Skip to main content

Cyber Threats, Attack Strategy, and Ethical Hacking in Telecommunications Systems

  • Chapter
  • First Online:
Security and Privacy in Cyberspace

Part of the book series: Blockchain Technologies ((BT))

Abstract

There are rising cybersecurity concerns in the telecommunication sector as hackers intensify their sophistication. The techniques employed by hackers are constantly evolving and so are their tools. Data theft is the end goal for numerous attacks, with hackers seeking predominantly personal data, credentials, and credit card information. Telecom companies are a big target for cyber-attacks because they build, control, and operate critical infrastructure that is widely used to communicate and store large amounts of sensitive data. Hackers often compromise telecommunication systems and attempt to steal users’ information, defraud people and also attack telecom services and infrastructures. Cyber criminals often achieve their aim using different strategies, including the exploitation of vulnerabilities in both software and hardware and other possible loopholes. Given that telecom companies control critical infrastructure, the impact of an attack can be very high and far-reaching, this chapter examines the attack strategies and ethical hacking in telecommunication with a view to help the industry to understand, prepare and defend themselves against existing and potential cyber threats and attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Hallman R, Bryan J, Palavicini G, Divita J, Romero-Mariona J (2017) IoDDoS—the internet of distributed denial of sevice attacks—a case study of the mirai malware and IoT-based botnets. In: Proceedings of the 2nd international conference on Internet of Things, Big Data and Security (IoTBDS 2017), Porto, Portugal, 24–26 April 2017, pp 47–58

    Google Scholar 

  2. https://www.zdnet.com/article/the-hacking-strategies-that-will-dominate-in-2019/

  3. https://www2.deloitte.com/global/en/pages/risk/cyber-strategic-risk/articles/Telecommunications.html

  4. Schneider B (2000) Attack trees: modeling security threats. Dr. Dobb’s J 1:5

    Google Scholar 

  5. Ethical Hacking. Tutorials point Simply Easy Learning, pp 86. https://www.tutorialspoint.com/ethical_hacking/index.htm

  6. Pandey BK, Singh A, Balani B (2015) ETHICAL HACKING (Tools, Techniques and Approaches). In: ICAIM-international conference on advancement in IT and management at: Thakur Institute of Management studies career development and research Thakur Village Kandivali East Mumbai. https://doi.org/10.13140/2.1.4542.2884

  7. Hartley R (2015) Ethical hacking: teaching students to hack. https://doi.org/10.13140/RG.2.1.3580.8085

    Article  Google Scholar 

  8. Maurushat A (2019) Ethical hacking. ISBN 978-0-7766-2792-2. University of Ottawa Press, Ottawa. http://hdl.handle.net/10393/39080

  9. Viduto V, Huang W, Maple C (2011) Toward optimal multi-objective models of network security: survey. In: Proceedings of the 17th International Conference on Automation and Computing (ICAC), Huddersfield, UK, 10 September 2011

    Google Scholar 

  10. Feng N, Wang HJ, Li M (2014) A security risk analysis model for information systems: Causal relationships of risk factors and vulnerability propagation analysis. Inf Sci 256:57–73

    Article  Google Scholar 

  11. Rockson KA, Michael A, Onyema EM (2020) Implementing morpheme-based compression security mechanism in distributed systems. Int J Innov Res Dev (IJIRD) 9(2):157–162. https://doi.org/10.24940/ijird/2020/v9/i2/JAN20092

  12. Roger MN, Michael DS (1978) Using encryption for authentication in large network of computers. Commun ACM 21(12):993–999. https://doi.org/10.1145/359657.359659

  13. Renaud D (2009–2010) Cryptography and computer security. University of Liège, Faculty of Applied Sciences

    Google Scholar 

  14. AGaray J, Jakobsson M, MacKenzie P (1999) Abuse-free optimistic contract signing. In: Advances in cryptology: proceedings of Crypto'99, volume 1666 of lecture notes in computer science, pp 449–466. Springer

    Google Scholar 

  15. Greg O, Michael R (2001) Child-proof authentication for MIPv6 (CAM). Comput Commun Rev (2001)

    Google Scholar 

  16. Ghada G, Aref, M (2018) 6LowPSec: an end-to-end security protocol for 6LoWPAN. Ad Hoc Netw. https://doi.org/10.1016/j.adhoc

  17. IEEE 802.11 Local and Metropolitan Area Networks: Wireless LAN Medium Acess Control (MAC) and Physical (PHY) Specifications (1999)

    Google Scholar 

  18. Philippe B (2001) Architecture expérimentale pour la détection d’intrusions dans un système informatique, 86 p

    Google Scholar 

  19. Carin L, Cybenko G, Hughes J (2008) Cybersecurity strategies: the queries methodology. Computer 41. https://doi.org/10.1109/MC.2008.295

  20. Bravard C, Charroin L, Touati C (2017) Optimal design and defense of networks under link attacks. J Math Econ 68:62–79. https://doi.org/10.1016/j.jmateco.2016.11.006

    Article  MathSciNet  MATH  Google Scholar 

  21. Gold S (2010) Social engineering today: psychology, strategies and tricks. Netw Secur 2010(11):11–14. https://search.proquest.com/docview/787399306?accountid=45049. https://doi.org/10.1016/S1353-4858(10)70135-5

  22. Hamizi M (2017) Social engineering and insider threats, Slideshare.net. https://www.slideshare.net/pdawackomct/7-social-engineeringand-insider-threats. Accessed 08 Aug 2020

  23. Al-Qurishi M, Alrubaian M, Rahman SMM, Alamri A, Hassan MM (2018) A prediction system of Sybil attack in social network using deep-regression model. Futur Gener Comput Syst 87:743–753. https://doi.org/10.1016/j.future.2017.08.030

    Article  Google Scholar 

  24. Harrison B, Svetieva E, Vishwanath A (2016) Individual processing of phishing emails. Online Inf Rev 40(2):265–281. https://search.proquest.com/docview/1776786039

  25. Andress M (2004) Network vulnerability assessment management: eight network scanning tools offer beefed-up management and remediation. Netw World 21(45):48–48, 50, 52. https://search.proquest.com/docview/215973410

  26. Onyema EM, Nwafor CE, Ugwugbo AN, Rockson KA, Ogbonnaya UN (2020) Cloud security challenges: implication on education. Int J Comput Sci Mob Comput 9(2):56–73

    Google Scholar 

  27. Riahla (2009) Introduction à la sécurité informatique. Université de limoge, 56 p

    Google Scholar 

  28. Nmap: the Network Mapper—Free Security Scanner, Nmap.org, 2017. https://nmap.org/. Accessed 20 Jul 2020

  29. Packet Collection and WEP Encryption (2017) Attack & defend against wireless networks—4, Ferruh.mavituna.com. http://ferruh.mavituna.com/paket-toplama-ve-wep-sifresini-kirma-kablosuz-aglara-saldiri-defans-4-oku/. Accessed 21 Jul 2020

  30. Onyema EM, Elhaj MAE, Bashir SG, Abdullahi I, Hauwa AA, Hayatu AS (2020) Evaluation of the performance of k-nearest neighbor algorithm in determining student learning styles. Int J Innov Sci Eng Tech 7(1):91–102

    Google Scholar 

  31. Metasploit Unleashed (2017) Offensive-security.com. https://www.offensive-security.com/metasploit-unleashed/msfvenom/. Accessed 21 Jul 2020

  32. Top 10 Phishing Attacks of 2014—PhishMe, PhishMe (2017). https://phishme.com/top-10-phishing-attacks-2014/. Accessed 19 Jul 2020

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to E. M. Onyema .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Onyema, E.M., Dinar, A.E., Ghouali, S., Merabet, B., Merzougui, R., Feham, M. (2022). Cyber Threats, Attack Strategy, and Ethical Hacking in Telecommunications Systems. In: Kaiwartya, O., Kaushik, K., Gupta, S.K., Mishra, A., Kumar, M. (eds) Security and Privacy in Cyberspace. Blockchain Technologies. Springer, Singapore. https://doi.org/10.1007/978-981-19-1960-2_2

Download citation

Publish with us

Policies and ethics