Monitoring and Protection Techniques

01 January 2015

New Image

This chapter discusses techniques for the protection of mobile communications, services, users and applications. Real‐time network analysis and protection techniques are summarized such as deep packet investigation, virus protection and Legal/Lawful interception (LI). The protection needs to be scalable in order to provide carrier‐grade IPSec throughput and performance and to minimize any network latency. The protection of the Gp/S8 interface shields the packet core network against malicious intentions regarding roaming, i.e., when users are connected to services via other mobile network operator (MNO) networks. Performance monitoring and fault management of the networks can be considered an integral part of the security assurance. LI has been designed for authorized access to the communications of commercial, government and military environments. LI provides the means for mobile and fixed network operators and service providers to collect traffic and identification information of private or organizational communications for post‐analysis for law enforcement officials.