Bookkeeping Service Providers

  • Accounting
  • Bookkeeping
  • US Taxation
  • Financial Planning
  • Accounting Software
  • Small Business Finance
You are here: Home / IOT / How 4G and 5G networks are vulnerable to Denial-of-Service attacks

How 4G and 5G networks are vulnerable to Denial-of-Service attacks

March 26, 2020 by cbn Leave a Comment

Existing 4G and early 5G networks use Diameter signaling protocol, which contains certain security holes that can lead to a range of attacks, says enterprise security provider Positive Technologies.

Mobile operators are racing to upgrade their networks with 5G connectivity while at the same time expanding 4G LTE coverage throughout the world. Though the latest generations of cellular technology offer faster performance and other benefits over their predecessors, they’re vulnerable to some of the same security flaws. A report released Thursday by Positive Technologies explains how and why existing 4G and new 5G networks can be hurt by Denial-of-Service (DOS) attacks in particular.

For its report “Security Assessment of Diameter Networks 2020,” Positive Technologies simulated external attacks against 28 telecom operators in Europe, Asia, Africa, and South America during 2018 and 2019. Specifically, the company looked at 4G and 5G networks using Diameter signaling protocol, a method for coordinating data among different Internet Protocol (IP) network elements.

SEE: 5G technology: A business leader’s guide (TechRepublic Premium) 

The Diameter signaling protocol is saddled with certain security flaws that make it vulnerable to a range of attack types. Despite these flaws being public knowledge, the past two years have seen no improvements in the security of Diameter networks, according to Positive Technologies. And the biggest type of threat facing such networks is denial of service. In fact, every network that the company tested was vulnerable to a DOS attack, the report stated.

More about Mobility

Specifically, the networks analyzed failed to check the subscriber’s actual location or the origin network of signaling messages for a subscriber. As such, they were unable to distinguish between fake and legitimate traffic, opening the door to DOS attacks.

The flaws in the Diameter signaling protocol and the potential DOS attacks can affect users of both 4G and nascent 5G networks. This is because the first generation of 5G networks, known as 5G Non-Standalone, is based on the LTE network core, which means it inherits all of the security weaknesses of LTE.

“A lot of the major mobile operators are already starting to roll out their 5G networks and so the industry needs to avoid repeating the mistakes of the past by having security front and center of any network design,” Dmitry Kurbatov, CTO at Positive Technologies, said in a press release. “If left unchecked, their 5G networks will not be immune from the same vulnerabilities of previous generation networks.”

With Gartner previously forecasting 25 billion Internet of Things devices connected by 2021, a DOS attack has the potential to do massive damage.

“It can cripple cities which are beginning to use [Internet of Things] IoT devices in various ways from national infrastructure to industry,” Kurbatov said. “For example, if an alarm system fails to activate during an emergency it can literally be a life-or-death situation.”

For organizations involved in cellular technology, Positive Technologies offers recommendations to help protect 4G and 5G networks from DOS attacks.

Security must be a priority during network design. This is truer now than ever before, as operators begin to tackle construction of 5G networks. Attempts to implement security as an afterthought at later stages may cost much more. At best, operators will likely need to purchase additional equipment. At worst, operators may be stuck with long-term security vulnerabilities that cannot be fixed later.

“Implementing security as an afterthought means further down the line, issues will inevitably arise, and operators will be forced to retrofit security, putting a strain on their original budget,” Kurbatov said. “Trying to fix mistakes on an ad-hoc basis often results in new solutions being poorly integrated into existing network architecture.”

Signaling traffic must be monitored and analyzed as it crosses the network border. This identifies potential threats and configuration errors. Such monitoring is encouraged by GSMA guidelines. To implement this, operators need to employ special threat detection systems that can analyze signal traffic in real time and detect illegitimate activity by external hosts. These solutions block illegitimate messages without impacting network performance or subscriber availability. They can also relay information to other protection systems for maximum effectiveness.

“At the moment, operators neglect to cross-reference messages to verify a subscriber’s location to be able to filter between fake and legitimate messages,” Kurbatov said. “Mobile operators cannot afford to ground operations to a halt and so they need solutions which can block illegitimate messages without impacting network performance or user access to the network. Correct filtering of incoming messages is needed using threat detection systems which can analyze signal traffic in real-time and detect illegitimate activity by external hosts and flag up configuration errors as per GSMA guidelines.”

5G and Mobile Enterprise Newsletter

5G networks and devices, mobile security, remote support, and the latest about phones, tablets, and apps are some of the topics we’ll cover. Delivered Tuesdays and Fridays

Sign up today

Also see

3d rendering Red skull of plexus particles on the background of binary code stream and server room data center. concept of hacking and hacking big data attack3d rendering Red skull of plexus particles on the background of binary code stream and server room data center. concept of hacking and hacking big data attack

Image: Vladimir_Timofeev, Getty Images/iStockphoto

Share on FacebookShare on TwitterShare on Google+Share on LinkedinShare on Pinterest

Filed Under: IOT

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022
  • July 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • May 2021
  • April 2021
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • January 2020
  • December 2019
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • May 2017
  • April 2017
  • March 2017
  • February 2017
  • January 2017
  • March 2016

Recent Posts

  • FabCon Vienna: Build data-rich agents on an enterprise-ready foundation
  • Agent Factory: Connecting agents, apps, and data with new open standards like MCP and A2A
  • Azure mandatory multifactor authentication: Phase 2 starting in October 2025
  • Microsoft Cost Management updates—July & August 2025
  • Protecting Azure Infrastructure from silicon to systems

Recent Comments

    Categories

    • Accounting
    • Accounting Software
    • BlockChain
    • Bookkeeping
    • CLOUD
    • Data Center
    • Financial Planning
    • IOT
    • Machine Learning & AI
    • SECURITY
    • Uncategorized
    • US Taxation

    Categories

    • Accounting (145)
    • Accounting Software (27)
    • BlockChain (18)
    • Bookkeeping (205)
    • CLOUD (1,321)
    • Data Center (214)
    • Financial Planning (345)
    • IOT (260)
    • Machine Learning & AI (41)
    • SECURITY (620)
    • Uncategorized (1,284)
    • US Taxation (17)

    Subscribe Our Newsletter

     Subscribing I accept the privacy rules of this site

    Copyright © 2025 · News Pro Theme on Genesis Framework · WordPress · Log in