Mitigating attacks on open functionality in SMS-capable cellular networks

  • Authors:
  • Patrick Traynor;William Enck;Patrick McDaniel;Thomas La Porta

  • Affiliations:
  • College of Computing, Georgia Institute of Technology, Atlanta, GA and Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA;Systems and Internet Infrastructure Security Laboratory, Networking and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA;Systems and Internet Infrastructure Security Laboratory, Networking and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA;Systems and Internet Infrastructure Security Laboratory, Networking and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA

  • Venue:
  • IEEE/ACM Transactions on Networking (TON)
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

The transformation of telecommunications networks from homogeneous closed systems providing only voice services to Internet-connected open networks that provide voice and data services presents significant security challenges. For example, recent research illustrated that a carefully crafted DoS attack via text messaging could incapacitate all voice communications in a metropolitan area with little more than a cable modem. This attack highlights a growing threat to these systems; namely, cellular networks are increasingly exposed to adversaries both in and outside the network. In this paper, we use a combination of modeling and simulation to demonstrate the feasibility of targeted text messaging attacks. Under realistic network conditions, we show that adversaries can achieve blocking rates of more than 70% with only limited resources. We then develop and characterize five techniques from within two broad classes of countermeasures--queue management and resource provisioning. Our analysis demonstrates that these techniques can eliminate or extensively mitigate even the most intense targeted text messaging attacks. We conclude by considering the tradeoffs inherent to the application of these techniques in current and next generation telecommunications networks.