Title: Real threats using GTP protocol and countermeasures on a 4G mobile grid computing environment

Authors: Seongmin Park; Sekwon Kim; Kyungho Son; Hwankuk Kim; Junyoung Park; Kangbin Yim

Addresses: Security Industry Technology Division, Korea Internet & Security Agency, Seoul, South Korea ' Security Industry Technology Division, Korea Internet & Security Agency, Seoul, South Korea ' Security Industry Technology Division, Korea Internet & Security Agency, Seoul, South Korea ' Security Industry Technology Division, Korea Internet & Security Agency, Seoul, South Korea ' Department of Information Security Engineering, Soonchunhyang University, Asan, South Korea ' Department of Information Security Engineering, Soonchunhyang University, Asan, South Korea

Abstract: The number of mobile service users has drastically increased due to the development of mobile communication technologies and commercialisation of high-performance smartphones. As a result, the environment for mobile communication networks has changed into one that allows different types of abnormal traffic to easily flow, so the security threats on the network that had been hidden before have started to emerge. In particular, a 4G network is exposed to multiple forms of attacks that can maliciously use a GPRS Tunneling Protocol (GTP), which is used in LTE communications. In this paper, we present the types of real threats on a 4G mobile grid computing environment that uses a GTP protocol and provides algorithms studied to protect the network from such threats. Also, we have F-score represents the overall accuracy of algorithms was found to be 98.7%.

Keywords: GPRS Tunneling Protocol; GTP; 4G; LTE communications; long-term evolution; security threats; mobile computing; grid computing; network security; mobile services.

DOI: 10.1504/IJWGS.2017.082060

International Journal of Web and Grid Services, 2017 Vol.13 No.1, pp.3 - 24

Received: 12 Dec 2015
Accepted: 24 Jun 2016

Published online: 06 Feb 2017 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article