Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2012, Proceedings of the 10th ACM international symposium on Mobility management and wireless access - MobiWac '12
Long Term Evolution (LTE) is seen as the key enabler for delivering the fourth generation of mobile broadband and is the first cellular network primarily designed based on IP. Thus, telecom operators must support the diverse IP-based mobile applications and all the overhead associated with such applications which is mainly in the a result of the increased signaling traffic. By taking advantage of the signaling overhead, a malicious user can cause severe overload on the operator's infrastructure denying legitimate users from accessing the network. This work presents a study of a denial of service (DoS) oriented signaling attack against LTE networks that takes advantage of the signaling overhead required to set up dedicated radio bearers. The attack scenario is simulated in OPNET, and the signaling traces are analyzed. Results show that a well-coordinated attack creates significant stress on the operator's resources and inhibits legitimate subscribers from obtaining proper services. Then, a detection mechanism that can be used to thwart such attacks is proposed.
2013 27th International Conference on Advanced Information Networking and Applications Workshops, 2013
Attacks on the signaling plane have been well documented for different generations of cellular networks. The effects of these attacks vary from a decrease in the quality of service (QoS) all the way to a denial of service (DoS). Long Term Evolution (LTE) is the next generation cellular network that is primarily designed based on the IP protocol and is expected to achieve wide scale adoption worldwide. LTE employs a different network architecture than its predecessors that should allow for more efficient processing of signaling and data packets. In this paper, we investigate the effects of signaling attacks against LTE networks. An attack consists of malicious users who take advantage of the signaling overhead required to setup and release dedicated bearers in order to overload the signaling plane by repeatedly triggering dedicated bearers requests. The attack is simulated in OPNET under diverse scenarios in order to assess the effects of the increased signaling on the different LTE network entities. The results show that the increased signaling traffic causes higher processing loads at the Enhanced Node-B (eNB) as well as the Evolved Packet Core. We also present a comparison of the signaling requirements in LTE and UMTS.
2013 Third International Conference on Communications and Information Technology (ICCIT), 2013
Quality of Service (QoS) assurances are essential for users requesting diverse services in cellular networks. Towards that end, Long Term Evolution (LTE) networks support procedures that assure the appropriate QoS of different applications that users demand, through the concept of bearers. A bearer is the central element of QoS in LTE and several bearers are standardized, each having its QoS parameters according to the application type it carries. In this work, we describe an attack in which a small number of users maliciously reserve the resources at the Enhanced-NodeB (eNB) in an LTE network by requesting high bandwidth bearers while strategically having a low Modulation and Coding Scheme. The attack is implemented and simulated in OPNET to verify its feasibility and effect on decreasing the QoS experienced by other users. Results show that two malicious users can cause denial of service for all other users of the same cell requesting TCP-based applications.
The main objective of 3GPP long term evolution (LTE) is to provide a secure communication, high data rate and better communication for 4G users. LTE support all IP based data and voice with speed in order of hundreds of mega-bytes per second. Increase speed in accessing internet. Network to be attached by hackers using some attacks like spyware ,malware ,Denial-of-Service (DoS) and Distributed Denial-of-Service(DDoS) .This paper associated with security problem in LTE network and brief summary of DoS attack , DDoS attack and security vulnerabilities in LTE networks.
Universal Journal of Electrical and Electronic Engineering, 2020
This paper is about security assaults in LTE/LTE-A Systems. The Long haul Development (LTE)/LTE-Progressed (LTE-An) arrange gives propelled administrations to billions of clients with its higher transfer speeds, better range effectiveness, and lower dormancy than heritage cell systems. Be that as it may, regardless of whether it experiences new security dangers because of its everything IP-based heterogeneous design. Accordingly, there is a basic need to play out a fast and precise system security estimation in LTE/LTE-A system. To accomplish LTE/LTE-A system security estimation, security-applicable information (in short security information) assortment and information examination for assault discovery are required as essentials. Be that as it may, the majority of the current work just spotlights on information assortment and examination for a specific sort of LTE/LTE-An assaults. Little work has been done to exhaustively perform information assortment and examination for identifying different assaults on LTE/LTE-A system. Not quite the same as past work, In this paper we focused on DOS, DDOS Man-in-the-Center (MitM) assaults, rebel base station assaults and the answers for such assaults were broken down to secure LTE and LTE-A systems
2019
LTE (Long Term Evolution) also known as 4G, is highly in demand for its incomparable levels of experience like high data rates, low latency, good Quality of Services (QoS) and roaming features. LTE uses Diameter protocol, which makes LTE an all IP network, connecting multiple network providers, providing flexibility in adding nodes and flexible mobility management while roaming. Which in turn makes LTE network more vulnerable to malicious actors. Diameter protocol architecture includes many nodes and the communication between the nodes is done through request and answer messages. Diameter manages the control session. Control session includes the signaling traffic which consists of messages to manage the user session. Roaming signaling traffic arises due to subscribers movement out of the geographical range of their home network to any other network. This signaling traffic moves over the roaming interconnection called S9 roaming interface. This thesis project aims to interfere and manipulate traffic from both user-tonetwork and network-to-network interfaces in order to identify possible security vulnerabilities in LTE roaming. A fake base-station is installed to establish a connection to a subscriber through the air interface. The IMSI (International Mobile Subscription Identity) is captured using this fake station. To explore the network-tonetwork communication an emulator based LTE testbed is used. The author has investigated how Diameter messages can be manipulated over the S9 interface to perform a fraud or DoS attack using the IMSI number. The consequences of such attacks are discussed and the countermeasures that can be considered by the MNOs (Mobile Network Operators) and Standardization Committees.
Journal of ICT Standardization
Mobile communication systems are ubiquitous nowadays. The main requirements of these networks are privacy and security of the subscriber as well as a high performance. To provide these properties the 3GPP (Third Generation Partnership Project) developed the LTE (Long Term Evolution) mobile communication network which is deployed worldwide. In this paper, we give a brief overview of the LTE Network Architecture as well as a look on the security mechanism as defined by 3GPP. We describe the security architecture and discuss possible threats and attacks on the core and on the access network. Due to these possible attacks we developed a program which is able to extract certain security relevant information out of the message flow in real time and to detect a possible attach flood attack. Finally, we validate the function of the program with three test cases and discuss the impact of such flood attacks on the LTE network and other future work to extend it to other protocol exchanges.
IEEE Transactions on Dependable and Secure Computing, 2014
One of the fundamental security elements in cellular networks is the authentication procedure performed by means of the Subscriber Identity Module that is required to grant access to network services and hence protect the network from unauthorized usage. Nonetheless, in this work we present a new kind of denial of service attack based on properly crafted SIM-less devices that, without any kind of authentication and by exploiting some specific features and performance bottlenecks of the UMTS network attachment process, are potentially capable of introducing significant service degradation up to disrupting large sections of the cellular network coverage. The knowledge of this attack can be exploited by several applications both in security and in network equipment manufacturing sectors.
Achievements and Trends, 2014
The increase of the number of smart devices using mobile networks' services is followed by the increase of the number of security threats for mobile devices, generating new challenges for mobile network operators. Signaling attacks and storms represent an emerging type of distributed denial of service (DDoS) attacks and happen because of special malware installed on smart devices. These attacks are performed in the control plane of the network, rather than the data plane, and their goal is to overload the signaling servers which leads to service degradation and even network failures. This paper proposes a detection and mitigation mechanism of such attacks which is based on counting repetitive bandwidth allocations by mobile terminals and blocking the misbehaving ones. The mechanism is implemented in our simulation environment for security in mobile networks SECSIM. The detector is evaluated calculating the probabilities of false positive and false negative detection and is characterised by very low negative impact on un-attacked terminals. Simulation results using joint work of both detector and mitigator, are shown for: the number of allowed attacking bandwidth allocations, end-to-end delay for normal users, wasted bandwidth and load on the signaling server. Results suggest that for some particular settings of the mechanism, the impact of the attack is successfully lowered, keeping the network in stable condition and protecting the normal users from service degradations.
International Journal of Advanced Computer Science and Applications, 2021
With the advent of 5th generation (5G) technology, the mobile paradigm witnesses a tremendous evolution involving the development of a plethora of new applications and services. This enormous technological growth is accompanied with an huge signaling overhead among 5G network elements, especially with emergence of massive devices connectivity. This heavy signaling load will certainly be associated with an important security threats landscape, including denial of service (DoS) attacks against the 5G control plane. In this paper, we analyse the performance of a defense mechanism based randomization technique designed to mitigate the impact of DoS signaling attack in 5G system. Based on massive machine-type communications (mMTC) traffic pattern, the simulation results show that the proposed randomization mechanism decreases significantly the signaling data volume raised from the new 5G Radio Resource Control (RRC) model under normal and malicious operating conditions, which up to 70% while avoiding the unnecessary resource consumption.
Computer Communications, 2010
Third-generation cellular networks are exposed to novel forms of denial-of-service attacks that only recently have started to be recognized and documented by the scientific community. In this contribution, we review some recently published attack models specific for cellular networks. We review them collectively in order to identify the main system-design aspects that are ultimately responsible for the exposure to the attack. The goal of this contribution is to build awareness about the intrinsic weaknesses of 3G networks from a system-design perspective. In doing that we hope to inform the design practice of future generation networks, motivating the adoption of randomization, adaptation and prioritization as central ingredients of robust system design.
Zeki sistemler teori ve uygulamaları dergisi, 2023
In today's digital landscape, Distributed Denial of Service (DDoS) attacks stand out as a formidable threat to organisations all over the world. As known technology gradually advances and the proliferation of mobile devices, cellular network operators face pressure to fortify their infrastructure against these risks. DDoS incursions into Cellular Long-Term Evolution (LTE) networks can wreak havoc, elevate packet loss, and suboptimal network performance. Managing the surges in traffic that afflict LTE networks is of paramount importance. Queue management algorithms emerge as a viable solution to wrest control over congestion at the Radio Link Control (RLC) layer within LTE networks. These algorithms work proactively, anticipating, and mitigating congestion by curtailing data transfer rates and fortifying defences against potential DDoS onslaughts. In the paper, we delve into a range of queue management methods Drop-Tail, Random Early Detection (RED), Controlled Delay (CoDel), Proportional Integral Controller Enhanced (PIE), and Packet Limited First In, First Out queue (pFIFO). Our rigorous evaluation of these queue management algorithms hinges on a multifaceted assessment that encompasses vital performance parameters. We gauge the LTE network's resilience against DDoS incursions, measuring performance based on end-to-end delay, throughput, packet delivery rate (PDF), and fairness index values. The crucible for this evaluation is none other than the NS3 simulator, a trusted platform for testing and analysis. The outcomes of our simulations provide illuminating insights. CoDel, RED, PIE, pFIFO, and Drop-Tail algorithms emerge as top performers in succession. These findings underscore the critical role of advanced queue management algorithms in fortifying LTE networks against DDoS attacks, offering robust defences and resilient network performance.
2006
Abstract Recently voice over IP (VoIP) is experiencing a phenomenal growth. Being a real-time service, VoIP is more susceptible to denial-of-service (DoS) attacks than regular Internet services. Moreover, VoIP uses multiple protocols for call control and data delivery, making it vulnerable to various DoS attacks at different protocol layers. An attacker can easily disrupt VoIP services by flooding TCP SYN packets, UDP-based RTP packets, or SIP-based INVITE messages, which pose a critical threat to IP telephony.
Mobile telephony based on UMTS uses finite-state control schemes for wireless channels and for signaling across the network. These schemes are used systematically in various phases of the communication and are vulnerable to attacks that can bring down the network through unjustified bandwidth allocation and excessive signaling across the control plane. In this paper we identify those system parameters which are critical to the success of such attacks, and propose changes that can limit the effect of the attack. The approach is based on establishing a mathematical model of a UMTS system that is undergoing attacks, and on showing how parameters can be optimally modified to minimise the effect of the attack as experienced by the mobile device and the network.
In this paper we consider security of internet access over the Third Generation (3G) telecommunication systems. We Consider Universal Mobile Telecommunications System (UMTS) is selected as the most popular system among 3G systems. Here we detecting and removing DDos attack in UMTS network. The study then focuses on network access security mechanism of UMTS denial of service, identity catching, and redirection as the most significant attacks against authentication mechanism. Furthermore, we provide some solutions and methods to improve and prevent these attacks in UMTS system. The Universal Mobile Telecommunication System, more commonly known as UMTS, is now the world's leading mobile telecommunication system serving over 4 billion subscribers worldwide. UMTS has got much popularity as the earlier GSM system failed to cope up with higher data rate demands and faced some major security flaws. Although the UMTS system is able to mitigate most of those security flaws, yet it is not invincible to the new threats emerging with new and more sophisticated technologies. Many different kinds of security breaches are possible against UMTS networks. In this short technical essay, we will focus only on the Denial of Service (DoS) attacks on the UMTS access network, we replace GSM network with UMTS network because of security flaws. Distributed Denial of Service (DDoS) attacks exhaust victim's bandwidth or services. In this paper, different types and techniques of DDoS attacks and their countermeasures are reviewed. We also discuss some traditional methods of defence such as trace back and packet filtering techniques so that readers can identify major differences between traditional and current techniques of defence against DDoS attacks. Before the discussion on countermeasures, we mention different attack types under DDoS with traditional and advanced schemes while some information on DDoS trends in the year 2012 Quarter-1 is also provided. We identify that application layer DDoS attacks possess the ability to produce greater impact on the victim as they are driven by legitimate-like traffic making it quite difficult to identify and distinguish from legitimate requests. The need of improved defence against such attacks is therefore more demanding in research. The study conducted in this paper can be helpful for readers and researchers to recognize better techniques of defence in current times against DDoS attacks and contribute with more research on the topic in the light of future challenges identified in this paper.
IEEE Access, 2018
The long-term evolution (LTE)/LTE-advanced (LTE-A) network provides advanced services for billions of users with its higher bandwidths, better spectrum efficiency, and lower latency than legacy cellular networks. But it still suffers from new security threats due to its all IP-based heterogeneous architecture. Therefore, there is a critical need to perform a rapid and accurate network security measurement in the LTE/LTE-A network. To achieve LTE/LTE-A network security measurement, security-relevant data (in short security data) collection and data analysis for attack detection are required as prerequisites. However, most of the existing work only focuses on data collection and analysis for a certain type of LTE/LTE-A attacks. Little work has been done to comprehensively perform data collection and analysis for detecting various attacks on the LTE/LTE-A network. Different from previous work, in this paper, we review the security data collection and data analysis methods in terms of various attacks in order to provide the basis of security measurement in the LTE/LTE-A network. We first present a comprehensive taxonomy of attacks according to the LTE/LTE-A network structure. Then, we propose a number of criteria for evaluating the performance of data collection and analysis methods. And we lay our emphasis on the survey of data collection and analysis methods for significant active attack detection in the LTE/LTE-A network. All the reviewed methods are analyzed and discussed based on the proposed evaluation criteria. Furthermore, current open issues and future research challenges are presented with a view to stimulating future research. Finally, an adaptive data collection and data analysis model for security measurement in the LTE/LTE-A network is proposed.
The advent of mobile smart phones has led to a surge in numerous applications with a lot of network traffic. This in turn leads to signal storm attacks from malicious users, who disrupt the system by creating signaling storms. Malware attacks are quickly becoming a major security concern due to the advent of smart mobile devices and the increasing capacity and use of mobile networks for Internet access. The increasing number of host mobile malware adds to the problem. The infected devices cause a cascading effect creating signaling and network disruptions both deliberately and also due to malicious attacks. A signaling storm is one where the users are denied service by making huge attacks on the resources of the system either directly or indirectly taking control of other nodes in the network and sending huge amounts of request signals. This causes flooding, identity problems, injection attacks etc. The purpose is to detect such signaling storms in the first place. Next using the proposed hybrid Radio Resource protocol such attacks should be blocked and the malicious node should be removed from the network. The revocation will show sufficient congestion relief in the network traffic.
Voice over IP (VoIP) is more susceptible to Denial of Service attacks than traditional data traffic, due to the former's low tolerance to delay and jitter. We describe the design of our VoIP Vulnerability Assessment Tool (VVAT) with which we demonstrate vulnerabilities to DoS attacks inherent in many of the popular VoIP applications available today. In our threat model we assume an adversary who is not a network administrator, nor has direct control of the channel and key VoIP elements. His aim is to degrade his victim's QoS without giving away his presence by making his attack look like a normal network degradation. Even black-boxed, applications like Skype that use proprietary protocols show poor performance under specially crafted DoS attacks to its media stream. Finally we show how securing Skype relays not only preserves many of its useful features such as seamless traversal of firewalls but also protects its users from DoS attacks such as recording of conversations and disruption of voice quality. We also present our experiences using virtualization to protect VoIP applications from 'insider attacks'.
2018
Please check the manuscript for details of any other licences that may have been applied and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. You may not engage in further distribution of the material for any profitmaking activities or any commercial gain. You may freely distribute both the url (http://uhra.herts.ac.uk/) and the content of this paper for research or private study, educational, or not-for-profit purposes without prior permission or charge. Take down policy If you believe that this document breaches copyright please contact us providing details, any such items will be temporarily removed from the repository pending investigation.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.