Proceedings of the 2018 on Asia Conference on Computer and Communications Security 2018
DOI: 10.1145/3196494.3196521
|View full text |Cite
|
Sign up to set email alerts
|

FBSleuth

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 48 publications
(7 citation statements)
references
References 21 publications
0
7
0
Order By: Relevance
“…CELLDAM provides a root-less defense by using a companion data-plane signal analyzer [54]. On the other hand, such monitors can also be deployed at the networks (RAN), such as heuristics-based fake base station detectors [24], [55], [56], [25], [26], [57], [58], and anomalous traffic classifiers [59], [60], [61]. While our system can be viewed as a run-time monitor, it is distinguished from the above works for being the first defense at the 5G O-RAN control plane that offers programmability and extensibility.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…CELLDAM provides a root-less defense by using a companion data-plane signal analyzer [54]. On the other hand, such monitors can also be deployed at the networks (RAN), such as heuristics-based fake base station detectors [24], [55], [56], [25], [26], [57], [58], and anomalous traffic classifiers [59], [60], [61]. While our system can be viewed as a run-time monitor, it is distinguished from the above works for being the first defense at the 5G O-RAN control plane that offers programmability and extensibility.…”
Section: Related Workmentioning
confidence: 99%
“…After luring nearby victim UE to connect, the FBS then transmits malicious messages to perform DoS or privacy leakage attacks, which are also known as IMSI catchers in legacy 2G and 3G networks [42], [23]. We consider these attacks can be detected by using existing FBS detection (or IMSI catcher detection) techniques [42], [23], [24], [57], [26]. Such techniques, which rely on signal strengths, measurement reports, and other heuristics, can also be deployed at the O-RAN control plane.…”
Section: Other Cellular L3 Attacksmentioning
confidence: 99%
“…Finally, FBSleuth [34] is a recently designed BS-based tool that can identify RBS devices based on minor differences in the emitted signals caused by hardware imperfections. This defence software lacks monitoring of the platooning data traffic traversing between multiple BS in a 5G network that is the domain of our work.…”
Section: Background and Related Workmentioning
confidence: 99%
“…They work by comparing the received packet with an ideal simulated packet. They have been used with a variety of protocol, such as Wi-Fi [1] or GSM [17]. They simplify the collection of relevant features with smaller dimensionalities, which is known to be more resistant to noise than waveform based approaches.…”
Section: Wireless Devices Fingerprintingmentioning
confidence: 99%