Unveiling the hidden dangers of public IP addresses in 4G/LTE cellular data networks

While it is often convenient for mobile cellular devices to have a public IP address, we show that such devices are vulnerable to stealthy malicious attacks. In particular, we show with experiments on three 4G/LTE cellular data networks in Singapore that it is easy for an attacker to initiate three different types of attacks on such mobile devices: (i) data quota drain, (ii) DoS flooding, and (iii) battery drain. Our experiments show that a potential attacker can completely exhaust the monthly data quota within a few minutes, completely choke the data connection of a mobile subscriber with a data stream of just 3 Mb/s, and increase the battery drain rate by up to 24 times. Finally, we argue that a simple proxy-based firewall with a secret IP address would be an effective and feasible defense against such potential attacks.

[1]  Taejoon Park,et al.  A Survey of Security Threats on 4G Networks , 2007, 2007 IEEE Globecom Workshops.

[2]  Feng Qian,et al.  A close examination of performance and power characteristics of 4G LTE networks , 2012, MobiSys '12.

[3]  R. Gupta,et al.  Protection from paging and signaling attack in 3G CDMA networks , 2011, 2011 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC).

[4]  Songwu Lu,et al.  Can we pay for what we get in 3G data access? , 2012, Mobicom '12.

[5]  Yin Xu,et al.  An End-to-End Measurement Study of Modern Cellular Data Networks , 2014, PAM.

[6]  Vyas Sekar,et al.  Making middleboxes someone else's problem: network processing as a cloud service , 2012, SIGCOMM '12.

[7]  Hao Chen,et al.  Exploiting MMS Vulnerabilities to Stealthily Exhaust Mobile Phone's Battery , 2006, 2006 Securecomm and Workshops.

[8]  Darren Mcqueen The momentum behind LTE adoption [sGPP LTE] , 2009, IEEE Communications Magazine.

[9]  Yongdae Kim,et al.  Towards accurate accounting of cellular data for TCP retransmission , 2013, HotMobile '13.

[10]  Ayman I. Kayssi,et al.  Signaling oriented denial of service on LTE networks , 2012, MobiWac '12.

[11]  Srikanth V. Krishnamurthy,et al.  Denial of Service Attacks in Wireless Networks: The Case of Jammers , 2011, IEEE Communications Surveys & Tutorials.

[12]  Fabio Ricciato,et al.  A review of DoS attack models for 3G cellular networks from a system-design perspective , 2010, Comput. Commun..

[13]  Jukka K. Nurminen,et al.  The Effect of Unwanted Internet Traffic on Cellular Phone Energy Consumption , 2011, 2011 4th IFIP International Conference on New Technologies, Mobility and Security.

[14]  Feng Qian,et al.  An in-depth study of LTE: effect of network protocol and application behavior on performance , 2013, SIGCOMM.

[15]  Thomas F. La Porta,et al.  Mitigating Attacks on Open Functionality in SMS-Capable Cellular Networks , 2006, IEEE/ACM Transactions on Networking.

[16]  Roger Piqueras Jover,et al.  Security attacks against the availability of LTE mobility networks: Overview and research directions , 2013, 2013 16th International Symposium on Wireless Personal Multimedia Communications (WPMC).

[17]  Wan S. Yi,et al.  A Practical Attack on Mobile Data Network Using IP Spoofing , 2013 .