TY - GEN
T1 - Mitigating attacks on open functionality in SMS-capable cellular networks
AU - Traynor, Patrick
AU - Enck, William
AU - McDaniel, Patrick
AU - La Porta, Thomas
PY - 2006
Y1 - 2006
N2 - The transformation of telecommunications networks from homogeneous closed systems providing only voice services to Internet-connected open networks that provide voice and data services presents significant security challenges. For example, recent research illustrated that a carefully crafted DoS attack via text messaging could incapacitate all voice communications in a metropolitan area with little more than a cable modem. This attack highlights a growing threat to these systems; namely, cellular networks are increasingly exposed to adversaries both in and outside the network. In this paper, we use a combination of modeling and simulation to demonstrate the feasibility of targeted text messaging attacks. Under realistic network conditions, we show that adversaries can achieve blocking rates of more than 70% with only limited resources. We then develop and characterize five techniques from within two broad classes of countermeasures - queue management and resource provisioning. Our analysis demonstrates that these techniques can eliminate or extensively mitigate even the most intense targeted text messaging attacks. We conclude by considering the tradeoffs inherent to the application of these techniques in current and next generation telecommunications networks.
AB - The transformation of telecommunications networks from homogeneous closed systems providing only voice services to Internet-connected open networks that provide voice and data services presents significant security challenges. For example, recent research illustrated that a carefully crafted DoS attack via text messaging could incapacitate all voice communications in a metropolitan area with little more than a cable modem. This attack highlights a growing threat to these systems; namely, cellular networks are increasingly exposed to adversaries both in and outside the network. In this paper, we use a combination of modeling and simulation to demonstrate the feasibility of targeted text messaging attacks. Under realistic network conditions, we show that adversaries can achieve blocking rates of more than 70% with only limited resources. We then develop and characterize five techniques from within two broad classes of countermeasures - queue management and resource provisioning. Our analysis demonstrates that these techniques can eliminate or extensively mitigate even the most intense targeted text messaging attacks. We conclude by considering the tradeoffs inherent to the application of these techniques in current and next generation telecommunications networks.
UR - http://www.scopus.com/inward/record.url?scp=33751040642&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=33751040642&partnerID=8YFLogxK
U2 - 10.1145/1161089.1161111
DO - 10.1145/1161089.1161111
M3 - Conference contribution
AN - SCOPUS:33751040642
SN - 1595932860
SN - 9781595932860
T3 - Proceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM
SP - 182
EP - 193
BT - Proceedings of the Twelfth Annual International Conference on Mobile Computing and Networking, MOBICOM 2006
PB - Association for Computing Machinery
T2 - 12th Annual International Conference on Mobile Computing and Networking, MOBICOM 2006
Y2 - 24 September 2006 through 29 September 2006
ER -