Botnets in 4G Cellular Networks: Platforms to Launch DDoS Attacks Against the Air Interface

被引:0
作者
Khosroshahy, Masood [1 ]
Qiu, Dongyu [1 ]
Ali, Mustafa K. Mehmet [1 ]
机构
[1] Concordia Univ, Dept Elect & Comp Engn, Montreal, PQ H3G 1M8, Canada
来源
2013 INTERNATIONAL CONFERENCE ON SELECTED TOPICS IN MOBILE AND WIRELESS NETWORKING (MOWNET) | 2013年
关键词
Cellular radio; Long Term Evolution; Communication system security; Computer viruses; Botnets;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Botnets are overlay networks built by cyber-criminals from hacked smartphones and computers. In this paper, we report a vulnerability of the air interface of 4G cellular networks, the Long Term Evolution (LTE), to Distributed Denial-of-Service (DDoS) attacks launched from botnets. The attack scenario constitutes of a bot-master instructing the botnet nodes to start sending or downloading dummy data in order to overwhelm the air interface, thereby denying service for voice users. Through simulation using a capable LTE simulator, we determine the number of botnet nodes needed per cell that can effectively render the cellular network unusable. Specifically, we show that a botnet that has spread to only 3% of subscribers is capable of lowering the voice quality from 4.3 to 2.8 in Mean Opinion Score (MOS) scale of 1 to 5 for scheduling strategies designed for real-time flows. On the other hand, a botnet that has managed to spread to 6% of subscribers can cause a MOS value of 1, i.e., a complete outage. The threat identified and the reported results could inspire the implementation of new mechanisms to ensure the security and availability of vital telecommunication services.
引用
收藏
页码:30 / 35
页数:6
相关论文
共 13 条
[1]  
[Anonymous], 2010, MOB US DAT VOIC RES
[2]  
[Anonymous], 2012, 284233163 ER UEN
[3]   Exploiting SIP for Botnet Communication [J].
Berger, Andreas ;
Hefeeda, Mohamed .
2009 5TH IEEE WORKSHOP ON SECURE NETWORK PROTOCOLS, 2009, :31-+
[4]   Internet security meets the IP Multimedia Subsystem: an overview [J].
Berger, Andreas ;
Gojmerac, Ivan ;
Jung, Oliver .
SECURITY AND COMMUNICATION NETWORKS, 2010, 3 (2-3) :185-206
[5]   A survey of mobility models for ad hoc network research [J].
Camp, T ;
Boleng, J ;
Davies, V .
WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2002, 2 (05) :483-502
[6]   Speech quality prediction in VoIP using the extended e-model [J].
Ding, LJ ;
Goubran, RA .
GLOBECOM'03: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-7, 2003, :3974-3978
[7]   Botnets: To what extent are they a threat to information security? [J].
Elliott C. .
Information Security Technical Report, 2010, 15 (03) :79-103
[8]  
Etminani N., 2012, COMMUNICATION
[9]  
Mulliner C., 2010, 2010 5th International Conference on Malicious and Unwanted Software (MALWARE 2010), P71, DOI 10.1109/MALWARE.2010.5665790
[10]   Simulating LTE Cellular Systems: An Open-Source Framework [J].
Piro, Giuseppe ;
Grieco, Luigi Alfredo ;
Boggia, Gennaro ;
Capozzi, Francesco ;
Camarda, Pietro .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2011, 60 (02) :498-513