Redirigiendo al acceso original de articulo en 18 segundos...
Inicio  /  Future Internet  /  Vol: 5 Par: 4 (2013)  /  Artículo
ARTÍCULO
TITULO

Practical Attacks on Mobile Cellular Networks and Possible Countermeasures

Murat Ogul and Selçuk Baktir    

Resumen

Due to widespread adoption of mobile communications devices and increasingly high throughput capacity of cellular networks, Third-Generation (3G) and Long Term Evolution (LTE) are becoming ever more popular. Millions of smart phones with 3G capabilities are sold every year and used for mostly browsing the Internet. Hence, mobile operators have been heavily investing in their packet switched networks to meet customer demand and stay ahead in the market. The widespread use of broadband mobile Internet bring along also some IP based threats such as the Denial of Service (DoS) attacks, botnets and malwares. In this paper, we performed DoS and flooding attacks on 3G mobile networks and measured their effect on the most critical elements of a network such as the Radio Network Controller (RNC) and the Serving GPRS Support Node (SGSN) devices. We carried out our experiments on a real mobile network, not just a simulation environment, and hence our findings depict a realistic picture of the vulnerabilities existent in 3G mobile networks. We propose alternative solutions to avoid these vulnerabilities and mitigate the issues raised.

Palabras claves

 Artículos similares

       
 
Noon Hussein and Armstrong Nhlabatsi    
The Internet of Things (IoT) has provided substantial enhancements to the communication of sensors, actuators, and their controllers, particularly in the field of home automation. Home automation is experiencing a huge rise in the proliferation of IoT de... ver más
Revista: IoT

 
Faham Tahmasebinia, Linda Zhang, Sangwoo Park and Samad Sepasgozar    
Reinforced concrete (RC) members in critical structures, such as bridge piers, high-rise buildings, and offshore facilities, are vulnerable to impact loads throughout their service life. For example, vehicle collisions, accidental loading, or unpredicted... ver más
Revista: Buildings

 
Zoe Marchment, Michael J. Frith, John Morrison and Paul Gill    
This paper uses graph theoretical measures to analyse the relationship between street network usage, as well as other street- and area-level factors, and dissident Republican violence in Belfast. A multi-level statistical model is used. Specifically, we ... ver más

 
Jianhua Liu and Zibo Wu    
The cloud-based Internet of Things (IoT-Cloud) combines the advantages of the IoT and cloud computing, which not only expands the scope of cloud computing but also enhances the data processing capability of the IoT. Users always seek affordable and effic... ver más
Revista: Future Internet

 
Igor M. Coelho, Vitor N. Coelho, Rodolfo P. Araujo, Wang Yong Qiang and Brett D. Rhodes    
Consensus mechanisms are a core feature for handling negotiation and agreements. Blockchain technology has seen the introduction of different sorts of consensus mechanism, ranging from tasks of heavy computation to the subtle mathematical proofs of Byzan... ver más
Revista: Future Internet