Practical network support for IP traceback
Proceedings of the conference on Applications, Technologies, Architectures, and Protocols for Computer Communication
Proceedings of the 2002 conference on Applications, technologies, architectures, and protocols for computer communications
IEEE Security and Privacy
Telling humans and computers apart automatically
Communications of the ACM - Information cities
A taxonomy of DDoS attack and DDoS defense mechanisms
ACM SIGCOMM Computer Communication Review
Defending against an Internet-based attack on the physical world
ACM Transactions on Internet Technology (TOIT)
Impact of paging channel overloads or attacks on a cellular network
WiSe '06 Proceedings of the 5th ACM workshop on Wireless security
Vulnerability Analysis of MMS User Agents
ACSAC '06 Proceedings of the 22nd Annual Computer Security Applications Conference
The Zombie roundup: understanding, detecting, and disrupting botnets
SRUTI'05 Proceedings of the Steps to Reducing Unwanted Traffic on the Internet on Steps to Reducing Unwanted Traffic on the Internet Workshop
Security analysis of the palm operating system and its weaknesses against malicious code threats
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Empirical study of tolerating denial-of-service attacks with a proxy network
SSYM'05 Proceedings of the 14th conference on USENIX Security Symposium - Volume 14
Understanding Resiliency of Internet Topology against Prefix Hijack Attacks
DSN '07 Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks
Can you infect me now?: malware propagation in mobile phone networks
Proceedings of the 2007 ACM workshop on Recurring malcode
On attack causality in internet-connected cellular networks
SS'07 Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
Exploiting open functionality in SMS-capable cellular networks
Journal of Computer Security
SS'08 Proceedings of the 17th conference on Security symposium
SS'08 Proceedings of the 17th conference on Security symposium
Mitigating attacks on open functionality in SMS-capable cellular networks
IEEE/ACM Transactions on Networking (TON)
WebSOS: an overlay-based system for protecting web servers from denial of service attacks
Computer Networks: The International Journal of Computer and Telecommunications Networking - Web security
CAPTCHA: using hard AI problems for security
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
Secure communication mechanisms for GSM networks
IEEE Transactions on Consumer Electronics
Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications
USENIXATC'10 Proceedings of the 2010 USENIX conference on USENIX annual technical conference
Mobile location tracking in metro areas: malnets and others
Proceedings of the 17th ACM conference on Computer and communications security
Evaluating Bluetooth as a medium for botnet command and control
DIMVA'10 Proceedings of the 7th international conference on Detection of intrusions and malware, and vulnerability assessment
Multi-vendor penetration testing in the advanced metering infrastructure
Proceedings of the 26th Annual Computer Security Applications Conference
Evading cellular data monitoring with human movement networks
HotSec'10 Proceedings of the 5th USENIX conference on Hot topics in security
Andbot: towards advanced mobile botnets
LEET'11 Proceedings of the 4th USENIX conference on Large-scale exploits and emergent threats
A SMS-based mobile Botnet using flooding algorithm
WISTP'11 Proceedings of the 5th IFIP WG 11.2 international conference on Information security theory and practice: security and privacy of mobile devices in wireless communication
SMS of death: from analyzing to attacking mobile phones on a large scale
SEC'11 Proceedings of the 20th USENIX conference on Security
A survey of mobile malware in the wild
Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices
Automated remote repair for mobile malware
Proceedings of the 27th Annual Computer Security Applications Conference
A data mining framework for securing 3g core network from GTP fuzzing attacks
ICISS'11 Proceedings of the 7th international conference on Information Systems Security
Design of SMS commanded-and-controlled and P2P-structured mobile botnets
Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks
A first look at cellular machine-to-machine traffic: large scale measurement and characterization
Proceedings of the 12th ACM SIGMETRICS/PERFORMANCE joint international conference on Measurement and Modeling of Computer Systems
What's in a name. . . generator?
Journal in Computer Virology
Mobile data charging: new attacks and countermeasures
Proceedings of the 2012 ACM conference on Computer and communications security
Signaling oriented denial of service on LTE networks
Proceedings of the 10th ACM international symposium on Mobility management and wireless access
Proceedings of the 28th Annual Computer Security Applications Conference
Secure and efficient public key management in next generation mobile networks
Personal and Ubiquitous Computing
Attestation of mobile baseband stacks
NSS'12 Proceedings of the 6th international conference on Network and System Security
Computer Networks: The International Journal of Computer and Telecommunications Networking
Botnet command and control based on Short Message Service and human mobility
Computer Networks: The International Journal of Computer and Telecommunications Networking
Let me answer that for you: exploiting broadcast information in cellular networks
SEC'13 Proceedings of the 22nd USENIX conference on Security
Large-scale measurement and characterization of cellular machine-to-machine traffic
IEEE/ACM Transactions on Networking (TON)
Improving energy efficiency in distributed intrusion detection systems
Journal of High Speed Networks
Hi-index | 0.00 |
The vast expansion of interconnectivity with the Internet and the rapid evolution of highly-capable but largely insecure mobile devices threatens cellular networks. In this paper, we characterize the impact of the large scale compromise and coordination of mobile phones in attacks against the core of these networks. Through a combination of measurement, simulation and analysis, we demonstrate the ability of a botnet composed of as few as 11,750 compromised mobile phones to degrade service to area-code sized regions by 93%. As such attacks are accomplished through the execution of network service requests and not a constant stream of phone calls, users are unlikely to be aware of their occurrence. We then investigate a number of significant network bottlenecks, their impact on the density of compromised nodes per base station and how they can be avoided. We conclude by discussing a number of countermeasures that may help to partially mitigate the threats posed by such attacks.