Apply Digital forensic technique to diagnose the cyber security threat to the Advanced IP based Mobile telephony Networks. Indian Telecom Market having a huge subscriber base. The Market adapts the new technology Long Term Evolution (LTE), VoLTE, IP Multimedia Subsystem. Hacking the Mobile Network is a major threat to the telecom ecosystem impacts the subscribers and operator seriously. The paper illustrates investigation on the strategy to Dissect and penetrate into JIO’s Network to identify the loop holes and data leaks in the Network pipe. Using the loop holes, the network may subject to attacks, hijacked, data stealth. We have followed out a grey hat technique to an extent, to continue the process and explore network nodal entry gaps to access the systems and flood anonymous traffic in to the network. We may require the Network operator’s permission to dig deeper, investigate further provide an authenticated report. The research and the reports of this paper is carried out by thorough understanding of user limits privileges provided by the network to a normal subscriber. It’s very clear the access is open to every subscriber and not crossed the network boundary limits. The investigation results bring an alarm to telecom network and its stake holders. With recent advancements like 5G, WSN, IOT, IoE, SDN-NFV the stakeholders keep increasing and expanding brings industrial convergence. With this aspect the stakeholder’s groups of telecom imbibes a huge impact across the industries and normal life. This research approach is just a sample on JIO’s Network, this can be carried out on all the Networks in the Indian Market or global Market to ensure no gaps in their network security. The idea is to sniff packets in the network through user agents like Mobile phones and do a deep packet investigation along with the understanding of network interfaces and protocols. Identify the gaps in the Core networks interfaces and the entities in the Network through call flow scenarios PS Mobile originating/ Terminating call and SMS tracing. The paper describes the initial phase of Dissecting and penetrating the Network. By having the operators Permission, we may drill down deeper investigation in this approach and analyses the crucial impacts, damage and Collateral damages to their Network. KEYWORDS Cyber Security, Digital Forensic, Mobile Network security, Network Penetration, Packet sniffing, Deep Packet Inspection.
Read full abstract