Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking 2016
DOI: 10.1145/2973750.2985622
|View full text |Cite
|
Sign up to set email alerts
|

In-device, runtime cellular network information extraction and analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(9 citation statements)
references
References 2 publications
0
9
0
Order By: Relevance
“…To answer RQ1 ( §VII-A), we evaluate 5G-SPECTOR against two sets of simulated attacks, including 7 known attacks in Table II and 11 unknown attacks derived as variants from them. To answer RQ2 ( §VII-B), we evaluate 5G-SPECTOR against both benign and abnormal cellular network traffic from public datasets [31], [22]. To answer RQ3 ( §VII-C), we evaluate 5G-SPECTOR with two L3 attacks fully replicated over-the-air using COTS SDRs and smartphones.…”
Section: Discussionmentioning
confidence: 99%
See 3 more Smart Citations
“…To answer RQ1 ( §VII-A), we evaluate 5G-SPECTOR against two sets of simulated attacks, including 7 known attacks in Table II and 11 unknown attacks derived as variants from them. To answer RQ2 ( §VII-B), we evaluate 5G-SPECTOR against both benign and abnormal cellular network traffic from public datasets [31], [22]. To answer RQ3 ( §VII-C), we evaluate 5G-SPECTOR with two L3 attacks fully replicated over-the-air using COTS SDRs and smartphones.…”
Section: Discussionmentioning
confidence: 99%
“…To demonstrate 5G-SPECTOR's scalability to practical cellular networks (i.e., not producing too many false alarms), we evaluated it with datasets with traces collected from realworld UEs [31], [22]. As presented in Table IV, there are 22 benign traces (BT-1 to BT-22) collected from different COTS UEs and network operators, and 9 abnormal UE traces (AT-1 to AT-9 with network failure scenarios) created by academic researchers [22].…”
Section: B Evaluation With Real-world Datasetsmentioning
confidence: 99%
See 2 more Smart Citations
“…On the other hand, academic researchers, especially from the developing world, are denied access to data from the latest unlicensed deployments due to the exorbitant cost of the applications. It is noteworthy that Mobile Insight [27] and SigCap [18] are very useful opensource applications. SigCap in particular is easy to install, displays real-time network information on the mobile device, and allows passive network monitoring [18].…”
Section: B Challenge: Expensive Network Monitoring Applicationsmentioning
confidence: 99%