메뉴 건너뛰기




Volumn , Issue , 2009, Pages 2455-2463

A chain reaction DoS attack on 3G networks: Analysis and defenses

Author keywords

[No Author keywords available]

Indexed keywords

3G NETWORKS; CHAIN REACTION; CHANGE POINT DETECTION; DEFENSE MECHANISM; DOS ATTACKS; FALSE ALARMS; IP MULTIMEDIA SUBSYSTEMS; MALICIOUS ATTACK; NON-PARAMETRIC; PRESENCE SERVICE; THIRD-GENERATION (3G) NETWORKS; TIME WINDOWS;

EID: 70349686596     PISSN: 0743166X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFCOM.2009.5062173     Document Type: Conference Paper
Times cited : (19)

References (30)
  • 1
    • 33646677487 scopus 로고    scopus 로고
    • Presence and availability with ims: Applications architecture, traffic analysis, and capacity impacts
    • Mar
    • C. Urrutia-Valds, A. Mukhopadhyay, and M. El-Sayed, "Presence and availability with ims: Applications architecture, traffic analysis, and capacity impacts," Bell Labs Technical Journal, vol. 10(4), pp. 101-107, Mar 2006.
    • (2006) Bell Labs Technical Journal , vol.10 , Issue.4 , pp. 101-107
    • Urrutia-Valds, C.1    Mukhopadhyay, A.2    El-Sayed, M.3
  • 4
    • 85084163281 scopus 로고    scopus 로고
    • R. Zhang and X. Wang, Billing attacks on SIP-based VoIP systems, In Proceedings of the 1st USENIX Workshop on Offensive Technologies (WOOT 2007), 2007.
    • R. Zhang and X. Wang, "Billing attacks on SIP-based VoIP systems," In Proceedings of the 1st USENIX Workshop on Offensive Technologies (WOOT 2007), 2007.
  • 5
    • 0001736564 scopus 로고
    • A bayes approach to a quality control model
    • M.A. Girshick and H. Rubin, "A bayes approach to a quality control model," Ann. Math. Statist, vol. 23 1, pp. 114-125, 1952.
    • (1952) Ann. Math. Statist , vol.23 , Issue.1 , pp. 114-125
    • Girshick, M.A.1    Rubin, H.2
  • 8
    • 70349717154 scopus 로고    scopus 로고
    • The open sip express router (OpenSER)
    • OPENSER
    • OPENSER, "The open sip express router (OpenSER)."
  • 13
    • 70349659420 scopus 로고    scopus 로고
    • A social network based patching scheme for worm containment in cellular networks
    • Rio de Janeiro, Brazil, April
    • Z. Zhu, G. Cao, S. Zhu, S. Ranjany, and A. Nucciy, "A social network based patching scheme for worm containment in cellular networks," in Proceedings of IEEE INFOCOM, Rio de Janeiro, Brazil, April 2009.
    • (2009) Proceedings of IEEE INFOCOM
    • Zhu, Z.1    Cao, G.2    Zhu, S.3    Ranjany, S.4    Nucciy, A.5
  • 14
    • 84869622463 scopus 로고    scopus 로고
    • 3GPP2, IMS security framework
    • 3GPP2, "IMS security framework," www.3gpp2.org/Public-html/ specs/S.R0086-A-v1.0-040614.pdf 2004.
  • 15
    • 70349712621 scopus 로고    scopus 로고
    • 3GPP, Feasibility study on IMS security extensions 3GPP TR 33.802, 3GPP, V0.1.0, 2005
    • 3GPP, "Feasibility study on IMS security extensions 3GPP TR 33.802," 3GPP, vol. V0.1.0, 2005.
  • 16
    • 33744815196 scopus 로고    scopus 로고
    • E. E. Anderlind, D. W. Faucher, E. H. Grosse, D. N. Heer, A. R. McGee, D.P. Strand, and R.J.T. Jr., IMS security, Bell Labs Technical Journal, 11(1), pp. 37-58, 2006.
    • E. E. Anderlind, D. W. Faucher, E. H. Grosse, D. N. Heer, A. R. McGee, D.P. Strand, and R.J.T. Jr., "IMS security," Bell Labs Technical Journal, vol. 11(1), pp. 37-58, 2006.
  • 19
    • 0038056517 scopus 로고    scopus 로고
    • Session initiation protocol (SIP)-specific event notification
    • June
    • A. B. Roach, "Session initiation protocol (SIP)-specific event notification. rfc 3265," IETF, June 2002.
    • (2002) IETF
    • Roach, A.B.1
  • 20
    • 22244475877 scopus 로고    scopus 로고
    • A presence event package for the session initiation protocol (SIP)
    • August
    • J. Rosenberg, "A presence event package for the session initiation protocol (SIP). rfc 3856," IETF, August 2004.
    • (2004) IETF
    • Rosenberg, J.1
  • 21
    • 33750948175 scopus 로고    scopus 로고
    • A session initiation protocol (SIP) event notification extension for resource lists
    • August
    • A. B. Roach, B. Campbell, and J. Rosenberg, "A session initiation protocol (SIP) event notification extension for resource lists. rfc 4662," IETF, August 2006.
    • (2006) IETF
    • Roach, A.B.1    Campbell, B.2    Rosenberg, J.3
  • 22
    • 33744524845 scopus 로고    scopus 로고
    • Low-rate TCP-targeted denial of service attacks and counter strategies
    • August
    • A. Kuzmanovic and E. W. Knightly, "Low-rate TCP-targeted denial of service attacks and counter strategies," in IEEE/ACM Transactions on Networking (TON), vol. 14, August 2006.
    • (2006) IEEE/ACM Transactions on Networking (TON) , vol.14
    • Kuzmanovic, A.1    Knightly, E.W.2
  • 23
    • 34548310426 scopus 로고    scopus 로고
    • On the detection of signaling DoS attacks on 3G wireless networks
    • Anchorage, Alaska, May
    • P. P. Lee, T. Bu, and T. Woo, "On the detection of signaling DoS attacks on 3G wireless networks," in Proceedings of IEEE INFOCOM, Anchorage, Alaska, May 2007.
    • (2007) Proceedings of IEEE INFOCOM
    • Lee, P.P.1    Bu, T.2    Woo, T.3
  • 25
    • 14644397228 scopus 로고    scopus 로고
    • Change-point monitoring for the detection of DoS attacks, IEEE Trans. Dependable Secur. Comput., 1, no. 4, pp. 193-208, 2004, member-Haining Wang and Member-Danlu Zhang and Fellow-Kang G. Shin.
    • "Change-point monitoring for the detection of DoS attacks," IEEE Trans. Dependable Secur. Comput., vol. 1, no. 4, pp. 193-208, 2004, member-Haining Wang and Member-Danlu Zhang and Fellow-Kang G. Shin.
  • 29
    • 0004194675 scopus 로고    scopus 로고
    • ICMP traceback messages. ietf internet draft
    • Feb
    • S. Bellovin, "ICMP traceback messages. ietf internet draft," Feb 2003.
    • (2003)
    • Bellovin, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.