On Exploiting Self-Organized Container Virtualization Radio Access Network Platform to Realize Cooperative Rogue Base Station Attack

碩士 === 國立臺灣科技大學 === 資訊工程系 === 107 === LTE (Long Term Evolution) is governing mobile communication technology in recent years. UMTS (Universal Mobile Telecommunications System) is gradually being replaced by LTE. 5G New Radio still needs a lot of time to be tested. Therefore, the security issues of L...

Full description

Bibliographic Details
Main Authors: Wan-Lin Hsieh, 謝萬霖
Other Authors: Shin-Ming Cheng
Format: Others
Language:en_US
Published: 2019
Online Access:http://ndltd.ncl.edu.tw/handle/mz3a3t
Description
Summary:碩士 === 國立臺灣科技大學 === 資訊工程系 === 107 === LTE (Long Term Evolution) is governing mobile communication technology in recent years. UMTS (Universal Mobile Telecommunications System) is gradually being replaced by LTE. 5G New Radio still needs a lot of time to be tested. Therefore, the security issues of LTE are very important in the transition period. We surveyed LTE security issues in recent years, such as IMSI-catcher (International Mobile Subscriber Identity-catcher), DoS attack (Denial-of-Service attack), relay attack. The attackers usually used the rogue base station to implement the attacks. However, most of these rogue base stations use open source LTE projects and low-cost hardware development antennas. These attacks ranges are heavily affected by antenna power. In this paper, we have proposed a Self-Organized Container Virtualization Radio Access Network (SOCV-RAN) platform, which is flexible, scalability, and rapid expansion, to realized some cooperative rogue base station attacks. We used several open source LTE projects with USRP a software-defined radio to build the rogue base station. We virtualized these attack functions by using Docker container technology and overlay networks. In our experiment platform, we can quickly build several kinds of attack virtualized radio access networks. Moreover, we provided various APIs to implement self-organized which let user maintenance easily, and dynamically allocate hardware and software resource to increase the efficiency of resource utilization. Finally, we use some scenarios to attack real telecom vendors to verify the various feasibility of our cooperative rogue base station attacks and experimental platform.