Li et al., 2017 - Google Patents
FBS-Radar: Uncovering Fake Base Stations at Scale in the Wild.Li et al., 2017
View PDF- Document ID
- 10780791087788774396
- Author
- Li Z
- Wang W
- Wilson C
- Chen J
- Qian C
- Jung T
- Zhang L
- Liu K
- Li X
- Liu Y
- Publication year
- Publication venue
- NDSS
External Links
Snippet
Base stations constitute the basic infrastructure of today's cellular networks. Unfortunately, vulnerabilities in the GSM (2G) network protocol enable the creation of fake base stations (FBSes) that are not authorized by network operators. Criminal gangs are using FBSes to …
- 238000001514 detection method 0 abstract description 29
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/30—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W4/00—Mobile application services or facilities specially adapted for wireless communication networks
- H04W4/02—Mobile application Services making use of the location of users or terminals, e.g. OMA SUPL, OMA MLP or 3GPP LCS
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W64/00—Locating users or terminals or network equipment for network management purposes, e.g. mobility management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Li et al. | FBS-Radar: Uncovering Fake Base Stations at Scale in the Wild. | |
| Zhang et al. | Lies in the air: Characterizing fake-base-station spam ecosystem in china | |
| KR101575282B1 (en) | Agent device and method for sharing security information based on anonymous identifier between security management domains | |
| Santana et al. | A privacy-aware crowd management system for smart cities and smart buildings | |
| Cunche et al. | Linking wireless devices using information contained in Wi-Fi probe requests | |
| Tang et al. | Exploiting Wireless Received Signal Strength Indicators to Detect Evil‐Twin Attacks in Smart Homes | |
| Ney et al. | SeaGlass: enabling city-wide IMSI-catcher detection | |
| US20080261509A1 (en) | Distributed Wireless Communications for Tactical Network Dominance | |
| Matte | Wi-Fi tracking: Fingerprinting attacks and counter-measures | |
| Boukoros et al. | On (the lack of) location privacy in crowdsourcing applications | |
| Gelenbe et al. | NEMESYS: Enhanced network security for seamless service provisioning in the smart mobile ecosystem | |
| Etta et al. | [Retracted] Assessment and Test‐case Study of Wi‐Fi Security through the Wardriving Technique | |
| Huang et al. | Developing xapps for rogue base station detection in sdr-enabled o-ran | |
| Nguyen et al. | Unlocin: Unauthorized location inference on smartphones without being caught | |
| Do et al. | Strengthening mobile network security using machine learning | |
| Raponi et al. | Road traffic poisoning of navigation apps: Threats and countermeasures | |
| Madi et al. | AutoGuard: A dual intelligence proactive anomaly detection at application-layer in 5G networks | |
| CN107155186A (en) | A kind of pseudo-base station localization method and device | |
| Salih et al. | Spyware injection in android using fake application | |
| Sivan et al. | Analysis of location data leakage in the Internet traffic of Android-based mobile devices | |
| Ziayi et al. | Yaicd: Yet another imsi catcher detector in gsm | |
| DA Arisandi et al. | The rogue access point identification: a model and classification review | |
| Sharifi | Attack-aware defense strategy: A robust cooperative spectrum sensing in cognitive radio sensor networks | |
| Tian et al. | Wasserstein Metric‐Based Location Spoofing Attack Detection in WiFi Positioning Systems | |
| Wen et al. | Real-time rogue base stations detection system in cellular networks |