Proceedings of the 16th ACM Conference on Computer and Communications Security 2009
DOI: 10.1145/1653662.1653690
|View full text |Cite
|
Sign up to set email alerts
|

On cellular botnets

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2010
2010
2017
2017

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 149 publications
(4 citation statements)
references
References 19 publications
0
4
0
Order By: Relevance
“…Previous works have reported attacks against 2G and 3G access network protocols [2], [55], core network protocols [56], [57], [58], [59], as well as services [60]. In passive attacks, Kune et al [2] showed that despite the use of temporary IDs, the location of a subscriber's UE in a GSM network can be leaked.…”
Section: Related Workmentioning
confidence: 99%
“…Previous works have reported attacks against 2G and 3G access network protocols [2], [55], core network protocols [56], [57], [58], [59], as well as services [60]. In passive attacks, Kune et al [2] showed that despite the use of temporary IDs, the location of a subscriber's UE in a GSM network can be leaked.…”
Section: Related Workmentioning
confidence: 99%
“…General packet radio service (GPRS) offers strong security protocols for data transmission as well as a range of authentication mechanisms that make the packet sniffing procedure a demanding task. However, Traynor et al in [31] demonstrated that a botnet of poorly secured mobile phones could be utilised to cause significant availability issues in the examined cellular network. The present work aims to address the increasingly sophisticated attacks that may occur in such networks.…”
Section: Ddos Attacksmentioning
confidence: 99%
“…However, in order to make the attack successful, the state-of-the-art attack methodologies [6] are based on GSM network alone and require the availability of botnets with more than 10.000 smartphones with valid SIM modules. In this work, we have explored a different approach, leveraging the 3G UMTS network and evaluating the possibility to bypass the strict timings enforced by the cellular network protocols by means of radio devices different from the ones available on the consumer market.…”
Section: Conclusion and Future Scopementioning
confidence: 99%
“…This attack exclusively operates at the user-level by relying on unavoidable protocol level signalling features so that no hacking on intra-operator facilities is needed. It is indirectly targeted at the Home Location Register (HLR) that is the database containing information on mobile subscribers as well as call blocking and forwarding rules that can be overwhelmed by service requests [6]. Since this database is a critical component, often revealing to be a major bottleneck within the overall infrastructure, an outage of its functionality may cause an interruption of other mobile services too, finally resulting in a mobile network DoS potentially leaving thousands of devices without their lifelines to the network core.…”
Section: Introductionmentioning
confidence: 99%