Multi Service Proxy: Mobile Web Traffic Entitlement Point in 4G Core Network

Dalibor Uhlir, Dominik Kovac, Jiri Hosek

Abstract


Core part of state-of-the-art mobile networks is composed of several standard elements like GGSN (Gateway General Packet Radio Service Support Node), SGSN (Serving GPRS Support Node), F5 or MSP (Multi Service Proxy). Each node handles network traffic from a slightly different perspective, and with various goals. In this article we will focus only on the MSP, its key features and especially on related security issues. MSP handles all HTTP traffic in the mobile network and therefore it is a suitable point for the implementation of different optimization functions, e.g. to reduce the volume of data generated by YouTube or similar HTTP-based service. This article will introduce basic features and functions of MSP as well as ways of remote access and security mechanisms of this key element in state-of-the-art mobile networks.

Full Text:

PDF

References


Cisco Visual Networking Index: Forecast and Methodology, 2013.

http://www:cisco:com/c/en/us/solutions/collateral/service-provider/ipngn-

ip-next-generation-network/white paper c11-481360:html/

G. Maier, A. Feldmann, V. Paxson, and M. Allman, On dominant characteristics of residential broadband internet traffic, in Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference, ser. IMC 09. New York, NY, USA: ACM, 2009, pp. 90-102.

C. Labovitz, S. Iekel-Johnson, D. McPherson, J. Oberheide, and F.

Jahanian, Internet Inter-Domain Traffic, in Proc. of the ACM SIGCOMM

Conference on SIGCOMM, New Delhi, India, Aug. 2010.

J. Erman, A. Gerber, M. T. Hajiaghayi, D. Pei, and O. Spatscheck,

Network-Aware Forward Caching, in WWW. ACM, 2009, pp. 291 300.

A. Kalgaonkar: ATT Matrix 1.0 Project - Workflow Scripts Administration Guide, 2013.

Apple Inc., iOS Security - White Paper, 2015.

Wikipedia contributors. ”Public-key cryptography.” Wikipedia, The Free Encyclopedia. 2015.

C. Timberg: ”Huge flaw that undermines privacy of mobile phone

networks revealed by German researchers”, Washington Post, 2014.

F. Herrgoss, Gus Bourg, Kieran Kavanagh: Calico 2.3, 2011.

I. Ristic, Is BEAST Still a Threat?, Qualys Blog, 2013. Available

from: https://community:qualys:com/blogs/securitylabs/2013/09/10/

is-beast-still-a-threat

M. Ray, Understanding the TLS Renegotiation Attack, Educated Guesswork, 2009. Available from: http://www:educatedguesswork:org/2009/11/

understanding the tls renegoti:html

H. Zhang, Three attacks in SSL protocol and their solutions, University of Auckland, 2011. Available from: https://www:cs:auckland:ac:nz/

courses/compsci725s2c/archive/termpapers/725zhang:pdf

B. Maller, T. Duong, K. Kotowicz, This POODLE Bites: Exploiting The SSL 3.0 Fallback Security Advisory, Google, 2014.

J. Lv, B. Zhang, D. Lin, Distinguishing Attacks on RC4 and A New

Improvement of the Cipher, 2013. Available from: https://eprint:iacr:org/

/176:pdf

A. Borges, How to perform a Heartbleed Attack, 2014. Available from:

http://alexandreborgesbrazil:files:wordpress:com/2014/04/heartbleed

article rev b:pdf




DOI: http://dx.doi.org/10.11601/ijates.v4i2.109

Refbacks

  • There are currently no refbacks.