Mobile network operators are trailing their fixed-line counterparts by several years in regards to security, with many experiencing outages and other problems due to the use of outdated security technology, according to a new report released Tuesday by Arbor Networks. Mobile network operators are trailing their fixed-line counterparts by several years in regards to security, with many experiencing outages and other problems due to the use of outdated security technology, according to a new report released Tuesday by Arbor Networks.As demand for mobile Internet access has grown, mobile operators have focused on growing revenue rather than securing their infrastructure, said Paul Scanlon, a solutions architect for Arbor. Mobile operators are eight to 10 years behind their fixed-line counterparts when it comes to security, he said.“They’re just not keeping pace with state-of-the-art security solutions,” Scanlon said.Arbor surveyed 111 network operators for its Worldwide Infrastructure Security Report, which covers a period from October 2009 to September 2010. Forty-six percent of respondents said security-related outages on their networks had affected customers.Among the causes of the outages were denial-of-service attacks, where an attacker prevents legitimate users from accessing a service, either by crashing it or clogging up network access to it. DOS attacks had been particularly effective against “stateful” devices, such as network address translation (NAT) services, firewalls and intrusion protection systems. Those devices often record all transactions between a client and a server and check those transactions against a policy, Scanlon said. One way to conduct a successful DOS attack is to push those devices to the limit with lots of traffic.There are better carrier-grade NAT devices on the market, which are typically embedded in a firewall, Scanlon said. Still, there are no devices that can handle a massive influx of traffic, he said.Another tactic for hackers is to attack DNS (Domain Name System) servers, which translate domain names into IP (Internet Protocol) addresses so that, for example, e-mail can be delivered or Web sites can be displayed in a browser.DNS servers can be repeatedly queried for domain names that the attacker knows do not exist. “You can affect a large population of folks and their ability to reach websites with one attack on a DNS resolver that asks the ISP’s server for information it doesn’t know,” Scanlon said.Mobile operators also have poor visibility on what is exactly going on their network, Scanlon said. “In terms of visibility into the network traffic of their wireless packet cores and their ability to classify core traffic as potentially harmful, 59 percent of respondents indicated they have limited or no visibility whatsoever,” according to the report. “Only 23 percent indicated they have visibility into their wireless packet cores on par with or better than their visibility into their wireline packet cores.” Many carriers can’t do operating system fingerprinting, which would indicate whether for example an Android device or an iPhone or a laptop with a 3G card is connecting to their network.“Other than usage and volume of traffic, it’s hard to track how many machines are behind the card,” Scanlon said. Related content news UK Cyber Security Council CEO reflects on a year of progress Professor Simon Hepburn sits down with broadcaster ITN to discuss Council’s work around cybersecurity professional standards, careers and learning, and outreach and diversity. By Michael Hill Sep 27, 2023 3 mins Government Government Government news FIDO Alliance certifies security of edge nodes, IoT devices Certification demonstrates that products are at low risk of cyberthreats and will interoperate securely. By Michael Hill Sep 27, 2023 3 mins Certifications Internet Security Security Hardware news analysis Web app, API attacks surge as cybercriminals target financial services The financial services sector has also experienced an increase in Layer 3 and Layer 4 DDoS attacks. By Michael Hill Sep 27, 2023 6 mins Financial Services Industry Cyberattacks Application Security news Immersive Labs adds custom 'workforce exercising' for each organizational role With the new workforce exercising capability, CISOs will be able to see each role’s cybersecurity readiness, risk areas, and exercise progress. By Shweta Sharma Sep 27, 2023 3 mins Security Software Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe