On cellular botnets: measuring the impact of malicious devices on a cellular network core. Traynor, P., Lin, M., Ongtang, M., Rao, V., Jaeger, T., McDaniel, P., & La Porta, T. In Proceedings of the 16th ACM conference on Computer and communications security - CCS '09, pages 223, Chicago, Illinois, USA, 2009. ACM Press.
Paper doi abstract bibtex The vast expansion of interconnectivity with the Internet and the rapid evolution of highly-capable but largely insecure mobile devices threatens cellular networks. In this paper, we characterize the impact of the large scale compromise and coordination of mobile phones in attacks against the core of these networks. Through a combination of measurement, simulation and analysis, we demonstrate the ability of a botnet composed of as few as 11,750 compromised mobile phones to degrade service to area-code sized regions by 93%. As such attacks are accomplished through the execution of network service requests and not a constant stream of phone calls, users are unlikely to be aware of their occurrence. We then investigate a number of significant network bottlenecks, their impact on the density of compromised nodes per base station and how they can be avoided. We conclude by discussing a number of countermeasures that may help to partially mitigate the threats posed by such attacks.
@inproceedings{traynor_cellular_2009,
address = {Chicago, Illinois, USA},
title = {On cellular botnets: measuring the impact of malicious devices on a cellular network core},
isbn = {978-1-60558-894-0},
shorttitle = {On cellular botnets},
url = {http://portal.acm.org/citation.cfm?doid=1653662.1653690},
doi = {10.1145/1653662.1653690},
abstract = {The vast expansion of interconnectivity with the Internet and the rapid evolution of highly-capable but largely insecure mobile devices threatens cellular networks. In this paper, we characterize the impact of the large scale compromise and coordination of mobile phones in attacks against the core of these networks. Through a combination of measurement, simulation and analysis, we demonstrate the ability of a botnet composed of as few as 11,750 compromised mobile phones to degrade service to area-code sized regions by 93\%. As such attacks are accomplished through the execution of network service requests and not a constant stream of phone calls, users are unlikely to be aware of their occurrence. We then investigate a number of significant network bottlenecks, their impact on the density of compromised nodes per base station and how they can be avoided. We conclude by discussing a number of countermeasures that may help to partially mitigate the threats posed by such attacks.},
language = {en},
urldate = {2020-05-20},
booktitle = {Proceedings of the 16th {ACM} conference on {Computer} and communications security - {CCS} '09},
publisher = {ACM Press},
author = {Traynor, Patrick and Lin, Michael and Ongtang, Machigar and Rao, Vikhyath and Jaeger, Trent and McDaniel, Patrick and La Porta, Thomas},
year = {2009},
pages = {223}
}
Downloads: 0
{"_id":"87XNEWLri3xh6gQYE","bibbaseid":"traynor-lin-ongtang-rao-jaeger-mcdaniel-laporta-oncellularbotnetsmeasuringtheimpactofmaliciousdevicesonacellularnetworkcore-2009","authorIDs":[],"author_short":["Traynor, P.","Lin, M.","Ongtang, M.","Rao, V.","Jaeger, T.","McDaniel, P.","La Porta, T."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","address":"Chicago, Illinois, USA","title":"On cellular botnets: measuring the impact of malicious devices on a cellular network core","isbn":"978-1-60558-894-0","shorttitle":"On cellular botnets","url":"http://portal.acm.org/citation.cfm?doid=1653662.1653690","doi":"10.1145/1653662.1653690","abstract":"The vast expansion of interconnectivity with the Internet and the rapid evolution of highly-capable but largely insecure mobile devices threatens cellular networks. In this paper, we characterize the impact of the large scale compromise and coordination of mobile phones in attacks against the core of these networks. Through a combination of measurement, simulation and analysis, we demonstrate the ability of a botnet composed of as few as 11,750 compromised mobile phones to degrade service to area-code sized regions by 93%. As such attacks are accomplished through the execution of network service requests and not a constant stream of phone calls, users are unlikely to be aware of their occurrence. We then investigate a number of significant network bottlenecks, their impact on the density of compromised nodes per base station and how they can be avoided. We conclude by discussing a number of countermeasures that may help to partially mitigate the threats posed by such attacks.","language":"en","urldate":"2020-05-20","booktitle":"Proceedings of the 16th ACM conference on Computer and communications security - CCS '09","publisher":"ACM Press","author":[{"propositions":[],"lastnames":["Traynor"],"firstnames":["Patrick"],"suffixes":[]},{"propositions":[],"lastnames":["Lin"],"firstnames":["Michael"],"suffixes":[]},{"propositions":[],"lastnames":["Ongtang"],"firstnames":["Machigar"],"suffixes":[]},{"propositions":[],"lastnames":["Rao"],"firstnames":["Vikhyath"],"suffixes":[]},{"propositions":[],"lastnames":["Jaeger"],"firstnames":["Trent"],"suffixes":[]},{"propositions":[],"lastnames":["McDaniel"],"firstnames":["Patrick"],"suffixes":[]},{"propositions":[],"lastnames":["La","Porta"],"firstnames":["Thomas"],"suffixes":[]}],"year":"2009","pages":"223","bibtex":"@inproceedings{traynor_cellular_2009,\n\taddress = {Chicago, Illinois, USA},\n\ttitle = {On cellular botnets: measuring the impact of malicious devices on a cellular network core},\n\tisbn = {978-1-60558-894-0},\n\tshorttitle = {On cellular botnets},\n\turl = {http://portal.acm.org/citation.cfm?doid=1653662.1653690},\n\tdoi = {10.1145/1653662.1653690},\n\tabstract = {The vast expansion of interconnectivity with the Internet and the rapid evolution of highly-capable but largely insecure mobile devices threatens cellular networks. In this paper, we characterize the impact of the large scale compromise and coordination of mobile phones in attacks against the core of these networks. Through a combination of measurement, simulation and analysis, we demonstrate the ability of a botnet composed of as few as 11,750 compromised mobile phones to degrade service to area-code sized regions by 93\\%. As such attacks are accomplished through the execution of network service requests and not a constant stream of phone calls, users are unlikely to be aware of their occurrence. We then investigate a number of significant network bottlenecks, their impact on the density of compromised nodes per base station and how they can be avoided. We conclude by discussing a number of countermeasures that may help to partially mitigate the threats posed by such attacks.},\n\tlanguage = {en},\n\turldate = {2020-05-20},\n\tbooktitle = {Proceedings of the 16th {ACM} conference on {Computer} and communications security - {CCS} '09},\n\tpublisher = {ACM Press},\n\tauthor = {Traynor, Patrick and Lin, Michael and Ongtang, Machigar and Rao, Vikhyath and Jaeger, Trent and McDaniel, Patrick and La Porta, Thomas},\n\tyear = {2009},\n\tpages = {223}\n}\n\n","author_short":["Traynor, P.","Lin, M.","Ongtang, M.","Rao, V.","Jaeger, T.","McDaniel, P.","La Porta, T."],"key":"traynor_cellular_2009","id":"traynor_cellular_2009","bibbaseid":"traynor-lin-ongtang-rao-jaeger-mcdaniel-laporta-oncellularbotnetsmeasuringtheimpactofmaliciousdevicesonacellularnetworkcore-2009","role":"author","urls":{"Paper":"http://portal.acm.org/citation.cfm?doid=1653662.1653690"},"downloads":0,"html":""},"bibtype":"inproceedings","biburl":"https://bibbase.org/zotero/21h","creationDate":"2020-05-22T18:11:30.413Z","downloads":0,"keywords":[],"search_terms":["cellular","botnets","measuring","impact","malicious","devices","cellular","network","core","traynor","lin","ongtang","rao","jaeger","mcdaniel","la porta"],"title":"On cellular botnets: measuring the impact of malicious devices on a cellular network core","year":2009,"dataSources":["NpxDwkFvCjNmGYFSj"]}