The attacks aren't alright: Large-Scale Simulation of Fake Base Station Attacks and Detections

被引:1
|
作者
Heijligenberg, Thijs [1 ]
Rupprecht, David [2 ]
Kohls, Katharina [3 ]
机构
[1] Radboud Univ Nijmegen, Nijmegen, Netherlands
[2] Radix Secur, Bochum, Germany
[3] Ruhr Univ, Bochum, Germany
关键词
D O I
10.1145/3675741.3675742
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Fake base stations are a well-known threat to pre-5G mobile networks and are one of the most common primitives for mobile attacks that are used in the real world. However, despite years of research we only have limited knowledge about their performance spectrum and how well detection mechanisms work in practice. Consequently, mobile network operators and vendors struggle to identify, implement, and deploy a practical solution in the form of detection mechanisms. For the first time, we systematically study fake base station attacks and their main influencing factors. We use a specification-conform simulation model that lets us analyze fake base station attacks on a large scale, and test detection mechanisms on the generated data. The simulation environment allows us to test diverse scenarios with a large measure of control and insight, while providing realism in the aspects that matter. We study detection mechanisms from academic work and ongoing 3GPP discussions. Our experiments reveal the influencing factors of the success of fake base station attacks and detection, and provides nuances for performance that is missing from existing work.
引用
收藏
页码:45 / 55
页数:11
相关论文
共 50 条
  • [41] Dynamic Base Station Operation in Large-Scale Green Cellular Networks
    Che, Yue Ling
    Duan, Lingjie
    Zhang, Rui
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2016, 34 (12) : 3127 - 3141
  • [42] Transfer Attacks Revisited: A Large-Scale Empirical Study in Real Computer Vision Settings
    Mao, Yuhao
    Fu, Chong
    Wang, Saizhuo
    Ji, Shouling
    Zhang, Xuhong
    Liu, Zhenguang
    Zhou, Jun
    Liu, Alex X.
    Beyah, Raheem
    Wang, Ting
    43RD IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2022), 2022, : 1423 - 1439
  • [43] Weak Links in Authentication Chains: A Large-scale Analysis of Email Sender Spoofing Attacks
    Shen, Kaiwen
    Wang, Chuhan
    Guo, Minglei
    Zheng, Xiaofeng
    Lu, Chaoyi
    Liu, Baojun
    Zhao, Yuxuan
    Hao, Shuang
    Duan, Haixin
    Pan, Qingfeng
    Yang, Min
    PROCEEDINGS OF THE 30TH USENIX SECURITY SYMPOSIUM, 2021, : 3201 - 3217
  • [44] Design Considerations on Constructing an Early Detection Framework for Detecting Large-Scale Malware Attacks
    Lee, Manhee
    CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, 2012, 310 : 260 - 267
  • [45] Cardinality Change-based Early Detection of Large-scale Cyber-Attacks
    Chen, Wenji
    Liu, Yang
    Guan, Yong
    2013 PROCEEDINGS IEEE INFOCOM, 2013, : 1788 - 1796
  • [46] A detection and filter system for use against large-scale DDoS attacks in the internet backbone
    Ruf, Lukas
    Wagner, Arno
    Farkas, Karoly
    Plattner, Bernhard
    ACTIVE NETWORKS, 2007, 3912 : 169 - +
  • [47] A Framework for Detecting False Data Injection Attacks in Large-Scale Wireless Sensor Networks
    Hu, Jiamin
    Yang, Xiaofan
    Yang, Lu-Xing
    SENSORS, 2024, 24 (05)
  • [48] Countermeasures against large-scale reflection DDoS attacks using exploit IoT devices
    Lee, Yong-joon
    Chae, Hwa-sung
    Lee, Keun-wang
    AUTOMATIKA, 2021, 62 (01) : 127 - 136
  • [49] Large-Scale Monitoring for Cyber Attacks by Using Cluster Information on Darknet Traffic Features
    Nishikaze, Hironori
    Ozawa, Seiichi
    Kitazono, Jun
    Ban, Tao
    Nakazato, Junji
    Shimamura, Jumpei
    INNS CONFERENCE ON BIG DATA 2015 PROGRAM, 2015, 53 : 175 - 182
  • [50] Nowhere to Hide: Efficiently Identifying Probabilistic Cloning Attacks in Large-Scale RFID Systems
    Ai, Xin
    Chen, Honglong
    Lin, Kai
    Wang, Zhibo
    Yu, Jiguo
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 714 - 727