Wcdma for Umts
Code red worm propagation modeling and analysis
Proceedings of the 9th ACM conference on Computer and communications security
Convergence Technologies for 3G Networks: IP, UMTS,EGPRS and ATM
Convergence Technologies for 3G Networks: IP, UMTS,EGPRS and ATM
Characteristics of internet background radiation
Proceedings of the 4th ACM SIGCOMM conference on Internet measurement
Why cell phones will dominate the future internet
ACM SIGCOMM Computer Communication Review
Exploiting open functionality in SMS-capable cellular networks
Proceedings of the 12th ACM conference on Computer and communications security
An introduction to access security in UMTS
IEEE Wireless Communications
Interworking architecture between 3GPP and WLAN systems
IEEE Communications Magazine
ACM SIGCOMM Computer Communication Review
Diagnosis of capacity bottlenecks via passive monitoring in 3G networks: An empirical analysis
Computer Networks: The International Journal of Computer and Telecommunications Networking
On attack causality in internet-connected cellular networks
SS'07 Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
Review: A review of DoS attack models for 3G cellular networks from a system-design perspective
Computer Communications
Scanning traffic at the edge of a cellular network
PAM'07 Proceedings of the 8th international conference on Passive and active network measurement
Distribution-based anomaly detection in 3G mobile networks: from theory to practice
International Journal of Network Management
An orchestration approach for unwanted Internet traffic identification
Computer Networks: The International Journal of Computer and Telecommunications Networking
A tool for the generation of realistic network workload for emerging networking scenarios
Computer Networks: The International Journal of Computer and Telecommunications Networking
Selfish manipulation of cooperative cellular communications via channel fabrication
Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks
Hi-index | 0.00 |
The presence of "unwanted" (or background) traffic in the Internet is a well-known fact. In principle any network that has been engineered without taking its presence into account might experience troubles during periods of massive exposure to unwanted traffic, e.g. during large-scale infections. A concrete example was provided by the spreading of Code-Red-II in 2001, which caused several routers crashes worldwide. Similar events might take place in 3G networks as well, with further potential complications arising from their high functional complexity and the scarcity of radio resources. For example, under certain hypothetical network con guration settings unwanted traffic, and specifically scanning traffic from infected Mobile Stations, can cause large-scale wastage of logical resources, and in extreme cases even starvation. Unwanted traffic is present nowdays also in GPRS/UMTS, mainly due to the widespread use of 3G connect cards for laptops. We urge the research community and network operators to consider the issue of 3G robustness to unwanted traffic as a prominent research area.