On cellular botnets: Measuring the impact of malicious devices on a cellular network core

Patrick Traynor, Michael Lin, MacHigar Ongtang, Vikhyath Rao, Trent Jaeger, Patrick McDaniel, Thomas La Porta

Research output: Chapter in Book/Report/Conference proceedingConference contribution

151 Citations (Scopus)

Abstract

The vast expansion of interconnectivity with the Internet and the rapid evolution of highly-capable but largely insecure mobile devices threatens cellular networks. In this paper, we characterize the impact of the large scale compromise and coordination of mobile phones in attacks against the core of these networks. Through a combination of measurement, simulation and analysis, we demonstrate the ability of a botnet composed of as few as 11,750 compromised mobile phones to degrade service to area-code sized regions by 93%. As such attacks are accomplished through the execution of network service requests and not a constant stream of phone calls, users are unlikely to be aware of their occurrence. We then investigate a number of significant network bottlenecks, their impact on the density of compromised nodes per base station and how they can be avoided. We conclude by discussing a number of countermeasures that may help to partially mitigate the threats posed by such attacks.

Original languageEnglish (US)
Title of host publicationCCS'09 - Proceedings of the 16th ACM Conference on Computer and Communications Security
Pages223-234
Number of pages12
DOIs
StatePublished - Dec 1 2009
Event16th ACM Conference on Computer and Communications Security, CCS'09 - Chicago, IL, United States
Duration: Nov 9 2009Nov 13 2009

Publication series

NameProceedings of the ACM Conference on Computer and Communications Security
ISSN (Print)1543-7221

Other

Other16th ACM Conference on Computer and Communications Security, CCS'09
CountryUnited States
CityChicago, IL
Period11/9/0911/13/09

Fingerprint

Mobile phones
Mobile devices
Base stations
Internet
Botnet

All Science Journal Classification (ASJC) codes

  • Software
  • Computer Networks and Communications

Cite this

Traynor, P., Lin, M., Ongtang, M., Rao, V., Jaeger, T., McDaniel, P., & La Porta, T. (2009). On cellular botnets: Measuring the impact of malicious devices on a cellular network core. In CCS'09 - Proceedings of the 16th ACM Conference on Computer and Communications Security (pp. 223-234). (Proceedings of the ACM Conference on Computer and Communications Security). https://doi.org/10.1145/1653662.1653690
Traynor, Patrick ; Lin, Michael ; Ongtang, MacHigar ; Rao, Vikhyath ; Jaeger, Trent ; McDaniel, Patrick ; La Porta, Thomas. / On cellular botnets : Measuring the impact of malicious devices on a cellular network core. CCS'09 - Proceedings of the 16th ACM Conference on Computer and Communications Security. 2009. pp. 223-234 (Proceedings of the ACM Conference on Computer and Communications Security).
@inproceedings{2807b23362444dfa91a8f98bf1952053,
title = "On cellular botnets: Measuring the impact of malicious devices on a cellular network core",
abstract = "The vast expansion of interconnectivity with the Internet and the rapid evolution of highly-capable but largely insecure mobile devices threatens cellular networks. In this paper, we characterize the impact of the large scale compromise and coordination of mobile phones in attacks against the core of these networks. Through a combination of measurement, simulation and analysis, we demonstrate the ability of a botnet composed of as few as 11,750 compromised mobile phones to degrade service to area-code sized regions by 93{\%}. As such attacks are accomplished through the execution of network service requests and not a constant stream of phone calls, users are unlikely to be aware of their occurrence. We then investigate a number of significant network bottlenecks, their impact on the density of compromised nodes per base station and how they can be avoided. We conclude by discussing a number of countermeasures that may help to partially mitigate the threats posed by such attacks.",
author = "Patrick Traynor and Michael Lin and MacHigar Ongtang and Vikhyath Rao and Trent Jaeger and Patrick McDaniel and {La Porta}, Thomas",
year = "2009",
month = "12",
day = "1",
doi = "10.1145/1653662.1653690",
language = "English (US)",
isbn = "9781605583525",
series = "Proceedings of the ACM Conference on Computer and Communications Security",
pages = "223--234",
booktitle = "CCS'09 - Proceedings of the 16th ACM Conference on Computer and Communications Security",

}

Traynor, P, Lin, M, Ongtang, M, Rao, V, Jaeger, T, McDaniel, P & La Porta, T 2009, On cellular botnets: Measuring the impact of malicious devices on a cellular network core. in CCS'09 - Proceedings of the 16th ACM Conference on Computer and Communications Security. Proceedings of the ACM Conference on Computer and Communications Security, pp. 223-234, 16th ACM Conference on Computer and Communications Security, CCS'09, Chicago, IL, United States, 11/9/09. https://doi.org/10.1145/1653662.1653690

On cellular botnets : Measuring the impact of malicious devices on a cellular network core. / Traynor, Patrick; Lin, Michael; Ongtang, MacHigar; Rao, Vikhyath; Jaeger, Trent; McDaniel, Patrick; La Porta, Thomas.

CCS'09 - Proceedings of the 16th ACM Conference on Computer and Communications Security. 2009. p. 223-234 (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - On cellular botnets

T2 - Measuring the impact of malicious devices on a cellular network core

AU - Traynor, Patrick

AU - Lin, Michael

AU - Ongtang, MacHigar

AU - Rao, Vikhyath

AU - Jaeger, Trent

AU - McDaniel, Patrick

AU - La Porta, Thomas

PY - 2009/12/1

Y1 - 2009/12/1

N2 - The vast expansion of interconnectivity with the Internet and the rapid evolution of highly-capable but largely insecure mobile devices threatens cellular networks. In this paper, we characterize the impact of the large scale compromise and coordination of mobile phones in attacks against the core of these networks. Through a combination of measurement, simulation and analysis, we demonstrate the ability of a botnet composed of as few as 11,750 compromised mobile phones to degrade service to area-code sized regions by 93%. As such attacks are accomplished through the execution of network service requests and not a constant stream of phone calls, users are unlikely to be aware of their occurrence. We then investigate a number of significant network bottlenecks, their impact on the density of compromised nodes per base station and how they can be avoided. We conclude by discussing a number of countermeasures that may help to partially mitigate the threats posed by such attacks.

AB - The vast expansion of interconnectivity with the Internet and the rapid evolution of highly-capable but largely insecure mobile devices threatens cellular networks. In this paper, we characterize the impact of the large scale compromise and coordination of mobile phones in attacks against the core of these networks. Through a combination of measurement, simulation and analysis, we demonstrate the ability of a botnet composed of as few as 11,750 compromised mobile phones to degrade service to area-code sized regions by 93%. As such attacks are accomplished through the execution of network service requests and not a constant stream of phone calls, users are unlikely to be aware of their occurrence. We then investigate a number of significant network bottlenecks, their impact on the density of compromised nodes per base station and how they can be avoided. We conclude by discussing a number of countermeasures that may help to partially mitigate the threats posed by such attacks.

UR - http://www.scopus.com/inward/record.url?scp=74049108559&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=74049108559&partnerID=8YFLogxK

U2 - 10.1145/1653662.1653690

DO - 10.1145/1653662.1653690

M3 - Conference contribution

AN - SCOPUS:74049108559

SN - 9781605583525

T3 - Proceedings of the ACM Conference on Computer and Communications Security

SP - 223

EP - 234

BT - CCS'09 - Proceedings of the 16th ACM Conference on Computer and Communications Security

ER -

Traynor P, Lin M, Ongtang M, Rao V, Jaeger T, McDaniel P et al. On cellular botnets: Measuring the impact of malicious devices on a cellular network core. In CCS'09 - Proceedings of the 16th ACM Conference on Computer and Communications Security. 2009. p. 223-234. (Proceedings of the ACM Conference on Computer and Communications Security). https://doi.org/10.1145/1653662.1653690