2013 International Conference on Selected Topics in Mobile and Wireless Networking (MoWNeT) 2013
DOI: 10.1109/mownet.2013.6613793
|View full text |Cite
|
Sign up to set email alerts
|

Botnets in 4G cellular networks: Platforms to launch DDoS attacks against the air interface

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(3 citation statements)
references
References 10 publications
0
3
0
Order By: Relevance
“…Another major category of DoS a acks arise from SMS-capable interfaces from IMS domain and from public Internet where operators have least control [48,54,173,175]. Similarly, cellular botnets [97,174] (including SMS-botnets [67,185]) can launch DoS a acks from a large army of compromised UEs.…”
Section: Impactsmentioning
confidence: 99%
“…Another major category of DoS a acks arise from SMS-capable interfaces from IMS domain and from public Internet where operators have least control [48,54,173,175]. Similarly, cellular botnets [97,174] (including SMS-botnets [67,185]) can launch DoS a acks from a large army of compromised UEs.…”
Section: Impactsmentioning
confidence: 99%
“…There has been some recent research on DoS attacks against the LTE air interface. For example, the authors of [19] use simulations to determine the number of attackers needed to degrade service of legitimate VoIP users. Although peripherally similar to our work in scope, this research does not examine the impact of a botnet due to various QoS requirements nor does it provide results from a real-world environment.…”
Section: Botnet Threats In Cellular Networkmentioning
confidence: 99%
“…Such unauthorized usage can be as simple as utilizing mobile phone networks without paying the service provider or as serious as using an SDR to distribute malware to legitimate users without their knowledge. The consequences of malware spread in this manner can be damaging to the point of causing complete network outages [20]. Violators can even cause network disruptions by using SDRs to simply send out a jamming signal.…”
Section: Introductionmentioning
confidence: 99%