Abstract:The number of mobile service users has drastically increased due to the development of mobile communication technologies and commercialisation of high-performance smartphones. As a result, the environment for mobile communication networks has changed into one that allows different types of abnormal traffic to easily flow, so the security threats on the network that had been hidden before have started to emerge. In particular, a 4G network is exposed to multiple forms of attacks that can maliciously use a GPRS Tunneling Protocol (GTP), which is used in LTE communications. In this paper, we present the types of real threats on a 4G mobile grid computing environment that uses a GTP protocol and provides algorithms studied to protect the network from such threats. Also, we have F-score represents the overall accuracy of algorithms was found to be 98.7%.Keywords: GTP; 4G; LTE; security threat; mobile grid computing.Reference to this paper should be made as follows: Park, S., Kim, S., Son, K., Kim, H., Park, J. and Yim, K. (2017) Kangbin Yim received his BS, MS, and PhD from Ajou University, Suwon, Korea in 1992, 1994and 2001. He is currently a full professor in the Department of Information Security Engineering, Soonchunhyang University. He has served as committee chair for international conferences and workshops and editor of the journals such as JIT, MIS, JCPS, and JISIS. His primary research interests include vulnerability assessment, embedded systems security and automobile security. Related to these topics, he has worked on more than 60 research projects and published more than a hundred research papers.