using mobile and Internet services. An analysis of attacks and the effectiveness of using two-factor authorization for information security has been carried out.
Посилання
Signal System Number 7 (SS7) [Електронний ресурс] – Режим доступу: http://4g5gworld.com/wiki/signaling-system-number-7-ss7
Kim Zеtter, The critical hole at the heart of our cell phone networks [Електронний ресурс] – Режим доступу: https://www.wired.com/2016/04/the-critical-hole-at-the-heart-of-cell-phone-infrastructure/
Positive Technologies, Эксперты Positive Technologies комментируют скандал со взломом украинских операторов связи [Електронний ресурс] – Режим доступу: https://www.securitylab.ru/news/454289.php
Романов О.І., Гордашник Є.С. Аналіз і класифікація атак в мережах IP-телефонії на базі SOFTSWITCH CLASS V. Матеріали десятої МНТК «Проблеми телекомунікацій», 2016 р. С 170-173.
##submission.downloads##
Як цитувати
Номер
Розділ
Ліцензія
Авторське право (c) 2018 Микита Геннадійович Осокін, Олександр Іванович Романов
Ця робота ліцензується відповідно до Creative Commons Attribution 4.0 International License.
Authors who submit to this conference agree to the following terms:a) Authors retain copyright over their work, while allowing the conference to place this unpublished work under a Creative Commons Attribution License, which allows others to freely access, use, and share the work, with an acknowledgement of the work's authorship and its initial presentation at this conference.
b) Authors are able to waive the terms of the CC license and enter into separate, additional contractual arrangements for the non-exclusive distribution and subsequent publication of this work (e.g., publish a revised version in a journal, post it to an institutional repository or publish it in a book), with an acknowledgement of its initial presentation at this conference.
c) In addition, authors are encouraged to post and share their work online (e.g., in institutional repositories or on their website) at any point before and after the conference.