An Analysis of DoS Attack Strategies Against the LTE RAN
DOI:
https://doi.org/10.13052/jcsm2245-1439.323Keywords:
LTE, DoS, security, mobile malware, botnetsAbstract
Long Term Evolution (LTE) is the latest 3GPP mobile network standard, offering an all-IP network with higher efficiency and up to ten times the data rates of its predecessors. Due to an increase in cyber crime and the proliferation of mobile computing, attacks stemming from mobile devices are becoming more frequent and complex. Mobile malware can create smart-phone botnets in which a large number of mobile devices conspire to perform malicious activities on the cellular network. It has been shown that such botnets can cause a denial of service (DoS) by exhausting user traffic capacity over the air interface. Through simulation and with studies in a real-world deployment, this paper examines the impact of a botnet of devices seeking to attack the LTE network using different types of strategies. We quantify the adverse effects on legitimate users as the size of the botnet scales up in both sparsely and densely-populated cells for varying traffic Quality of Service (QoS) requirements. Our results show that a single attacker can drastically reduce the QoS of legitimate devices in the same cell. Furthermore, we prove that the impact of the attack can be optimized by tuning the attack strategy, leveraging the LTE uplink MAC scheduler.
Downloads
References
Gartner Says the Internet of Things Installed Base Will Grow to 26 Billion Units By 2020. http://www.gartner.com/newsroom/id/2636073.
gen-send: A Simple UDP Traffic Generater Application. http://www.citi. umich.edu/projects/qbone/generator.html.
Global LTE Subscription Growth. http://www.4gamericas.org/index.cfm ?useaction=page & pageid=2197.
OPNET Modeler. http://www.opnet.com/solutions/network_rd/modeler. html.
Speedtest.net App. http://www.speedtest.net/mobile/.
LTE eNodeB MAC Scheduler Interface. White paper, Roke, 2009. http://www.roke.co.uk/resources/datasheets/108-lte-mac-scheduler-inter face.pdf.
3rd Generation Partnership Project; LTE; Technical Specification Group Services and System Aspects. Policy and charging control architecture; 3gpp ts 23.203. v12.3.0, 2012.
Adam J Aviv, Katherine Gibson, Evan Mossop, Matt Blaze, and Jonathan M Smith. Smudge attacks on smartphone touch screens. In Proceedings of the 4th USENIX conference on Offensive technologies, pages 1–7. USENIX Association, 2010.
R. Bassil, I.H. Elhajj, A. Chehab, and A. Kayssi. A resource reservation attack against lte networks. In Communications and Information Technology (ICCIT), 2013 Third International Conference on, pages 262–268, June 2013.
Enrico Cambiaso, Gianluca Papaleo, Giovanni Chiola, and Maurizio Aiello. Slow dos attacks: definition and categorisation. International Journal of Trust Management in Computing and Communications, 1(3): 300-319, 2013.
David Dagon, Manos Antonakakis, Kevin Day, Xiapu Luo, Christopher P Lee, and Wenke Lee. Recursive dns architectures and vulnerability implications. In NDSS, 2009.
E. Dondyk and C.C. Zou. Denial of convenience attack to smartphones using a fake wi-fi access point. In Consumer Communications and Networking Conference (CCNC), 2013 IEEE, pages 164-170, 2013.
William Enck, Patrick Traynor, Patrick McDaniel, and Thomas La Porta. Exploiting open functionality in sms-capable cellular networks. In Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS ’05, pages 393-404, New York, NY, USA, 2005. ACM.
Adrienne Porter Felt, Matthew Finifter, Erika Chin, Steve Hanna, and David Wagner. A survey of mobile malware in the wild. In Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, SPSM ’11, pages 3-14, New York, NY, USA, 2011. ACM.
Anthony Freed. Misosms malware sends your text messages to attackers in china, 2013. http://www.tripwire.com/state-of-security/top-security-stories/misosms-malware-sends-text-messages-china/.
Nicola Gobbo, Alessio Merlo, and Mauro Migliardi. A denial of service attack to gsm networks via attach procedure. In Security Engineering and Intelligence Informatics, pages 361-376. Springer, 2013.
George Hulme. Geinimi android malware has ‘botnet-like’ capabilities, 2011. http://www.csoonline.com/article/650866/geinimi-android-malware-has-botnet-like-capabilities?source=rss_cso_exclude_net_net.
Woongryul Jeon, Jeeyeon Kim, Youngsook Lee, and Dongho Won. A practical analysis of smartphone security. In Human Interface and the Management of Information. Interacting with Information, pages 311–320. Springer, 2011.
M. Khosroshahy, Dongyu Qiu, and M.K. Mehmet Ali. Botnets in 4g cellular networks: Platforms to launch ddos attacks against the air interface. In Mobile and Wireless Networking (MoWNeT), 2013 International Conference on Selected Topics in, pages 30–35, 2013.
Kameswari Kotapati, Peng Liu, and Thomas F LaPorta. Cata practical graph & sdl based toolkit for vulnerability assessment of 3g networks. In Security and Privacy in Dynamic Environments, pages 158-170. Springer, 2006.
Mohit Lad, Ricardo Oliveira, Beichuan Zhang, and Lixia Zhang. Understanding resiliency of internet topology against prefix hijack attacks. In Dependable Systems and Networks, 2007. DSN’07. 37th Annual IEEE/IFIP International Conference on, pages 368-377. IEEE, 2007.
Lam, Wayne. Wireless Communication Report-4G-LTE Landscape. https://technology.ihs.com/413870/wireless-communications-report-4g-lte-landscape-2012.
LTE; Evolved Universal Terrestrial Radio Access (E-UTRA). Medium access control (mac) protocol specification. 3gpp ts 36.321. v12.0, 2013.
Claudio Marforio, Aurélien Francillon, Srdjan Capkun, Srdjan Capkun, and Srdjan Capkun. Application collusion attack on the permission-based security model and its implications for modern smartphone systems. Department of Computer Science, ETH Zurich, 2011.
Collin Mulliner and Jean-Pierre Seifert. Rise of the iBots: 0wning a telco network. In Proceedings of the 5th IEEE International Conference on Malicious and Unwanted Software (Malware), 2010.
Collin Mulliner and Giovanni Vigna. Vulnerability analysis of mms user agents. In Computer Security Applications Conference, 2006. ACSAC’06. 22nd Annual, pages 77-88. IEEE, 2006.
Alexios Mylonas, Stelios Dritsas, Bill Tsoumas, and Dimitris Gritzalis. Smartphone security evaluation-the malware attack case. SECRYPT, 11: 25-36, 2011.
Phillip Porras, Hassen Sadi, and Vinod Yegneswaran. An analysis of the ikee.b iphone botnet. In AndreasU. Schmidt, Giovanni Russello, Antonio Lioy, NeeliR. Prasad, and Shiguo Lian, editors, Security and Privacy in Mobile Information and Communication Systems, volume 47 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, pages 141-152. Springer Berlin Heidelberg, 2010.
R. Racic, D. Ma, Hao Chen, and Xin Liu. Exploiting and defending opportunistic scheduling in cellular data networks. Mobile Computing, IEEE Transactions on, 9(5): 609-620, 2010.
ComScore reports June 2012 U.S. mobile subscriber market share. http://www.comscore.com/Insights/Press_Releases/2012/8/comScore_ Reports_June_2012_U.S._Mobile_Subscriber_Market_Share.
Fabio Ricciato, Angelo Coluccia, and Alessandro DAlconzo. A review of dos attack models for 3g cellular networks from a system-design perspective. Computer Communications, 33(5): 551–558, 2010.
S. Sesia, M. Baker, and I. Toufik. LTE, The UMTS Long Term Evolution: From Theory to Practice. Wiley, 2009.
Muhammad Zubair Shafiq, Lusheng Ji, Alex X. Liu, Jeffrey Pang, and Jia Wang. A first look at cellular machine-to-machine traffic: Large scale measurement and characterization. In Proceedings of the 12th ACM SIGMETRICS/PERFORMANCE Joint International Conference on Measurement and Modeling of Computer Systems, SIGMETRICS ’12, pages 65-76, New York, NY, USA, 2012. ACM.
Patrick Traynor, Michael Lin, Machigar Ongtang, Vikhyath Rao, Trent Jaeger, Patrick McDaniel, and Thomas La Porta. On cellular botnets: measuring the impact of malicious devices on a cellular network core. In Proceedings of the 16th ACM conference on Computer and communications security, pages 223-234. ACM, 2009.
Patrick Traynor, Patrick McDaniel, Thomas La Porta, et al. On attack causality in internet-connected cellular networks. In Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium, pages 1-16. USENIX Association, 2007.