TY - GEN
T1 - A detection mechanism for SMS flooding attacks in cellular networks
AU - Kim, Eun Kyoung
AU - McDaniel, Patrick
AU - La Porta, Thomas
PY - 2013
Y1 - 2013
N2 - In recent years, cellular networks have been reported to be susceptible targets for Distributed Denial of Service (DDoS) attacks due to their limited resources. One potential powerful DDoS attack in cellular networks is a SMS flooding attack. Previous research has demonstrated that SMS-capable cellular networks are vulnerable to a SMS flooding attack in which a sufficient rate of SMS messages is sent to saturate the control channels in target areas. We propose a novel detection algorithm which identifies a SMS flooding attack based on the reply rate to messages sent by a handset. We further propose a mitigation technique to reduce the blocking rate caused by the attack. Our simulation results show that the false positive and false negative rates of our detection algorithm are low even when the attack traffic is blended with flash crowd traffic and/or the attack traffic mimics flash crowd traffic, and that the blocking rate is successfully reduced through the mitigation technique.
AB - In recent years, cellular networks have been reported to be susceptible targets for Distributed Denial of Service (DDoS) attacks due to their limited resources. One potential powerful DDoS attack in cellular networks is a SMS flooding attack. Previous research has demonstrated that SMS-capable cellular networks are vulnerable to a SMS flooding attack in which a sufficient rate of SMS messages is sent to saturate the control channels in target areas. We propose a novel detection algorithm which identifies a SMS flooding attack based on the reply rate to messages sent by a handset. We further propose a mitigation technique to reduce the blocking rate caused by the attack. Our simulation results show that the false positive and false negative rates of our detection algorithm are low even when the attack traffic is blended with flash crowd traffic and/or the attack traffic mimics flash crowd traffic, and that the blocking rate is successfully reduced through the mitigation technique.
UR - http://www.scopus.com/inward/record.url?scp=84874515318&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84874515318&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-36883-7_6
DO - 10.1007/978-3-642-36883-7_6
M3 - Conference contribution
AN - SCOPUS:84874515318
SN - 9783642368820
T3 - Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering
SP - 76
EP - 93
BT - Security and Privacy in Communication Networks - 8th International ICST Conference, SecureComm 2012, Revised Selected Papers
T2 - 8th International ICST Conference on Security and Privacy in Communication Networks, SecureComm 2012
Y2 - 3 September 2012 through 5 September 2012
ER -