The attacks aren't alright: Large-Scale Simulation of Fake Base Station Attacks and Detections

被引:1
|
作者
Heijligenberg, Thijs [1 ]
Rupprecht, David [2 ]
Kohls, Katharina [3 ]
机构
[1] Radboud Univ Nijmegen, Nijmegen, Netherlands
[2] Radix Secur, Bochum, Germany
[3] Ruhr Univ, Bochum, Germany
关键词
D O I
10.1145/3675741.3675742
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Fake base stations are a well-known threat to pre-5G mobile networks and are one of the most common primitives for mobile attacks that are used in the real world. However, despite years of research we only have limited knowledge about their performance spectrum and how well detection mechanisms work in practice. Consequently, mobile network operators and vendors struggle to identify, implement, and deploy a practical solution in the form of detection mechanisms. For the first time, we systematically study fake base station attacks and their main influencing factors. We use a specification-conform simulation model that lets us analyze fake base station attacks on a large scale, and test detection mechanisms on the generated data. The simulation environment allows us to test diverse scenarios with a large measure of control and insight, while providing realism in the aspects that matter. We study detection mechanisms from academic work and ongoing 3GPP discussions. Our experiments reveal the influencing factors of the success of fake base station attacks and detection, and provides nuances for performance that is missing from existing work.
引用
收藏
页码:45 / 55
页数:11
相关论文
共 50 条
  • [21] Filtering Location Optimization for Defending Against Large-Scale BDoS Attacks
    Lu Ning
    Wang Yulong
    Shi Wenbo
    Li Guorui
    Diao Ding
    CHINESE JOURNAL OF ELECTRONICS, 2017, 26 (02) : 435 - 444
  • [22] Filtering Location Optimization for Defending Against Large-Scale BDoS Attacks
    LU Ning
    WANG Yulong
    SHI Wenbo
    LI Guorui
    DIAO Ding
    Chinese Journal of Electronics, 2017, 26 (02) : 435 - 444
  • [23] Scheme of defending against DDoS attacks in large-scale ISP networks
    Wu, Zhi-jun
    Zhang, Dong
    NETWORK AND PARALLEL COMPUTING, PROCEEDINGS, 2007, 4672 : 296 - +
  • [24] Fast response to infection spread and cyber attacks on large-scale networks
    Leyffer, Sven
    Safro, Ilya
    JOURNAL OF COMPLEX NETWORKS, 2013, 1 (02) : 183 - 199
  • [25] Intrusion Detection of Sinkhole Attacks in Large-scale Wireless Sensor Networks
    Chen, Changlong
    Song, Min
    Hsieh, George
    2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1, 2010, : 711 - +
  • [26] Large-Scale Analysis of Remote Code Injection Attacks in Android Apps
    Choi, Hyunwoo
    Kim, Yongdae
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [27] Risk Analysis of Distribution Network with Large-scale Controllable Loads with Attacks
    Wu Y.
    Li J.
    Chen X.
    Liu Q.
    Wang Y.
    Luo J.
    Ni M.
    Dianli Xitong Zidonghua/Automation of Electric Power Systems, 2018, 42 (10): : 30 - 37
  • [28] Collaborative anomaly-based detection of large-scale internet attacks
    Gamer, Thomas
    COMPUTER NETWORKS, 2012, 56 (01) : 169 - 185
  • [29] MPTCP robustness against large-scale man-in-the-middle attacks
    Phung, Chi-Dung
    Silva, Benevid Felix
    Nogueira, Michele
    Secci, Stefano
    COMPUTER NETWORKS, 2019, 164
  • [30] A defense system against DDoS attacks by large-scale IP traceback
    Xiang, Y
    Zhou, WL
    THIRD INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND APPLICATIONS, VOL 2, PROCEEDINGS, 2005, : 431 - 436