IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications 2007
DOI: 10.1109/infcom.2007.153
|View full text |Cite
|
Sign up to set email alerts
|

On the Detection of Signaling DoS Attacks on 3G Wireless Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
53
0
4

Year Published

2009
2009
2017
2017

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 80 publications
(57 citation statements)
references
References 16 publications
0
53
0
4
Order By: Relevance
“…We have presented the 3 Step Signaling DoS detection algorithm. First step is classifying the radio resource allocation/release of UEs by analyzing GTP-C control messages of each UE.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…We have presented the 3 Step Signaling DoS detection algorithm. First step is classifying the radio resource allocation/release of UEs by analyzing GTP-C control messages of each UE.…”
Section: Discussionmentioning
confidence: 99%
“…In his paper, he introduced various DoS attack model like paging, DCH (Dedicated Channel) allocation. Patrick proposed first the theme about Signaling DoS in 3G network [3]. He made the algorithm for detecting the Signaling DoS.…”
Section: Session-based Detection Of Signaling Dos On Lte Mobile Networkmentioning
confidence: 99%
See 1 more Smart Citation
“…Indeed, early work has identified different ways to attack the control plane of mobile networks, e.g. through paging [35], service requests [37] and radio resource control (RRC) [26,33]. Poorly designed mobile applications are perhaps one of the most common triggers of signaling overloads [6] that lead to performance degradation and even network outages [11,15].…”
Section: Signaling Stormsmentioning
confidence: 99%
“…A general framework for anomaly detection was presented in [13] based on time-series analysis and change detection algorithms. While the goal of [13,45] is to identify large-scale events by aggregating and analyzing statistics from all hosts and mobile users, respectively, our approach aims to identify users that are contributing to a problem, namely signaling overload, rather than detect the problem itself. The work in [42] considered the detection of mobile-initiated signaling attacks via a supervised learning approach, which monitors transmissions that trigger a radio access bearer setup procedure, and extracts from the corresponding packets features relating to destination IP and port numbers, packet size and response-request ratio.…”
Section: Prior Work On Storm Detection and Mitigationmentioning
confidence: 99%