2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing 2014
DOI: 10.1109/imis.2014.79
|View full text |Cite
|
Sign up to set email alerts
|

Threats and Countermeasures on a 4G Mobile Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
4

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…A GTPin-GTP packet refers to a packet containing a GTP-Control (GTP-C) message in a payload corresponding to the user data portion of a GTP-User (GTP-U) packet, and can be easily produced using a packet manipulation tool. In addition, GTPin-GTP packets can be used to scan the internal equipment of the mobile network or to drain resources of the mobile network [15].…”
Section: Studies Of Security Challengesmentioning
confidence: 99%
“…A GTPin-GTP packet refers to a packet containing a GTP-Control (GTP-C) message in a payload corresponding to the user data portion of a GTP-User (GTP-U) packet, and can be easily produced using a packet manipulation tool. In addition, GTPin-GTP packets can be used to scan the internal equipment of the mobile network or to drain resources of the mobile network [15].…”
Section: Studies Of Security Challengesmentioning
confidence: 99%
“…Attacks on VoLTE include message forgery, flooding, and message tampering which may result in VoLTE degradation, over-billing, voice phishing, and even DoS [32]. GTP can be taken advantage of to compromise information, exhaust network resources, perform phishing, and interrupt services [33]. Denial of service attacks can occur in a variety of ways including flooding, redirection, interference, and spoofing.…”
Section: Attacks In Mobile Networkingmentioning
confidence: 99%