An Analysis of DoS Attack Strategies Against the LTE RAN

Long Term Evolution (LTE) is the latest 3GPP mobile network standard, offering an all-IP network with higher efficiency and up to ten times the data ratesofitspredecessors.Duetoanincreaseincybercrimeandtheproliferation of mobile computing, attacks stemming from mobile devices are becoming more frequent and complex. Mobile malware can create smart-phone botnets in which a large number of mobile devices conspire to perform malicious activities on the cellular network. It has been shown that such botnets can cause a denial of service (DoS) by exhausting user traffic capacity over the air interface. Through simulation and with studies in a real-world deployment, thispaperexaminestheimpactofabotnetofdevicesseekingtoattacktheLTE network using different types of strategies.We quantify the adverse effects on legitimateusersasthesizeofthebotnetscalesupinbothsparselyanddenselypopulated cells for varying traffic Quality of Service (QoS) requirements. Our results show that a single attacker can drastically reduce the QoS of legitimate devices in the same cell. Furthermore, we prove that the impact of the attack can be optimized by tuning the attack strategy, leveraging the LTE uplink MAC scheduler.

[1]  Adam J. Aviv,et al.  Smudge Attacks on Smartphone Touch Screens , 2010, WOOT.

[2]  Giovanni Vigna,et al.  Vulnerability Analysis of MMS User Agents , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).

[3]  Cliff Changchun Zou,et al.  Denial of convenience attack to smartphones using a fake Wi-Fi access point , 2013, 2013 IEEE 10th Consumer Communications and Networking Conference (CCNC).

[4]  Giovanni Chiola,et al.  Slow DoS attacks: definition and categorisation , 2013, Int. J. Trust. Manag. Comput. Commun..

[5]  Xiapu Luo,et al.  Recursive DNS Architectures and Vulnerability Implications , 2009, NDSS.

[6]  Jean-Pierre Seifert,et al.  Rise of the iBots: Owning a telco network , 2010, 2010 5th International Conference on Malicious and Unwanted Software.

[7]  Thomas F. La Porta,et al.  Exploiting open functionality in SMS-capable cellular networks , 2008, J. Comput. Secur..

[8]  Thomas F. La Porta,et al.  On cellular botnets: measuring the impact of malicious devices on a cellular network core , 2009, CCS.

[9]  Lusheng Ji,et al.  A first look at cellular machine-to-machine traffic: large scale measurement and characterization , 2012, SIGMETRICS '12.

[10]  Stefania Sesia,et al.  LTE - The UMTS Long Term Evolution, Second Edition , 2011 .

[11]  Steve Hanna,et al.  A survey of mobile malware in the wild , 2011, SPSM '11.

[12]  Dongho Won,et al.  A Practical Analysis of Smartphone Security , 2011, HCI.

[13]  Fabio Ricciato,et al.  A review of DoS attack models for 3G cellular networks from a system-design perspective , 2010, Comput. Commun..

[14]  Nicola Gobbo,et al.  A Denial of Service Attack to GSM Networks via Attach Procedure , 2013, CD-ARES Workshops.

[15]  J. Seifert,et al.  Rise of the iBots : 0 wning a telco network , 2010 .

[16]  Patrick D. McDaniel,et al.  On Attack Causality in Internet-Connected Cellular Networks , 2007, USENIX Security Symposium.

[17]  Srdjan Capkun,et al.  Application Collusion Attack on the Permission-Based Security Model and its Implications for Modern Smartphone Systems , 2010 .

[18]  Imad H. Elhajj,et al.  A resource reservation attack against LTE networks , 2013, 2013 Third International Conference on Communications and Information Technology (ICCIT).

[19]  Hao Chen,et al.  Exploiting and Defending Opportunistic Scheduling in Cellular Data Networks , 2010, IEEE Transactions on Mobile Computing.

[20]  Vinod Yegneswaran,et al.  An Analysis of the iKee.B iPhone Botnet , 2010, MobiSec.

[21]  Lixia Zhang,et al.  Understanding Resiliency of Internet Topology against Prefix Hijack Attacks , 2007, 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'07).

[22]  Masood Khosroshahy,et al.  Botnets in 4G cellular networks: Platforms to launch DDoS attacks against the air interface , 2013, 2013 International Conference on Selected Topics in Mobile and Wireless Networking (MoWNeT).

[23]  Dimitris Gritzalis,et al.  Smartphone security evaluation The malware attack case , 2011, Proceedings of the International Conference on Security and Cryptography.

[24]  Peng Liu,et al.  CAT - A Practical Graph & SDL Based Toolkit for Vulnerability Assessment of 3G Networks , 2006, SEC.