Network/SMS Characteristics

Slides:



Advertisements
Similar presentations
Wenke Lee and Nick Feamster Georgia Tech Botnet and Spam Detection in High-Speed Networks.
Advertisements

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Chapter 12 Message Ordering. Causal Ordering A single message should not be overtaken by a sequence of messages Stronger than FIFO Example of FIFO but.
Min Song 1, Yanxiao Zhao 1, Jun Wang 1, E. K. Park 2 1 Old Dominion University, USA 2 University of Missouri at Kansas City, USA IEEE ICC 2009 A High Throughput.
Florida Institute of technologies ECE 5221 Personal Communication Systems Prepared by: Dr. Ivica Kostanic Lecture 19: Traffic planning (3) Spring 2011.
Playback-buffer Equalization For Streaming Media Using Stateless Transport Prioritization By Wai-tian Tan, Weidong Cui and John G. Apostolopoulos Presented.
On Cellular Botnets: Measuring the Impact of Malicious Devices on a Cellular Network Core Patrick Michael Lin, Machigar Ongtang, Vikhyath.
In/Out Traffic Proportion Based Analyses for Network Anomaly Detection By Zhang FengXiang
SMS WATCHDOG: PROFILING SOCIAL BEHAVIORS OF SMS USERS FOR ANOMALY DETECTION Authors: Guanhua Yan, Stephan Eidenbenz, Emannuele Galli Presented by: Ishtiaq.
The War Between Mice and Elephants Presented By Eric Wang Liang Guo and Ibrahim Matta Boston University ICNP
 Well-publicized worms  Worm propagation curve  Scanning strategies (uniform, permutation, hitlist, subnet) 1.
Data-Centric Energy Efficient Scheduling for Densely Deployed Sensor Networks IEEE Communications Society 2004 Chi Ma, Ming Ma and Yuanyuan Yang.
Network Protocols Designed for Optimizability Jennifer Rexford Princeton University
Introduction. Overview of Pushback. Architecture of router. Pushback mechanism. Conclusion. Pushback: Remedy for DDoS attack.
1 Random Early Detection Gateways for Congestion Avoidance Sally Floyd and Van Jacobson, IEEE Transactions on Networking, Vol.1, No. 4, (Aug 1993), pp
Defending Against Low-rate TCP Attack: Dynamic Detection and Protection Haibin Sun John C.S.Lui CSE Dept. CUHK David K.Y.Yau CS Dept. Purdue U.
Endpoint Admission Control WebTP Presentation 9/26/00 Presented by Ye Xia Reference: L. Breslau, E. W. Knightly, S. Shenkar, I. Stoica, H. Zhang, “Endpoint.
Flash Crowds And Denial of Service Attacks: Characterization and Implications for CDNs and Web Sites Aaron Beach Cs395 network security.
Random Early Detection Gateways for Congestion Avoidance
 The missing parts in the picture are the interactions between the PCS network and the PSTN.  This section briefly describes how mobile roaming is managed.
7/3/2015© 2007 Raymond P. Jefferis III1 Queuing Systems.
Advanced Computer Networks : RED 1 Random Early Detection Gateways for Congestion Avoidance Sally Floyd and Van Jacobson, IEEE Transactions on Networking,
Exploiting Open Functionality in SMS-Capable Cellular Networks Authors: William Enck, Patrick Traynor, Patrick McDaniel, and Thomas La Porta Publication:
Link-Level Flow and Error Control
Self-Similarity of Network Traffic Presented by Wei Lu Supervised by Niclas Meier 05/
Intrusion Detection for Grid and Cloud Computing Author Kleber Vieira, Alexandre Schulter, Carlos Becker Westphall, and Carla Merkle Westphall Federal.
Particle Filtering in Network Tomography
TCP Enhancement for Random Loss Jiang Wu Computer Science Lakehead University.
Fast Portscan Detection Using Sequential Hypothesis Testing Authors: Jaeyeon Jung, Vern Paxson, Arthur W. Berger, and Hari Balakrishnan Publication: IEEE.
Asst. Prof. Dr. Mongkut Piantanakulchai
Managing Handoff. For operations and management to detect and isolating Handoff being particularly challenging, therefore it is important to understand.
Mobile Communication The SMS implies of several additional elements in the network architecture There is also another Element called.
ACN: RED paper1 Random Early Detection Gateways for Congestion Avoidance Sally Floyd and Van Jacobson, IEEE Transactions on Networking, Vol.1, No. 4, (Aug.
CS 447 Network & Data Communication QoS (Quality of Service) & DiffServ Introduction Department of Computer Science Southern Illinois University Edwardsville.
Chapter 12 Transmission Control Protocol (TCP)
Ch 12. Multiple Access. Multiple Access for Shared Link Dedicated link – Point-to-point connection is sufficient Shared link – Link is not dedicated –
3 Continuous RV.
User Mobility Modeling and Characterization of Mobility Patterns Mahmood M. Zonoozi and Prem Dassanayake IEEE Journal on Selected Areas in Communications.
Patrick Traynor, Michael Lin, Machigar Ongtang, Vikhyath Rao, Trent Jaeger, Patrick McDaniel, and Thomas La Porta 2/29/2012.
24.1 Chapter 24 Congestion Control and Quality of Service ICE302 Term # 2 Lecture # 3 Md. Asif Hossain.
Event Generation Channel Access Process Channel Release Process Traffic Transmission Process Simulation Control Simulation Flowchart - total.
1 Kyung Hee University Chapter 11 User Datagram Protocol.
1 Kyung Hee University Chapter 8 Switching. 2 Kyung Hee University Switching  Switching  Switches are devices capable of creating temporary connections.
William Stallings Data and Computer Communications
Modeling and Evaluation of Fibre Channel Storage Area Networks
Topics discussed in this section:
Chapter 8 Switching Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
An IP-based multimedia traffic generator
21-2 ICMP(Internet control message protocol)
Error and Control Messages in the Internet Protocol
Defending Against DDoS
Last Class: RPCs and RMI
A Scalable Routing Architecture for Prefix Tries
Mitigating Attacks on Open Functionality in SMS-Capable Cellular Networks Ashvin Bodhale CS 388.
Chapter 3 Switching.
Defending Against DDoS
Chapter 14 User Datagram Protocol (UDP)
Data fusion classification method based on Multi agents system
Pong: Diagnosing Spatio-Temporal Internet Congestion Properties
Chapter 7 Error Detection and Correction
The M/G/1 Queue and others.
Data Communication Networks
SPEAKER: Yu-Shan Chou ADVISOR: DR. Kai-Wei Ke
Queuing Analysis.
Error Detection and Correction
Queuing Theory III.
Waiting Line Models Waiting takes place in virtually every productive process or service. Since the time spent by people and things waiting in line is.
Autonomous Network Alerting Systems and Programmable Networks
Course Description Queuing Analysis This queuing course
Anonymity – Generalizing Mixes
Presentation transcript:

Network/SMS Characteristics A Novel Detection Mechanism for SMS Attacks on Cellular Network Eun Kyoung Kim, Patrick McDaniel, Thomas La Porta In cellular network, SMS message traffic shares the control channels (CCHs) with call traffic. Abnormal increase of SMS traffic results in high occupancy of the control channels causing high call blocking rate. Therefore, detecting any malicious attempts to deplete the channel resource by extremely high SMS traffic is very important. However, it is not trivial to distinguish malicious SMS attack from benign bursty traffic created by legitimate requests since they induce very similar phenomena in cellular network even though they need to be treated differently. We propose a novel detection mechanism that distinguishes malicious SMS attack from benign bursty traffic to quickly discard malicious requests while continuing to serve legitimate ones. Network/SMS Characteristics Parameter Average value Distribution Normal traffic arrival rate 0.7 msg/sec Poisson Holding time at CCH 4 sec. Exponential Response time from the recipient 60 sec. Pareto Thread length 5 msg. Thread duration 8 min. MSC SMSC HLR VLR BS A B Destination-MT SMS Originator-MO SMS Table 1. Message- and thread-level SMS characteristics It is observed that a normal SMS thread consists of a series of five messages on average. That means a normal SMS is supposed to have a reply with a high probability, while an attack message typically cannot expect a high reply rate. Figure 1. Typical network architecture for SMS Detection Algorithm Simulation Results /* Forming message threads for all incoming messages */ for each message M observed in W do if M is an outgoing message from L to R then if T = (R, L) exists then Increase Rr by 1 endif if M is an incoming message from R to L then if M is delivered to L then Increase Rs by 1 end if else Create T = (R, L) end for /* Setting response rate threshold */ r = θ *(1-Bavg) /* Updating attack-likelihood score for each remote host according to its response rate and marking it as malicious or suspicious based on the score */ for each remote host R in T = (R, L) do if R send or receive a message then Rrr = Rr/Rs if (Rrr < r) then Rc++ Rc = max{Rc--, 0} if Rc ≥ m then Mark R as malicious else if Rc ≥ s then Mark R as suspicious Mark R as normal M : SMS messages collected during one time window W L/R : local/remote handsets T : message threads represented by a pair of (sender, receiver) Rs/r : the number of sent/replied messages from/to R Rrr : the reply rate for R Rc : the score representing the likelihood that R is an attacker θ : the expected reply rates in normal network condition Bavg : the average blocking rate during W r : the response rate threshold to determine the likelihood score m/s : the attack-likelihood score threshold for identifying the malicious/suspicious handsets We simulated 24 hours of SMS communication. Attack traffic is emitted for one hour from 23 to 24 hours. The aggregated volume of the attack traffic is 8 times more than that of regular traffic. For the mixed attack, flash crowd traffic four-fold the normal traffic is generated in addition to the attack traffic. (1) (2) Figure 2. (1) FNR and (2) FPR of mixed traffic with high intensity without a mitigation technique (1) (2) Figure 3. (1) FNR and (2) FPR of two kinds of attack traffic with low intensity without a mitigation technique with with m = 3 With a mitigation technique : We devise a 3-queue mitigation mechanism which places normal, suspicious, and malicious traffic classified by the detection algorithm into the corresponding queues and schedules each messages using Weighted Fair Queueing. Figure 4. Blocking rate for mixed attack traffic with low intensity with a mitigation technique with s = 1 Sponsored By National Science Foundation