VoIP Business and Virtual PBX
Communication Systems

Rapid LTE Growth Leaves Security Gaps due to High Traffic

AdaptiveMobile, the world leader in mobile security, has identified areas of security weaknesses on LTE (Long Term Evolution, latest standard in the mobile network technology) networks due in some cases to the rapid proliferation of devices and traffic. The company has published a white paper on LTE (Long Term Evolution, latest standard in the mobile network technology) Security, analyzing the major weaknesses on the network, with applications and among legacy systems. Ironically, it is the benefits associated with LTE (Long Term Evolution, latest standard in the mobile network technology) - the increased speeds and ability to handle high volumes of data -- that leave mobile operators, consumers and enterprises vulnerable to LTE (Long Term Evolution, latest standard in the mobile network technology) threats that will be wider and deeper than those seen earlier.

Evolution of existing network technologies

Because LTE is an evolution of existing network technologies and legacy systems, the threats that can affect it are varied and complex. Take for instance the application level which requires security evaluation and standards across a wide arrange of communications, including email, MMS, IMS-based messaging, OTT messaging, VoIP (Voice over Internet Protocol) calls, social network interactions, mobile-app generated traffic, M2M communications and additional protocols that are evolving.

There are as well a host of economic, social and technological factors that could make LTE threat detection difficult in the short-term. The cst for mobile IP, on which LTE is based, means that the cost to send spam or generate malicious traffic is reduced. Similarly, higher data rates combined with the proliferation of IP devices will result in an increase in persons perpetuating threats and will make identifying infected devices far more difficult than on traditional networks. More capable devices with greater processing power will increase the ability to run botnets and viruses. LTE will transform existing technologies, just as messaging, which will allow for multiple users and easier file sharing. With these increased benefits comes greater difficulty in implementing spam and malware links. Securing LTE will require offline event processing to detect new threats, combined with real-time event handling, similar to what database and enterprise security has been using.

"As devices and networks become smarter, faster and more powerful, so must the way the mobile network views the threat landscape," said Cody Bowman, General Manager for the Americas at AdaptiveMobile. "This new model for security will take into account user behavior as so then as an active, real-time look at network traffic and possible threats. Only through this holistic approach will the LTE experience be secure, allowing consumers and enterprise clients a safe environment."

The world leader in mobile security

AdaptiveMobile is the world leader in mobile security, enabling trusted networks for the world's largest operator groups and protecting one in six subscribers globally. AdaptiveMobile provides Operators with the most comprehensive network-based security solutions enabling them to protect their consumer and enterprise clients against the growing threat of mobile abuse. www.adaptivemobile.com

More information: Tmcnet
References:
  • ·

    Weakness "long Term Evolution" Security

  • ·

    Long Term Evolution+weakness

  • ·

    Weakness Long Term Evolution