The attacks aren't alright: Large-Scale Simulation of Fake Base Station Attacks and Detections

被引:1
|
作者
Heijligenberg, Thijs [1 ]
Rupprecht, David [2 ]
Kohls, Katharina [3 ]
机构
[1] Radboud Univ Nijmegen, Nijmegen, Netherlands
[2] Radix Secur, Bochum, Germany
[3] Ruhr Univ, Bochum, Germany
关键词
D O I
10.1145/3675741.3675742
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Fake base stations are a well-known threat to pre-5G mobile networks and are one of the most common primitives for mobile attacks that are used in the real world. However, despite years of research we only have limited knowledge about their performance spectrum and how well detection mechanisms work in practice. Consequently, mobile network operators and vendors struggle to identify, implement, and deploy a practical solution in the form of detection mechanisms. For the first time, we systematically study fake base station attacks and their main influencing factors. We use a specification-conform simulation model that lets us analyze fake base station attacks on a large scale, and test detection mechanisms on the generated data. The simulation environment allows us to test diverse scenarios with a large measure of control and insight, while providing realism in the aspects that matter. We study detection mechanisms from academic work and ongoing 3GPP discussions. Our experiments reveal the influencing factors of the success of fake base station attacks and detection, and provides nuances for performance that is missing from existing work.
引用
收藏
页码:45 / 55
页数:11
相关论文
共 50 条
  • [31] CoDef: Collaborative Defense Against Large-Scale Link-Flooding Attacks
    Lee, Soo Bum
    Kang, Min Suk
    Gligor, Virgil D.
    PROCEEDINGS OF THE 2013 ACM INTERNATIONAL CONFERENCE ON EMERGING NETWORKING EXPERIMENTS AND TECHNOLOGIES (CONEXT '13), 2013, : 417 - 427
  • [32] Researches of the Topology Robustness of Large-scale Complex Networks under Hybrid Attacks
    Xu, Ye
    Zhao, Xingyu
    2017 2ND AASRI INTERNATIONAL CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS (IEA 2017), 2017, : 13 - 18
  • [33] On Optimal Sensor Placement for Mitigation of Vulnerabilities to Cyber Attacks in Large-Scale Networks
    Vaidya, U.
    Fardad, M.
    2013 EUROPEAN CONTROL CONFERENCE (ECC), 2013, : 3548 - 3553
  • [34] CrowdNet: Identifying Large-Scale Malicious Attacks Over Android Kernel Structures
    Wang, Xinning
    Li, Chong
    Song, Dalei
    IEEE ACCESS, 2020, 8 : 15823 - 15837
  • [35] Large-scale cyber attacks monitoring using Evolving Cauchy Possibilistic Clustering
    Skrjanc, Igor
    Ozawa, Seiichi
    Ban, Tao
    Dovzan, Dejan
    APPLIED SOFT COMPUTING, 2018, 62 : 592 - 601
  • [36] Time-Efficient Cloning Attacks Identification in Large-Scale RFID Systems
    Zhao, Ju-min
    Feng, Ding
    Li, Deng-ao
    Gong, Wei
    Liu, Hao-xiang
    Huo, Shi-min
    SECURITY AND COMMUNICATION NETWORKS, 2017,
  • [37] NetSentry: A deep learning approach to detecting incipient large-scale network attacks
    Liu, Haoyu
    Patras, Paul
    COMPUTER COMMUNICATIONS, 2022, 191 : 119 - 132
  • [38] Light-weight Detection of HTTP Attacks for Large-scale Web sites
    Xie, Yi
    Yu, Shun-zheng
    2008 11TH IEEE SINGAPORE INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS (ICCS), VOLS 1-3, 2008, : 1182 - 1186
  • [39] Minimum Power Consumption of a Base Station with Large-scale Antenna Array
    Jiang, Zhiyuan
    Zhou, Sheng
    Niu, Zhisheng
    2013 19TH ASIA-PACIFIC CONFERENCE ON COMMUNICATIONS (APCC): SMART COMMUNICATIONS TO ENHANCE THE QUALITY OF LIFE, 2013, : 262 - 266
  • [40] Base Station Placement Algorithm for Large-Scale LTE Heterogeneous Networks
    Lee, Seungseob
    Lee, SuKyoung
    Kim, Kyungsoo
    Kim, Yoon Hyuk
    PLOS ONE, 2015, 10 (10):