Bandwidth Usage-Based Detection of Signaling Attacks

被引:6
|
作者
Pavloski, Mihajlo [1 ]
Gorbil, Gokce [1 ]
Gelenbe, Erol [1 ]
机构
[1] Imperial Coll, Dept Elect & Elect Engn, Intelligent Syst & Networks Grp, London SW7 2AZ, England
来源
关键词
Signaling attacks; Detection; Denial of service; Exponential weighted moving average; Mitigation; NETWORK;
D O I
10.1007/978-3-319-22635-4_9
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In the last couple of years, both the number of smart devices using mobile networks' services, and the number of security threats for mobile devices have increased rapidly. This growth generates new challenges for mobile network operators. One of the recent challenges is fighting the signaling attacks and storms, that represent a type of distributed denial of service (DDoS) attacks, which overload the signaling plane of the networks, and threat networks' stability. This paper proposes a detection mechanism for such attacks. A cost function is defined using the low bandwidth usage characteristic and is calculated in a exponential weighted moving average manner to enable real-time detection of attack intervals. The detector is implemented in a simulation environment in a 3G UMTS network and evaluated using metrics of interest such as: detection delay and probability of false positive and false negative detections. Finally, a simple attack mitigation technique is used together with the detector in a network under attack and manages to reduce the signaling load and end-to-end delay to the level of an unattacked network.
引用
收藏
页码:105 / 114
页数:10
相关论文
共 50 条
  • [31] Detecting Pulsing Denial-of-Service attacks based on the bandwidth usage condition
    Tsunoda, Hiroshi
    Arai, Kenjirou
    Waizumi, Yuji
    Ansari, Nirwan
    Nemoto, Yoshiaki
    2008 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, PROCEEDINGS, VOLS 1-13, 2008, : 1670 - +
  • [32] Usage-based Insurance Using IoT Platform
    Lertpunyavuttikul, Puntavut
    Chuenprasertsuk, Pinyarat
    Glomglome, Sorayut
    2017 21ST INTERNATIONAL COMPUTER SCIENCE AND ENGINEERING CONFERENCE (ICSEC 2017), 2017, : 286 - 289
  • [33] Usage-Based Collection Evaluation with a Curricular Focus
    Kohn, Karen C.
    COLLEGE & RESEARCH LIBRARIES, 2013, 74 (01): : 85 - 97
  • [34] A USAGE-BASED THEORY OF GRAMMATICAL STATUS AND GRAMMATICALIZATION
    Boye, Kasper
    Harder, Peter
    LANGUAGE, 2012, 88 (01) : 1 - 44
  • [35] A usage-based approach to counterfactuality: optionality of the apodosis
    Van Linden, An
    THEORETICAL LINGUISTICS, 2021, 47 (3-4) : 277 - 286
  • [36] "[Vai que]" and the conditionality: a usage-based analysis
    Ely, Leyla
    Cezario, Maria Maura da Conceicao
    ENTREPALAVRAS, 2023, 13 (01): : 245 - 264
  • [37] SOME FAQS ABOUT USAGE-BASED PRICING
    MACKIEMASON, JK
    VARIAN, HR
    COMPUTER NETWORKS AND ISDN SYSTEMS, 1995, 28 (1-2): : 257 - 265
  • [38] OntoManager - A system for the usage-based ontology management
    Stojanovic, L
    Stojanovic, N
    Gonzalez, J
    Studer, R
    ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2003: COOPIS, DOA, AND ODBASE, 2003, 2888 : 858 - 875
  • [39] Is the Phoneme Usage-Based? - Some Issues(1)
    Nathan, Geoffrey S.
    INTERNATIONAL JOURNAL OF ENGLISH STUDIES, 2006, 6 (02): : 173 - 194
  • [40] Usage-based functional linguistics and portuguese teaching
    Furtado da Cunha, Maria Angelica
    Bispo, Edvaldo Balduino
    Silva, Jose Romerito
    GRAGOATA-UFF, 2014, 19 (36): : 80 - 104