메뉴 건너뛰기




Volumn 33, Issue 5, 2010, Pages 551-558

A review of DoS attack models for 3G cellular networks from a system-design perspective

Author keywords

3G; Cellular networks; DoS; Network robustness; Signaling attacks

Indexed keywords

3G; 3G CELLULAR NETWORKS; 3G NETWORKS; ATTACK MODEL; CELLULAR NETWORK; DENIAL OF SERVICE ATTACKS; DESIGN PRACTICE; DOS ATTACKS; FUTURE GENERATIONS; NETWORK ROBUSTNESS; PRIORITIZATION; ROBUST SYSTEM DESIGN; SCIENTIFIC COMMUNITY; THIRD GENERATION;

EID: 74849109011     PISSN: 01403664     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comcom.2009.11.015     Document Type: Review
Times cited : (49)

References (25)
  • 1
    • 33745796561 scopus 로고    scopus 로고
    • Exploiting open functionality in SMS-capable cellular networks
    • Alexandria, Virginia, US, November
    • W. Enck, P. Traynor, P. McDaniel, T. La Porta, Exploiting open functionality in SMS-capable cellular networks, in: Proceedings of the ACM CCS'05, Alexandria, Virginia, US, November 2005.
    • (2005) Proceedings of the ACM CCS'05
    • Enck, W.1    Traynor, P.2    McDaniel, P.3    La Porta, T.4
  • 4
    • 34247488845 scopus 로고    scopus 로고
    • Impact of paging channel overloads or attacks on a cellular network
    • Los Angeles, USA, September
    • J. Serror, H. Zang, J.C. Bolot, Impact of paging channel overloads or attacks on a cellular network, in: Proceedings of the ACM WiSe'06, Los Angeles, USA, September 2006.
    • (2006) Proceedings of the ACM WiSe'06
    • Serror, J.1    Zang, H.2    Bolot, J.C.3
  • 5
    • 34548310426 scopus 로고    scopus 로고
    • P. Lee, T. Bu, T. Woo, On the detection of signaling DoS attacks on 3G wireless networks, in: IEEE INFOCOM 2007, Phoenix, USA, April 2007.
    • P. Lee, T. Bu, T. Woo, On the detection of signaling DoS attacks on 3G wireless networks, in: IEEE INFOCOM 2007, Phoenix, USA, April 2007.
  • 8
    • 68949173234 scopus 로고    scopus 로고
    • Taxonomies of attacks and vulnerabilities in computer systems
    • Igure V.M., and Williams R.D. Taxonomies of attacks and vulnerabilities in computer systems. IEEE Communications Surveys 10 1, Q1 (2008)
    • (2008) IEEE Communications Surveys , vol.10 , Issue.1 Q1
    • Igure, V.M.1    Williams, R.D.2
  • 9
    • 54949100002 scopus 로고    scopus 로고
    • Discovering parameter setting in 3G networks via active measurements
    • Barbuzzi A., Ricciato F., and Boggia G. Discovering parameter setting in 3G networks via active measurements. IEEE Communications Letters 12 10 (2008)
    • (2008) IEEE Communications Letters , vol.12 , Issue.10
    • Barbuzzi, A.1    Ricciato, F.2    Boggia, G.3
  • 10
    • 0000188718 scopus 로고    scopus 로고
    • Highly optimized tolerance: robustness and design in complex systems
    • Carlson J., and Doyle J. Highly optimized tolerance: robustness and design in complex systems. Physical Review Letters 84 11 (2000)
    • (2000) Physical Review Letters , vol.84 , Issue.11
    • Carlson, J.1    Doyle, J.2
  • 15
    • 74849126022 scopus 로고    scopus 로고
    • S. Bali, S. Machiraju, H. Zang, V. Frostl, A measurement study of scheduler-based attacks in 3G wireless networks, in: IEEE PAM, 2007.
    • S. Bali, S. Machiraju, H. Zang, V. Frostl, A measurement study of scheduler-based attacks in 3G wireless networks, in: IEEE PAM, 2007.
  • 17
    • 70349686596 scopus 로고    scopus 로고
    • B. Zhao, C. Chi, W. Gao, S. Zhu, G. Cao, A chain reaction DoS attack on 3G networks: analysis and defenses, in: IEEE INFOCOM, 2009.
    • B. Zhao, C. Chi, W. Gao, S. Zhu, G. Cao, A chain reaction DoS attack on 3G networks: analysis and defenses, in: IEEE INFOCOM, 2009.
  • 22
    • 1642344382 scopus 로고    scopus 로고
    • Security in third-generation mobile networks
    • Xenakis C., and Merakos L. Security in third-generation mobile networks. Computer Communications 27 (2004) 638-650
    • (2004) Computer Communications , vol.27 , pp. 638-650
    • Xenakis, C.1    Merakos, L.2
  • 23
    • 35248869678 scopus 로고    scopus 로고
    • Dependency relation based vulnerability analysis of 3G networks: can it identify unforeseen cascading attacks?
    • Kotapati K., Liu P., and Laporta T.F. Dependency relation based vulnerability analysis of 3G networks: can it identify unforeseen cascading attacks?. Telecommunication Systems 35 3-4 (2007)
    • (2007) Telecommunication Systems , vol.35 , Issue.3-4
    • Kotapati, K.1    Liu, P.2    Laporta, T.F.3
  • 24
    • 50049091842 scopus 로고    scopus 로고
    • Exploiting MMS vulnerabilities to stealthily exhaust mobile phones battery
    • Baltimore, USA
    • R. Racic, D. Ma, H. Chen, Exploiting MMS vulnerabilities to stealthily exhaust mobile phones battery, in: SECURECOMM'06, Baltimore, USA.
    • SECURECOMM'06
    • Racic, R.1    Ma, D.2    Chen, H.3
  • 25
    • 37849015209 scopus 로고    scopus 로고
    • Mining call and mobility data to improve paging efficiency in cellular networks
    • New York, USA
    • H. Zang, J.C. Bolot. Mining call and mobility data to improve paging efficiency in cellular networks, in: ACM MobiCom'07, New York, USA, 2007.
    • (2007) ACM MobiCom'07
    • Zang, H.1    Bolot, J.C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.