The attacks aren't alright: Large-Scale Simulation of Fake Base Station Attacks and Detections

被引:1
|
作者
Heijligenberg, Thijs [1 ]
Rupprecht, David [2 ]
Kohls, Katharina [3 ]
机构
[1] Radboud Univ Nijmegen, Nijmegen, Netherlands
[2] Radix Secur, Bochum, Germany
[3] Ruhr Univ, Bochum, Germany
关键词
D O I
10.1145/3675741.3675742
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Fake base stations are a well-known threat to pre-5G mobile networks and are one of the most common primitives for mobile attacks that are used in the real world. However, despite years of research we only have limited knowledge about their performance spectrum and how well detection mechanisms work in practice. Consequently, mobile network operators and vendors struggle to identify, implement, and deploy a practical solution in the form of detection mechanisms. For the first time, we systematically study fake base station attacks and their main influencing factors. We use a specification-conform simulation model that lets us analyze fake base station attacks on a large scale, and test detection mechanisms on the generated data. The simulation environment allows us to test diverse scenarios with a large measure of control and insight, while providing realism in the aspects that matter. We study detection mechanisms from academic work and ongoing 3GPP discussions. Our experiments reveal the influencing factors of the success of fake base station attacks and detection, and provides nuances for performance that is missing from existing work.
引用
收藏
页码:45 / 55
页数:11
相关论文
共 50 条
  • [1] Toward Large-Scale Rogue Base Station Attacks Using Container-Based Virtualization
    Heish, Wan-Lin
    Hong, Bing-Kai
    Cheng, Shin-Ming
    2019 IEEE 90TH VEHICULAR TECHNOLOGY CONFERENCE (VTC2019-FALL), 2019,
  • [2] A Framework for Large-Scale Modeling and Simulation of Attacks on an OpenFlow Network
    Alcorn, Joshua A.
    Chow, C. Edward
    2014 23RD INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND NETWORKS (ICCCN), 2014,
  • [3] Large-Scale Logic-Locking Attacks via Simulation
    Purdy, Ruben
    Blanton, R. D. Shawn
    PROCEEDINGS OF THE TWENTY THIRD INTERNATIONAL SYMPOSIUM ON QUALITY ELECTRONIC DESIGN (ISQED 2022), 2022, : 352 - 357
  • [4] A dynamic countermeasure method for large-scale network attacks
    Liu, Zhaoyu
    Uppala, Roopesh
    DASC 2006: 2ND IEEE INTERNATIONAL SYMPOSIUM ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS, 2006, : 163 - +
  • [5] A DIVERSE LARGE-SCALE DATASET FOR EVALUATING REBROADCAST ATTACKS
    Agarwal, Shruti
    Fan, Wei
    Farid, Hany
    2018 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2018, : 1997 - 2001
  • [6] Impact analysis of faults and attacks in large-scale networks
    Hariri, Salim
    Guangzhi, Q.U.
    Dharmagadda, Tushneem
    Ramkishore, Modukuri
    Raghavendra, Cauligi S.
    IEEE Security and Privacy, 2003, 1 (05): : 49 - 54
  • [7] Large-scale network monitoring for visual analysis of attacks
    Fischer, Fabian
    Mansmann, Florian
    Keim, Daniel A.
    Pietzko, Stephan
    Waldvogel, Marcel
    VISUALIZATION FOR COMPUTER SECURITY, PROCEEDINGS, 2008, 5210 : 111 - 118
  • [8] Economics of Ransomware: Risk Interdependence and Large-Scale Attacks
    August, Terrence
    Dao, Duy
    Niculescu, Marius Florin
    MANAGEMENT SCIENCE, 2022, 68 (12) : 8979 - 9002
  • [9] An economic damage model for large-scale Internet attacks
    Dübendorfer, T
    Wagner, A
    Plattner, B
    THIRTEENTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 2004, : 223 - 228
  • [10] Anomaly-based Identification of Large-Scale Attacks
    Gamer, Thomas
    GLOBECOM 2009 - 2009 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-8, 2009, : 6638 - 6643