skip to main content
10.1145/1161089.1161111acmconferencesArticle/Chapter ViewAbstractPublication PagesmobicomConference Proceedingsconference-collections
Article

Mitigating attacks on open functionality in SMS-capable cellular networks

Published:29 September 2006Publication History

ABSTRACT

The transformation of telecommunications networks from homogeneous closed systems providing only voice services to Internet-connected open networks that provide voice and data services presents significant security challenges. For example, recent research illustrated that a carefully crafted DoS attack via text messaging could incapacitate all voice communications in a metropolitan area with little more than a cable modem. This attack highlights a growing threat to these systems; namely, cellular networks are increasingly exposed to adversaries both in and outside the network. In this paper, we use a combination of modeling and simulation to demonstrate the feasibility of targeted text messaging attacks. Under realistic network conditions, we show that adversaries can achieve blocking rates of more than 70% with only limited resources. We then develop and characterize five techniques from within two broad classes of countermeasures - queue management and resource provisioning. Our analysis demonstrates that these techniques can eliminate or extensively mitigate even the most intense targeted text messaging attacks. We conclude by considering the tradeoffs inherent to the application of these techniques in current and next generation telecommunications networks.

References

  1. The National Strategy to Secure Cyberspace. http://www.us-cert.gov/reading room/cyberspace strategy.pdf, February 2003.]]Google ScholarGoogle Scholar
  2. Young prefer texting to calls'. http://news.bbc.co.uk/2/hi/business/2985072.stm, June 2003.]]Google ScholarGoogle Scholar
  3. 3rd Generation Partnership Project. Physical layer on the radio path; General description. Technical Report 3GPP TS 04.18 v8.26.0.]]Google ScholarGoogle Scholar
  4. 3rd Generation Partnership Project. Physical layer on the radio path; General description. Technical Report 3GPP TS 05.01 v8.9.0.]]Google ScholarGoogle Scholar
  5. A. Acampora and M. Naghshineh. Control and Quality-of-Service Provisioning in High- Speed Microcellular Networks. IEEE Personal Communications, 1(2):36--43, 1994.]]Google ScholarGoogle ScholarCross RefCross Ref
  6. S. Berinato. Online Extortion - How a Bookmaker and a Whiz Kid Took On an Extortionist and Won. CSO Online, May 2005.]]Google ScholarGoogle Scholar
  7. B. Branden, D. Clark, J. Crowcroft, B. Davie, S. Deering, D. Estrin, S. Floyd, V. Jacobson, G. Minshall, C. Partridge, L. Peterson, K. Ramakrishnan, S. Shenker, J. Wroclawski, and L. Zhang. RFC 2309 - Recommendations on Queue Management and congestion Avoidance in the Internet. rfc2309.txt, 1998.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. S. Byers, A. Rubin, and D. Kormann. Defending Against an Internet-based Attack on the Physical World. ACM Transactions on Internet Technology (TOIT), 4(3):239--254, August 2004.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. A. Demers, S. Keshav, and S. Shenker. Analysis and Simulation of a Fair Queueing Algorithm. In Proceedings of ACM SIGCOMM, pages 3--12, 1989.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. L. Dryburgh and J. Hewett. Signaling System No. 7: The Role of SS7. http://www.ciscopress.com/articles/article.asp?p= 330805&rl=1, 2004.]]Google ScholarGoogle Scholar
  11. C. M. Ellison and B. Schneier. Ten Risks of PKI: What You're Not Being Told About Public-Key Infrastructure. Computer Security Journal, 16(1):1--7, 1999.]]Google ScholarGoogle Scholar
  12. W. Enck, P. Traynor, T. F. La Porta, and P. McDaniel. Exploiting Open Functionality in SMS-Capable Cellular Networks. In Proceedings of the ACM Conference on Computer and Communication Security (CCS), November 2005.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. S. Floyd and V. Jacobson. Random Early Detection Gateways for Congestion Avoidance. IEEE/ACMTransactions on Networking, 1(4):397--413, August 1993.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. C. Haney. NAI is latest DoS victim. http://security.itworld.com/4339/NWW116617 02-05-2001/page 1.html, February 5 2001.]]Google ScholarGoogle Scholar
  15. J. Hedden. Math::Random::MT::Auto - Auto-seeded Mersenne Twister PRNGs. http://search.cpan.org/.jdhedden/Math-Random-MT-Auto-5.01/lib/Math/Random/MT/Auto.pm. Version 5.01.]]Google ScholarGoogle Scholar
  16. J. Ioannidis and S. Bellovin. Implementing Pushback: Router-Based Defense Against DDoS Attacks. In Proceedings of Network and Distributed System Security Symposium (NDSS), February 2002.]]Google ScholarGoogle Scholar
  17. R. Jain. Myths about congestion management in high speed networks. Internetworking: Research and Experience, 3:101--113, 1992.]]Google ScholarGoogle Scholar
  18. G. Kunene. Perimeter Security Ain't What It Used to Be, Experts Say. DevX.com, 2004.]]Google ScholarGoogle Scholar
  19. Lucent Technologies. 5ESS(R) 2000 - Switch Mobile Switching Centre (MSC) for Service Providers. http://www.lucent.com/products/solution/0,,CTID+2019-STID+10048-SOID+824-LOCL+1,00.html, 2006.]]Google ScholarGoogle Scholar
  20. C. Luders and R. Haferbeck. The Performance of the GSM Random Access Procedure. In Vehicular Technology Conference, pages 1165--1169, June 1994.]]Google ScholarGoogle Scholar
  21. K. Maney. Surge in text messaging makes cell operators :-). July 27 2005.]]Google ScholarGoogle Scholar
  22. Mike Grenville. Operators: Celebration Messages Overload SMS Network. http://www.160characters.org/news.php?action=view&nid=819, November 2003.]]Google ScholarGoogle Scholar
  23. J. Mirkovic and P. Reiher. A Taxonomy of DDoS Attacks and DDoS Defense Mechanisms. ACM SIGCOMM Computer Communication Review, 34(2):39--53, 2004.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver. Inside the Slammer Worm. IEEE Security and Privacy, 1(4), July 2003.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Motorola Corporation. Motorola GSM Solutions. www.motorola.com/networkoperators/pdfs/GSM-Solutions.pdf, 2006.]]Google ScholarGoogle Scholar
  26. J. B. Nagle. On Packet Switches with Infinite Storage. IEEE Transactions on Communications, COM-35(4), April 1987.]]Google ScholarGoogle ScholarCross RefCross Ref
  27. National Communications System. SMS over SS7. Technical Report Technical Information Bulletin 03-2 (NCS TIB 03-2), December 2003.]]Google ScholarGoogle Scholar
  28. Nyquetek, Inc. Wireless Priority Service for National Security. http://wireless.fcc.gov/releases/da051650PublicUse.pdf, 2002.]]Google ScholarGoogle Scholar
  29. R. Ramjee, R. Nagarajan, and D. F. Towsley. On optimal call admission control in cellular networks. In Proceedings of the IEEE Conference on Computer Communications (INFOCOM), pages 43--50, 1996.]]Google ScholarGoogle ScholarCross RefCross Ref
  30. R. F. Rey, editor. Engineering and Operations in the Bell System.Bell Telephone Laboratories, INC, second edition, 1984.]]Google ScholarGoogle Scholar
  31. M. Richtel. Yahoo Attributes a Lengthy Service Failure to an Attack. The New York Times, February 8 2000.]]Google ScholarGoogle Scholar
  32. Roam Secure. 17 Counties & Cities in Washington, DC Region deploy Roam Secure Alert Network. http://www.roamsecure.net/story.php?news id=52, September 2005.]]Google ScholarGoogle Scholar
  33. P. Roberts. Al-Jazeera Sites Hit With Denial-of-Service Attacks. PCWorld Magazine, March 26 2003.]]Google ScholarGoogle Scholar
  34. S. Savage, D. Wetherall, A. Karlin, and T. Anderson. Practical network support for IP traceback. In Proceedings of ACM SIGCOMM, pages 295--306, October 2000.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. M. Schwartz. . In Telecommunication Networks - Protocols, Modeling and Analysis. Addison-Wesley Publishing Company, 1987.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Tamara Neale. VDOT LAUNCHES NEW 511 EMAIL ALERT SERVICE. http://www.virginiadot.org/infoservice/news/newsrelease.asp?D=CO-511-06, February 2006.]]Google ScholarGoogle Scholar
  37. B. Waters, A. Juels, J. Halderman, and E. Felten. New client puzzle outsourcing techniques for DoS resistance. In Proceedings of ACM CCS'04, pages 246--256, 2004.]] Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Mitigating attacks on open functionality in SMS-capable cellular networks

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      MobiCom '06: Proceedings of the 12th annual international conference on Mobile computing and networking
      September 2006
      428 pages
      ISBN:1595932860
      DOI:10.1145/1161089

      Copyright © 2006 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 29 September 2006

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • Article

      Acceptance Rates

      Overall Acceptance Rate440of2,972submissions,15%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader