Telecommunication networks: protocols, modeling and analysis
Telecommunication networks: protocols, modeling and analysis
Analysis and simulation of a fair queueing algorithm
SIGCOMM '89 Symposium proceedings on Communications architectures & protocols
Random early detection gateways for congestion avoidance
IEEE/ACM Transactions on Networking (TON)
Practical network support for IP traceback
Proceedings of the conference on Applications, Technologies, Architectures, and Protocols for Computer Communication
Proceedings of the 2002 conference on Applications, technologies, architectures, and protocols for computer communications
IEEE Security and Privacy
A taxonomy of DDoS attack and DDoS defense mechanisms
ACM SIGCOMM Computer Communication Review
Defending against an Internet-based attack on the physical world
ACM Transactions on Internet Technology (TOIT)
New client puzzle outsourcing techniques for DoS resistance
Proceedings of the 11th ACM conference on Computer and communications security
GOCAP -- one standardised overload control for next generation networks
BT Technology Journal
Mitigating attacks on open functionality in SMS-capable cellular networks
Proceedings of the 12th annual international conference on Mobile computing and networking
On attack causality in internet-connected cellular networks
SS'07 Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
Exploiting open functionality in SMS-capable cellular networks
Journal of Computer Security
On cellular botnets: measuring the impact of malicious devices on a cellular network core
Proceedings of the 16th ACM conference on Computer and communications security
Exploiting smart-phone USB connectivity for fun and profit
Proceedings of the 26th Annual Computer Security Applications Conference
Counteracting DDoS attacks in WLAN
Proceedings of the 4th international conference on Security of information and networks
Signaling oriented denial of service on LTE networks
Proceedings of the 10th ACM international symposium on Mobility management and wireless access
Active tracking in mobile networks: An in-depth view
Computer Networks: The International Journal of Computer and Telecommunications Networking
SecureSMS: A secure SMS protocol for VAS and other applications
Journal of Systems and Software
Hi-index | 0.00 |
The transformation of telecommunications networks from homogeneous closed systems providing only voice services to Internet-connected open networks that provide voice and data services presents significant security challenges. For example, recent research illustrated that a carefully crafted DoS attack via text messaging could incapacitate all voice communications in a metropolitan area with little more than a cable modem. This attack highlights a growing threat to these systems; namely, cellular networks are increasingly exposed to adversaries both in and outside the network. In this paper, we use a combination of modeling and simulation to demonstrate the feasibility of targeted text messaging attacks. Under realistic network conditions, we show that adversaries can achieve blocking rates of more than 70% with only limited resources. We then develop and characterize five techniques from within two broad classes of countermeasures--queue management and resource provisioning. Our analysis demonstrates that these techniques can eliminate or extensively mitigate even the most intense targeted text messaging attacks. We conclude by considering the tradeoffs inherent to the application of these techniques in current and next generation telecommunications networks.