Mitigating Attacks on Open Functionality in SMS-Capable Cellular Networks

The transformation of telecommunications networks from homogeneous closed systems providing only voice services to Internet-connected open networks that provide voice and data services presents significant security challenges. For example, recent research illustrated that a carefully crafted DoS attack via text messaging could incapacitate all voice communications in a metropolitan area with little more than a cable modem. This attack highlights a growing threat to these systems; namely, cellular networks are increasingly exposed to adversaries both in and outside the network. In this paper, we use a combination of modeling and simulation to demonstrate the feasibility of targeted text messaging attacks. Under realistic network conditions, we show that adversaries can achieve blocking rates of more than 70% with only limited resources. We then develop and characterize five techniques from within two broad classes of countermeasures-queue management and resource provisioning. Our analysis demonstrates that these techniques can eliminate or extensively mitigate even the most intense targeted text messaging attacks. We conclude by considering the tradeoffs inherent to the application of these techniques in current and next generation telecommunications networks.

[1]  Steven M. Bellovin,et al.  Implementing Pushback: Router-Based Defense Against DDoS Attacks , 2002, NDSS.

[2]  Raj Jain,et al.  Myths about Congestion Management in High Speed Networks , 1992, INDC.

[3]  John Nagle,et al.  On Packet Switches with Infinite Storage , 1985, IEEE Trans. Commun..

[4]  Kazutaka Murakami,et al.  Global roaming and personal mobility with COPS architecture in SuperDHLR , 2002, Bell Labs Technical Journal.

[5]  Ari Juels,et al.  $evwu Dfw , 1998 .

[6]  Patrick D. McDaniel,et al.  On Attack Causality in Internet-Connected Cellular Networks , 2007, USENIX Security Symposium.

[7]  Brent Waters,et al.  New client puzzle outsourcing techniques for DoS resistance , 2004, CCS '04.

[8]  Angelos D. Keromytis,et al.  SOS: secure overlay services , 2002, SIGCOMM '02.

[9]  Bruce Schneier,et al.  Ten Risks of PKI , 2004 .

[10]  Aviel D. Rubin,et al.  Defending against an Internet-based attack on the physical world , 2002, TOIT.

[11]  Christian Lüders,et al.  The performance of the GSM random access procedure , 1994, Proceedings of IEEE Vehicular Technology Conference (VTC).

[12]  QUTdN QeO,et al.  Random early detection gateways for congestion avoidance , 1993, TNET.

[13]  Anna R. Karlin,et al.  Practical network support for IP traceback , 2000, SIGCOMM.

[14]  Mahmoud Naghshineh,et al.  Control and quality-of-service provisioning in high-speed microcellular networks , 1994, IEEE Personal Communications.

[15]  R. F. Rey,et al.  Engineering and Operations in the Bell System , 1983 .

[16]  Stefan Savage,et al.  Inside the Slammer Worm , 2003, IEEE Secur. Priv..

[17]  Travis Earl Russell,et al.  Signaling System #7 , 1995 .

[18]  Scott Shenker,et al.  Analysis and simulation of a fair queueing algorithm , 1989, SIGCOMM '89.

[19]  M. Whitehead GOCAP — one standardised overload control for next generation networks , 2005 .

[20]  Don Towsley,et al.  On optimal call admission control in cellular networks , 1996, Proceedings of IEEE INFOCOM '96. Conference on Computer Communications.

[21]  Patrick Traynor,et al.  Mitigating attacks on open functionality in SMS-capable cellular networks , 2009, TNET.

[22]  Deborah Estrin,et al.  Recommendations on Queue Management and Congestion Avoidance in the Internet , 1998, RFC.

[23]  Aviel D. Rubin,et al.  Defending against an Internet-based attack on the physical world , 2004, ACM Trans. Internet Techn..

[24]  Peter Reiher,et al.  A taxonomy of DDoS attack and DDoS defense mechanisms , 2004, CCRV.

[25]  Mischa Schwartz,et al.  Telecommunication networks: protocols, modeling and analysis , 1986 .

[26]  Thomas F. La Porta,et al.  Exploiting open functionality in SMS-capable cellular networks , 2005, CCS '05.