2007
DOI: 10.1109/msp.2007.85
|View full text |Cite
|
Sign up to set email alerts
|

Improving Mobile Core Network Security with Honeynets

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2010
2010
2021
2021

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(12 citation statements)
references
References 7 publications
0
12
0
Order By: Relevance
“…Using that framework, they presented the most efficient deception node deployment strategy to the defender with limited resources, as well as configure a reactive management plan to achieve isolation, access blocking, and exit the induced attacker along with a primary deception action. Dimitriadis et al [59] have proposed 3GHNET as a non-cooperative zero-sum architecture that can prevent DDoS and node breaches and enhance the security of 3G core networks within an organization. Their study showed that it was possible to formulate a payoff matrix to assists the defender in constructing an optimal deception strategy through two gateways that could control and capture the data flow between the sending and receiving nodes as well as a Nash equilibrium calculation focusing on the network attacker.…”
Section: Game-theoretic Defensive Deception With Non-mtdmentioning
confidence: 99%
“…Using that framework, they presented the most efficient deception node deployment strategy to the defender with limited resources, as well as configure a reactive management plan to achieve isolation, access blocking, and exit the induced attacker along with a primary deception action. Dimitriadis et al [59] have proposed 3GHNET as a non-cooperative zero-sum architecture that can prevent DDoS and node breaches and enhance the security of 3G core networks within an organization. Their study showed that it was possible to formulate a payoff matrix to assists the defender in constructing an optimal deception strategy through two gateways that could control and capture the data flow between the sending and receiving nodes as well as a Nash equilibrium calculation focusing on the network attacker.…”
Section: Game-theoretic Defensive Deception With Non-mtdmentioning
confidence: 99%
“…The objective may be learning the behavior of attackers [9][10][11][12], acting as a false target [1,[9][10][11][12][13], or wasting the resources of the attackers [1,13].…”
Section: B Deception Based Mechanismsmentioning
confidence: 99%
“…Xiaoming Fu discusses the security implications of the session identifier [6] . C. K. Dimitriadis has proposed honeynet solution to secure 3G core network [7] . Fabio Ricciato discussed the unwanted traffic in 3G networks and their impacts for core network [8,9] , and developed an extensive monitoring system for 3G core network [10] .…”
Section: B Security Challenges In 3g Core Network (Cn)mentioning
confidence: 99%