A Denial of Service Attack to GSM Networks via Attach Procedure

Mobile Network Operators (MNOs) keep a strict control over users accessing the networks by means of the Subscriber Identity Module (SIM). This module grants the user access to the network, by performing the registration and authentication of the user’s device. Without a valid Subscribe IdentityModule (SIM) module and a successful authentication, mobile devices are not granted access and, hence, they are not allowed to inject any traffic in the mobile infrastructure. Nevertheless, in this paper we describe an attack to the security of a mobile network allowing an unauthenticated malicious mobile device to inject traffic in the mobile operator’s infrastructure. We show that even with devices without any SIM module it is possible to inject high levels of signaling traffic in the mobile infrastructure, causing significant service degradation up to a full-fledged Denial of Service (DoS) attack.

[1]  Jemal H. Abawajy Advances in Information Security and Assurance, Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings , 2009, ISA.

[2]  Georgios Kambourakis,et al.  Signaling-Oriented DoS Attacks in UMTS Networks , 2009, ISA.

[3]  H. Holma,et al.  Connection Setup Delay for Packet Switched Services , 2005 .

[4]  Alfredo De Santis,et al.  Do You Trust Your Phone? , 2009, EC-Web.

[5]  A Min Tjoa,et al.  E-Commerce and Web Technologies , 2002, Lecture Notes in Computer Science.

[6]  Francesco Palmieri,et al.  A botnet-based command and control approach relying on swarm intelligence , 2014, J. Netw. Comput. Appl..

[7]  Patrick D. McDaniel,et al.  On Attack Causality in Internet-Connected Cellular Networks , 2007, USENIX Security Symposium.

[8]  Alessandro Armando,et al.  Breaking and fixing the Android Launching Flow , 2013, Comput. Secur..

[9]  Mauro Migliardi,et al.  Memory Support Through Pervasive and Mobile Systems , 2014 .

[10]  Christopher Kruegel Proceedings of the 2007 ACM workshop on Recurring malcode , 2007, CCS 2007.

[11]  Steven Furnell,et al.  Information Security and Privacy Research , 2012, IFIP Advances in Information and Communication Technology.

[12]  K.W. Derr,et al.  Nightmares with Mobile Devices are Just around the Corner! , 2007, 2007 IEEE International Conference on Portable Information Devices.

[13]  Thomas F. La Porta,et al.  On cellular botnets: measuring the impact of malicious devices on a cellular network core , 2009, CCS.

[14]  Lorenzo Chiari,et al.  Smartphone-based applications for investigating falls and mobility , 2011, 2011 5th International Conference on Pervasive Computing Technologies for Healthcare (PervasiveHealth) and Workshops.

[15]  Naim Dahnoun,et al.  Studies in Computational Intelligence , 2013 .

[16]  Wenyuan Xu,et al.  The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.

[17]  Geoffrey M. Voelker,et al.  Can you infect me now?: malware propagation in mobile phone networks , 2007, WORM '07.

[18]  Umberto Ferraro Petrillo,et al.  Engineering a secure mobile messaging framework , 2012, Comput. Secur..

[19]  Muzammil Khan,et al.  Vulnerabilities of UMTS Access Domain Security Architecture , 2008, 2008 Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing.

[20]  Thomas F. La Porta,et al.  Mitigating Attacks on Open Functionality in SMS-Capable Cellular Networks , 2006, IEEE/ACM Transactions on Networking.

[21]  Jean-Pierre Seifert,et al.  Rise of the iBots: Owning a telco network , 2010, 2010 5th International Conference on Malicious and Unwanted Software.

[22]  Steve Hanna,et al.  A survey of mobile malware in the wild , 2011, SPSM '11.

[23]  Umberto Ferraro Petrillo,et al.  An Extensible Framework for Efficient Secure SMS , 2010, 2010 International Conference on Complex, Intelligent and Software Intensive Systems.

[24]  Giuseppe Cattaneo,et al.  SECR3T: Secure End-to-End Communication over 3G Telecommunication Networks , 2011, 2011 Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.

[25]  Francesco Vatalaro,et al.  Performance evaluation of GSM robustness against smart jamming attacks , 2012, 2012 5th International Symposium on Communications, Control and Signal Processing.

[26]  Gunnar Heine,et al.  GSM Networks: Protocols, Terminology and Implementation , 1998 .

[27]  Alessandro Armando,et al.  Would You Mind Forking This Process? A Denial of Service Attack on Android (and Some Countermeasures) , 2012, SEC.

[28]  Nataraj Kuntagod,et al.  Mobile decision support system for outreach health worker , 2011, 2011 IEEE 13th International Conference on e-Health Networking, Applications and Services.

[29]  Umberto Ferraro Petrillo,et al.  SPEECH: Secure Personal End-to-End Communication with Handheld , 2006, ISSE.

[30]  Helen J. Wang,et al.  Smartphone attacks and defenses , 2004 .

[31]  Jane W.-S. Liu,et al.  Wedjat: A Mobile Phone Based Medicine In-take Reminder and Monitor , 2009, 2009 Ninth IEEE International Conference on Bioinformatics and BioEngineering.

[32]  Antti Toskala,et al.  Wcdma for Umts , 2002 .

[33]  Ilias Maglogiannis,et al.  Mobile healthcare information management utilizing Cloud Computing and Android OS , 2010, 2010 Annual International Conference of the IEEE Engineering in Medicine and Biology.