A Denial of Service Attack to GSM Networks via Attach Procedure. Gobbo, N., Merlo, A., & Migliardi, M. In Hutchison, D., Kanade, T., Kittler, J., Kleinberg, J. M., Mattern, F., Mitchell, J. C., Naor, M., Nierstrasz, O., Pandu Rangan, C., Steffen, B., Sudan, M., Terzopoulos, D., Tygar, D., Vardi, M. Y., Weikum, G., Cuzzocrea, A., Kittl, C., Simos, D. E., Weippl, E., & Xu, L., editors, Security Engineering and Intelligence Informatics, volume 8128, pages 361–376. Springer Berlin Heidelberg, Berlin, Heidelberg, 2013. Series Title: Lecture Notes in Computer Science
Paper doi abstract bibtex Mobile Network Operators (MNOs) keep a strict control over users accessing the networks by means of the Subscriber Identity Module (SIM). This module grants the user access to the network, by performing the registration and authentication of the user’s device. Without a valid Subscribe Identity Module (SIM) module and a successful authentication, mobile devices are not granted access and, hence, they are not allowed to inject any traffic in the mobile infrastructure. Nevertheless, in this paper we describe an attack to the security of a mobile network allowing an unauthenticated malicious mobile device to inject traffic in the mobile operator’s infrastructure. We show that even with devices without any SIM module it is possible to inject high levels of signaling traffic in the mobile infrastructure, causing significant service degradation up to a full-fledged Denial of Service (DoS) attack.
@incollection{hutchison_denial_2013,
address = {Berlin, Heidelberg},
title = {A {Denial} of {Service} {Attack} to {GSM} {Networks} via {Attach} {Procedure}},
volume = {8128},
isbn = {978-3-642-40587-7 978-3-642-40588-4},
url = {http://link.springer.com/10.1007/978-3-642-40588-4_25},
abstract = {Mobile Network Operators (MNOs) keep a strict control over users accessing the networks by means of the Subscriber Identity Module (SIM). This module grants the user access to the network, by performing the registration and authentication of the user’s device. Without a valid Subscribe Identity Module (SIM) module and a successful authentication, mobile devices are not granted access and, hence, they are not allowed to inject any traffic in the mobile infrastructure. Nevertheless, in this paper we describe an attack to the security of a mobile network allowing an unauthenticated malicious mobile device to inject traffic in the mobile operator’s infrastructure. We show that even with devices without any SIM module it is possible to inject high levels of signaling traffic in the mobile infrastructure, causing significant service degradation up to a full-fledged Denial of Service (DoS) attack.},
language = {en},
urldate = {2020-05-20},
booktitle = {Security {Engineering} and {Intelligence} {Informatics}},
publisher = {Springer Berlin Heidelberg},
author = {Gobbo, Nicola and Merlo, Alessio and Migliardi, Mauro},
editor = {Hutchison, David and Kanade, Takeo and Kittler, Josef and Kleinberg, Jon M. and Mattern, Friedemann and Mitchell, John C. and Naor, Moni and Nierstrasz, Oscar and Pandu Rangan, C. and Steffen, Bernhard and Sudan, Madhu and Terzopoulos, Demetri and Tygar, Doug and Vardi, Moshe Y. and Weikum, Gerhard and Cuzzocrea, Alfredo and Kittl, Christian and Simos, Dimitris E. and Weippl, Edgar and Xu, Lida},
year = {2013},
doi = {10.1007/978-3-642-40588-4_25},
note = {Series Title: Lecture Notes in Computer Science},
pages = {361--376}
}
Downloads: 0
{"_id":"WhsrXfb2eA8QaBiqH","bibbaseid":"gobbo-merlo-migliardi-adenialofserviceattacktogsmnetworksviaattachprocedure-2013","downloads":0,"creationDate":"2016-08-26T09:27:24.946Z","title":"A Denial of Service Attack to GSM Networks via Attach Procedure","author_short":["Gobbo, N.","Merlo, A.","Migliardi, M."],"year":2013,"bibtype":"incollection","biburl":"https://bibbase.org/zotero/21h","bibdata":{"bibtype":"incollection","type":"incollection","address":"Berlin, Heidelberg","title":"A Denial of Service Attack to GSM Networks via Attach Procedure","volume":"8128","isbn":"978-3-642-40587-7 978-3-642-40588-4","url":"http://link.springer.com/10.1007/978-3-642-40588-4_25","abstract":"Mobile Network Operators (MNOs) keep a strict control over users accessing the networks by means of the Subscriber Identity Module (SIM). This module grants the user access to the network, by performing the registration and authentication of the user’s device. Without a valid Subscribe Identity Module (SIM) module and a successful authentication, mobile devices are not granted access and, hence, they are not allowed to inject any traffic in the mobile infrastructure. Nevertheless, in this paper we describe an attack to the security of a mobile network allowing an unauthenticated malicious mobile device to inject traffic in the mobile operator’s infrastructure. We show that even with devices without any SIM module it is possible to inject high levels of signaling traffic in the mobile infrastructure, causing significant service degradation up to a full-fledged Denial of Service (DoS) attack.","language":"en","urldate":"2020-05-20","booktitle":"Security Engineering and Intelligence Informatics","publisher":"Springer Berlin Heidelberg","author":[{"propositions":[],"lastnames":["Gobbo"],"firstnames":["Nicola"],"suffixes":[]},{"propositions":[],"lastnames":["Merlo"],"firstnames":["Alessio"],"suffixes":[]},{"propositions":[],"lastnames":["Migliardi"],"firstnames":["Mauro"],"suffixes":[]}],"editor":[{"propositions":[],"lastnames":["Hutchison"],"firstnames":["David"],"suffixes":[]},{"propositions":[],"lastnames":["Kanade"],"firstnames":["Takeo"],"suffixes":[]},{"propositions":[],"lastnames":["Kittler"],"firstnames":["Josef"],"suffixes":[]},{"propositions":[],"lastnames":["Kleinberg"],"firstnames":["Jon","M."],"suffixes":[]},{"propositions":[],"lastnames":["Mattern"],"firstnames":["Friedemann"],"suffixes":[]},{"propositions":[],"lastnames":["Mitchell"],"firstnames":["John","C."],"suffixes":[]},{"propositions":[],"lastnames":["Naor"],"firstnames":["Moni"],"suffixes":[]},{"propositions":[],"lastnames":["Nierstrasz"],"firstnames":["Oscar"],"suffixes":[]},{"propositions":[],"lastnames":["Pandu","Rangan"],"firstnames":["C."],"suffixes":[]},{"propositions":[],"lastnames":["Steffen"],"firstnames":["Bernhard"],"suffixes":[]},{"propositions":[],"lastnames":["Sudan"],"firstnames":["Madhu"],"suffixes":[]},{"propositions":[],"lastnames":["Terzopoulos"],"firstnames":["Demetri"],"suffixes":[]},{"propositions":[],"lastnames":["Tygar"],"firstnames":["Doug"],"suffixes":[]},{"propositions":[],"lastnames":["Vardi"],"firstnames":["Moshe","Y."],"suffixes":[]},{"propositions":[],"lastnames":["Weikum"],"firstnames":["Gerhard"],"suffixes":[]},{"propositions":[],"lastnames":["Cuzzocrea"],"firstnames":["Alfredo"],"suffixes":[]},{"propositions":[],"lastnames":["Kittl"],"firstnames":["Christian"],"suffixes":[]},{"propositions":[],"lastnames":["Simos"],"firstnames":["Dimitris","E."],"suffixes":[]},{"propositions":[],"lastnames":["Weippl"],"firstnames":["Edgar"],"suffixes":[]},{"propositions":[],"lastnames":["Xu"],"firstnames":["Lida"],"suffixes":[]}],"year":"2013","doi":"10.1007/978-3-642-40588-4_25","note":"Series Title: Lecture Notes in Computer Science","pages":"361–376","bibtex":"@incollection{hutchison_denial_2013,\n\taddress = {Berlin, Heidelberg},\n\ttitle = {A {Denial} of {Service} {Attack} to {GSM} {Networks} via {Attach} {Procedure}},\n\tvolume = {8128},\n\tisbn = {978-3-642-40587-7 978-3-642-40588-4},\n\turl = {http://link.springer.com/10.1007/978-3-642-40588-4_25},\n\tabstract = {Mobile Network Operators (MNOs) keep a strict control over users accessing the networks by means of the Subscriber Identity Module (SIM). This module grants the user access to the network, by performing the registration and authentication of the user’s device. Without a valid Subscribe Identity Module (SIM) module and a successful authentication, mobile devices are not granted access and, hence, they are not allowed to inject any traffic in the mobile infrastructure. Nevertheless, in this paper we describe an attack to the security of a mobile network allowing an unauthenticated malicious mobile device to inject traffic in the mobile operator’s infrastructure. We show that even with devices without any SIM module it is possible to inject high levels of signaling traffic in the mobile infrastructure, causing significant service degradation up to a full-fledged Denial of Service (DoS) attack.},\n\tlanguage = {en},\n\turldate = {2020-05-20},\n\tbooktitle = {Security {Engineering} and {Intelligence} {Informatics}},\n\tpublisher = {Springer Berlin Heidelberg},\n\tauthor = {Gobbo, Nicola and Merlo, Alessio and Migliardi, Mauro},\n\teditor = {Hutchison, David and Kanade, Takeo and Kittler, Josef and Kleinberg, Jon M. and Mattern, Friedemann and Mitchell, John C. and Naor, Moni and Nierstrasz, Oscar and Pandu Rangan, C. and Steffen, Bernhard and Sudan, Madhu and Terzopoulos, Demetri and Tygar, Doug and Vardi, Moshe Y. and Weikum, Gerhard and Cuzzocrea, Alfredo and Kittl, Christian and Simos, Dimitris E. and Weippl, Edgar and Xu, Lida},\n\tyear = {2013},\n\tdoi = {10.1007/978-3-642-40588-4_25},\n\tnote = {Series Title: Lecture Notes in Computer Science},\n\tpages = {361--376}\n}\n\n","author_short":["Gobbo, N.","Merlo, A.","Migliardi, M."],"editor_short":["Hutchison, D.","Kanade, T.","Kittler, J.","Kleinberg, J. M.","Mattern, F.","Mitchell, J. C.","Naor, M.","Nierstrasz, O.","Pandu Rangan, C.","Steffen, B.","Sudan, M.","Terzopoulos, D.","Tygar, D.","Vardi, M. Y.","Weikum, G.","Cuzzocrea, A.","Kittl, C.","Simos, D. E.","Weippl, E.","Xu, L."],"key":"hutchison_denial_2013","id":"hutchison_denial_2013","bibbaseid":"gobbo-merlo-migliardi-adenialofserviceattacktogsmnetworksviaattachprocedure-2013","role":"author","urls":{"Paper":"http://link.springer.com/10.1007/978-3-642-40588-4_25"},"downloads":0,"html":""},"search_terms":["denial","service","attack","gsm","networks","via","attach","procedure","gobbo","merlo","migliardi"],"keywords":["dblp"],"authorIDs":["57c00b7c5abfdd4d540000cb"],"dataSources":["NpxDwkFvCjNmGYFSj"]}