Bandwidth Usage-Based Detection of Signaling Attacks

被引:6
|
作者
Pavloski, Mihajlo [1 ]
Gorbil, Gokce [1 ]
Gelenbe, Erol [1 ]
机构
[1] Imperial Coll, Dept Elect & Elect Engn, Intelligent Syst & Networks Grp, London SW7 2AZ, England
来源
关键词
Signaling attacks; Detection; Denial of service; Exponential weighted moving average; Mitigation; NETWORK;
D O I
10.1007/978-3-319-22635-4_9
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In the last couple of years, both the number of smart devices using mobile networks' services, and the number of security threats for mobile devices have increased rapidly. This growth generates new challenges for mobile network operators. One of the recent challenges is fighting the signaling attacks and storms, that represent a type of distributed denial of service (DDoS) attacks, which overload the signaling plane of the networks, and threat networks' stability. This paper proposes a detection mechanism for such attacks. A cost function is defined using the low bandwidth usage characteristic and is calculated in a exponential weighted moving average manner to enable real-time detection of attack intervals. The detector is implemented in a simulation environment in a 3G UMTS network and evaluated using metrics of interest such as: detection delay and probability of false positive and false negative detections. Finally, a simple attack mitigation technique is used together with the detector in a network under attack and manages to reduce the signaling load and end-to-end delay to the level of an unattacked network.
引用
收藏
页码:105 / 114
页数:10
相关论文
共 50 条
  • [1] Location Privacy in Usage-Based Automotive Insurance: Attacks and Countermeasures
    Zhou, Lu
    Du, Suguo
    Zhu, Haojin
    Chen, Cailian
    Ota, Kaoru
    Dong, Mianxiong
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (01) : 196 - 211
  • [2] Usage-Based Automatic Detection of Usability Smells
    Harms, Patrick
    Grabowski, Jens
    HUMAN-CENTERED SOFTWARE ENGINEERING, HCSE 2014, 2014, 8742 : 217 - 234
  • [3] ABSENCE: Usage-based Failure Detection in Mobile Networks
    Binh Nguyen
    Ge, Zihui
    Van der Merwe, Jacobus
    Yan, He
    Yates, Jennifer
    MOBICOM '15: PROCEEDINGS OF THE 21ST ANNUAL INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND NETWORKING, 2015, : 464 - 476
  • [4] Usage-based Theory
    王帅
    海外英语, 2019, (07) : 245 - 246
  • [5] THE HANDBOOK OF USAGE-BASED LINGUISTICS
    Wu, Xia
    Shao, Bin
    APPLIED LINGUISTICS, 2024,
  • [6] Psycholinguistics and Usage-based Models
    de Souza Filho, Neemias Silva
    Godoy, Mahayana Cristina
    REVISTA DE ESTUDOS DA LINGUAGEM, 2022, 30 (02) : 1103 - 1133
  • [7] Mobile Internet usage and usage-based pricing
    Prince, Jeffrey
    Greenstein, Shane
    JOURNAL OF ECONOMICS & MANAGEMENT STRATEGY, 2021, 30 (04) : 760 - 783
  • [8] Usage-based schema matching
    Elmeleegy, Hazem
    Ouzzani, Mourad
    Elmagarmid, Ahmed
    2008 IEEE 24TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING, VOLS 1-3, 2008, : 20 - +
  • [9] Usage-based Object Similarity
    Niemann, Katja
    Scheffel, Maren
    Friedrich, Martin
    Kirschenmann, Uwe
    Schmitz, Hans-Christian
    Wolpers, Martin
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2010, 16 (16) : 2272 - 2290
  • [10] The scope of usage-based theory
    Ibbotson, Paul
    FRONTIERS IN PSYCHOLOGY, 2013, 4