Dependency relation based vulnerability analysis of 3G networks: Can it identify unforeseen cascading attacks?

Kameswari Kotapati, Peng Liu, Thomas F. La Porta

Research output: Contribution to journalArticle

2 Scopus citations

Abstract

Cascading attacks pose a new threat to the third generation (3G) wireless telecommunications network. These attacks are dangerous and difficult to detect due to their remote far-reaching effects. To automate the accurate detection of these attacks and their remote effects, we developed a telecommunication specification based toolkit called the Advanced Cellular Network Vulnerability Assessment Toolkit-aCAT. aCAT is unique due to the incorporation of 3G network specific dependency model, infection propagation rules, as well as expert knowledge. These features allow aCAT to accurately and exhaustively identify cascading attacks and their remote effects. aCAT illustrates the types of cascading attacks that may be derived from the specifications, and showcases its utility in uncovering these attacks.

Original languageEnglish (US)
Pages (from-to)99-122
Number of pages24
JournalTelecommunication Systems
Volume35
Issue number3-4
DOIs
StatePublished - Aug 1 2007

All Science Journal Classification (ASJC) codes

  • Electrical and Electronic Engineering

Fingerprint Dive into the research topics of 'Dependency relation based vulnerability analysis of 3G networks: Can it identify unforeseen cascading attacks?'. Together they form a unique fingerprint.

  • Cite this