Detection of abrupt changes: theory and application
Detection of abrupt changes: theory and application
Network support for IP traceback
IEEE/ACM Transactions on Networking (TON)
Ariadne: a secure on-demand routing protocol for ad hoc networks
Proceedings of the 8th annual international conference on Mobile computing and networking
Analysis of a campus-wide wireless network
Proceedings of the 8th annual international conference on Mobile computing and networking
Adaptive performance management for universal mobile telecommunications system networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
3G Wireless Networks
IEEE/ACM Transactions on Networking (TON)
IDMS/PROMS 2002 Proceedings of the Joint International Workshops on Interactive Distributed Multimedia Systems and Protocols for Multimedia Systems: Protocols and Systems for Interactive Distributed Multimedia
Internet intrusions: global characteristics and prevalence
SIGMETRICS '03 Proceedings of the 2003 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
New directions in traffic measurement and accounting: Focusing on the elephants, ignoring the mice
ACM Transactions on Computer Systems (TOCS)
Hop-count filtering: an effective defense against spoofed DDoS traffic
Proceedings of the 10th ACM conference on Computer and communications security
A man-in-the-middle attack on UMTS
Proceedings of the 3rd ACM workshop on Wireless security
Denial of service resilience in ad hoc networks
Proceedings of the 10th annual international conference on Mobile computing and networking
Change-Point Monitoring for the Detection of DoS Attacks
IEEE Transactions on Dependable and Secure Computing
Exploiting open functionality in SMS-capable cellular networks
Proceedings of the 12th ACM conference on Computer and communications security
Low-rate TCP-targeted denial of service attacks and counter strategies
IEEE/ACM Transactions on Networking (TON)
On attack causality in internet-connected cellular networks
SS'07 Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
DoS attacks exploiting signaling in UMTS and IMS
Computer Communications
Journal of Network and Computer Applications
International Journal of Sensor Networks
A panoramic view of 3g data/control-plane traffic: mobile device perspective
IFIP'12 Proceedings of the 11th international IFIP TC 6 conference on Networking - Volume Part I
Flow level detection and filtering of low-rate DDoS
Computer Networks: The International Journal of Computer and Telecommunications Networking
Mobile data charging: new attacks and countermeasures
Proceedings of the 2012 ACM conference on Computer and communications security
Characterization of 3G control-plane signaling overhead from a data-plane perspective
Proceedings of the 15th ACM international conference on Modeling, analysis and simulation of wireless and mobile systems
Measurement and modeling of paging channel overloads on a cellular network
Computer Networks: The International Journal of Computer and Telecommunications Networking
Let me answer that for you: exploiting broadcast information in cellular networks
SEC'13 Proceedings of the 22nd USENIX conference on Security
Hi-index | 0.00 |
Third generation (3G) wireless networks based on the CDMA2000 and UMTS standards are now increasingly being deployed throughout the world. Because of their complex signaling and relatively limited bandwidth, these 3G networks are generally more vulnerable than their wireline counterparts, thus making them fertile ground for new attacks. In this paper, we identify and study a novel denial of service (DoS) attack, called signaling attack, that exploits the unique vulnerabilities of the signaling/control plane in 3G wireless networks. Using simulations driven by real traces, we are able to demonstrate the impact of a signaling attack. Specifically, we show how a well-timed low-volume signaling attack can potentially overload the control plane and detrimentally affect the key elements in a 3G wireless infrastructure. The low-volume nature of the signaling attack allows it to avoid detection by existing intrusion detection algorithms, which are often signature or volume-based. As a counter-measure, we present and evaluate an online early detection algorithm based on the statistical CUSUM method. Through the use of extensive trace-driven simulations, we demonstrate that the algorithm is robust and can identify an attack in its inception, before significant damage is done. Apart from 3G networks, we also show that many emerging wide-area networks such as 802.16/WiMax share the same vulnerability and our solution can also apply.