2014
DOI: 10.1016/j.cose.2013.11.006
|View full text |Cite
|
Sign up to set email alerts
|

An advanced persistent threat in 3G networks: Attacking the home network from roaming networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
3
3
1

Relationship

2
5

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 9 publications
0
6
0
Order By: Relevance
“…Standalone (U)SimMontor was used to acquire data regarding the usage of 2G or 3G network technology, the frequency of AKA executions and the related change/refresh of keys, and the frequency of TMSI reallocations. (U)SimMomitor combined with simtrace [5] [6] was employed to capture data regarding the frequency of IMSI requests; while QXDM was used to obtain data for the employed cryptographic algorithms and whether padding randomization and inclusion of IMEI in the ciphering mode complete message are enabled. The duration of all experiments was 9 months (September 2013 to May 2014).…”
Section: Methodology Of Experimentsmentioning
confidence: 99%
See 1 more Smart Citation
“…Standalone (U)SimMontor was used to acquire data regarding the usage of 2G or 3G network technology, the frequency of AKA executions and the related change/refresh of keys, and the frequency of TMSI reallocations. (U)SimMomitor combined with simtrace [5] [6] was employed to capture data regarding the frequency of IMSI requests; while QXDM was used to obtain data for the employed cryptographic algorithms and whether padding randomization and inclusion of IMEI in the ciphering mode complete message are enabled. The duration of all experiments was 9 months (September 2013 to May 2014).…”
Section: Methodology Of Experimentsmentioning
confidence: 99%
“…More specifically, an ADR is considered an expensive operation, in the sense that it may cause significant delays in the establishment of a voice/data communication channel, especially when the MSC/VLR (or SGSN) and the HLR/AuC are located at different countries [42]. Additionally, a large number of ADRs may disrupt the normal operation of HLR/AuC, which is considered to be one of the most important mobile network elements [5]. In particular, it is a central repository of user location and profile information in the network and undertakes a series of tasks including generation of authentication vectors, delivery of phone call and text messages, data recording for billing, etc.…”
Section: Performance Analysismentioning
confidence: 99%
“…In our previous work [8], we have presented an advanced persistent threat (APT) in 3G networks that exploits a series of zero-day vulnerabilities to flood the HLR/AuC, leading to system saturation. It was proven that the discovered APT can be performed in a trivial manner using commodity hardware and software.…”
Section: B Related Workmentioning
confidence: 99%
“…In addition, Figure 2 represents the scenario for detecting APT attack as to 1, 3, 4, 5, 6 among the steps of APT attack mentioned in Section 2.2. Step 1 (Detection Scenario of Step 1,3,4,5,6). See Figure 2.…”
Section: Service Scenariomentioning
confidence: 99%
“…It uses an antivirus detection bypassing module, an information collection module, an administrator authority acquisition module, etc. Herein, a variety of zero-day vulnerabilities are used [6].…”
Section: Attack Casesmentioning
confidence: 99%