[go: up one dir, main page]

Li et al., 2017 - Google Patents

FBS-Radar: Uncovering Fake Base Stations at Scale in the Wild.

Li et al., 2017

View PDF
Document ID
10780791087788774396
Author
Li Z
Wang W
Wilson C
Chen J
Qian C
Jung T
Zhang L
Liu K
Li X
Liu Y
Publication year
Publication venue
NDSS

External Links

Snippet

Base stations constitute the basic infrastructure of today's cellular networks. Unfortunately, vulnerabilities in the GSM (2G) network protocol enable the creation of fake base stations (FBSes) that are not authorized by network operators. Criminal gangs are using FBSes to …
Continue reading at thucloud.com (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W4/00Mobile application services or facilities specially adapted for wireless communication networks
    • H04W4/02Mobile application Services making use of the location of users or terminals, e.g. OMA SUPL, OMA MLP or 3GPP LCS
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W64/00Locating users or terminals or network equipment for network management purposes, e.g. mobility management
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices

Similar Documents

Publication Publication Date Title
Li et al. FBS-Radar: Uncovering Fake Base Stations at Scale in the Wild.
Zhang et al. Lies in the air: Characterizing fake-base-station spam ecosystem in china
KR101575282B1 (en) Agent device and method for sharing security information based on anonymous identifier between security management domains
Santana et al. A privacy-aware crowd management system for smart cities and smart buildings
Cunche et al. Linking wireless devices using information contained in Wi-Fi probe requests
Tang et al. Exploiting Wireless Received Signal Strength Indicators to Detect Evil‐Twin Attacks in Smart Homes
Ney et al. SeaGlass: enabling city-wide IMSI-catcher detection
US20080261509A1 (en) Distributed Wireless Communications for Tactical Network Dominance
Matte Wi-Fi tracking: Fingerprinting attacks and counter-measures
Boukoros et al. On (the lack of) location privacy in crowdsourcing applications
Gelenbe et al. NEMESYS: Enhanced network security for seamless service provisioning in the smart mobile ecosystem
Etta et al. [Retracted] Assessment and Test‐case Study of Wi‐Fi Security through the Wardriving Technique
Huang et al. Developing xapps for rogue base station detection in sdr-enabled o-ran
Nguyen et al. Unlocin: Unauthorized location inference on smartphones without being caught
Do et al. Strengthening mobile network security using machine learning
Raponi et al. Road traffic poisoning of navigation apps: Threats and countermeasures
Madi et al. AutoGuard: A dual intelligence proactive anomaly detection at application-layer in 5G networks
CN107155186A (en) A kind of pseudo-base station localization method and device
Salih et al. Spyware injection in android using fake application
Sivan et al. Analysis of location data leakage in the Internet traffic of Android-based mobile devices
Ziayi et al. Yaicd: Yet another imsi catcher detector in gsm
DA Arisandi et al. The rogue access point identification: a model and classification review
Sharifi Attack-aware defense strategy: A robust cooperative spectrum sensing in cognitive radio sensor networks
Tian et al. Wasserstein Metric‐Based Location Spoofing Attack Detection in WiFi Positioning Systems
Wen et al. Real-time rogue base stations detection system in cellular networks