Intrusion Detection and Prevention in IP Based Mobile Network

Manpreet Kaur
2018 International Journal for Research in Applied Science and Engineering Technology  
This paper presents intrusion detection system (IDS), based on mobile Network, that detects intrusion from outside the network segment as well as from inside. Mobile Companies believes that greater end user knowledge and the possible use of public networks for transportation of telephone traffic will increase threats against telephone networks. The proposed model comprises three major components: The Network Intrusion Detection Component (snort and juniper tool), the Mobile Agent Platform, and
more » ... niffer residing on every device in the network segment. The purpose of this paper is to investigate the needs for an Intrusion Prevention System (IPS). It finds existing security features in mobile Companies. It Conclude requirements for an IPS intended for use in Mobile Company's PRAN environment. Analysis is performed to ident if assets in and threats against RAN and to discover Attacks that can be mitigated using an Intrusion Prevention System. The precautions will help researchers to test the measurements efficiently and the list of simulators will guide them to select one according to their needs. Keywords: Internet protocol, Intrusion detection system, IPS, TCP I. INTRODUCTION IP reduces the need for network lines because it is connection less communication protocol, so it does not communication line between two computers for connect to each other. Information send through packets for communication in two computers. Packet contains information which send to receiver by user, receiver id (receiver IP address) and more. For the mobile telephone alone, it has over 3.2 billion subscribers around the world (GSM Association, 2008). Indeed, many developed countries are experiencing well more than 100% market penetration (ITU, 2007). The modern mobile device can provide a wide range of services over several network connections and is able to store a broad range of information from business to personal data. As a result, many people rely on those services and information to complete their business and personal tasks. Such tasks can include email accessing via wireless network, online shopping through the 3G network, sharing pictures over the Bluetooth connection, and reading word documents. However, those activities can contain sensitive data related to the business and personal private information. The mobile device and mobile network faces several security threats. However, the amount of mobile IDS research is significantly smaller compared to other mobile security projects. Moreover, those existing mobile IDSs were designed to detect the individual security threats: telephony based mobile IDSs only detect telephony service fraud; battery based mobile IDSs only detect battery attacks [5] . Therefore, none of these mobile IDSs can offer the comprehensive detection for the services running on the modern mobile devices. Mobile Company is currently developing a reference solution for an IP network between the Radio Base Station (RBS) and the mobile backbone network. This reference solution comprises what hardware and Software to use, where to place the equipment and how to configure it. The equipment investigated study in this paper will mainly involve those parts that face to the private or semipublic network used as transport medium between the RBS and the backbone network. The analysis of the equipment will focus on finding IPS mechanisms that can be used to protect and detect intrusion attempts against devices used in the PRAN solution. Risk analysis will be performed to rank identified threats in order of loss of assets that a successful attack could result in to the customer and Mobile Company [6]. The paper describes a research programme underway to design, develop and evaluate a novel mobile IDS. The paper then proceeds to present some initial experimental results and concludes with highlighting the future work.
doi:10.22214/ijraset.2018.4720 fatcat:h5v6uxd5q5dkbauupcsgdnckce