Ziayi et al., 2021 - Google Patents
YAICD: Yet another IMSI catcher detector in GSMZiayi et al., 2021
View PDF- Document ID
- 15575534369488719784
- Author
- Ziayi P
- Farmanbar S
- Rezvani M
- Publication year
- Publication venue
- Security and Communication Networks
External Links
Snippet
In GSM, the network is not authenticated which allows for man‐in‐the‐middle (MITM) attacks. Attackers can track traffic and trace users of cellular networks by creating a rogue base transceiver station (BTS). Such a defect in addition to the need for backward …
- 238000001514 detection method 0 abstract description 40
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/12—Fraud detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W24/00—Supervisory, monitoring or testing arrangements
- H04W24/08—Testing, supervising or monitoring using real traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Mjølsnes et al. | Easy 4G/LTE IMSI catchers for non-programmers | |
US11323953B2 (en) | Rogue base station router detection with machine learning algorithms | |
Li et al. | FBS-Radar: Uncovering Fake Base Stations at Scale in the Wild. | |
Dabrowski et al. | The messenger shoots back: Network operator based IMSI catcher detection | |
Dabrowski et al. | IMSI-catch me if you can: IMSI-catcher-catchers | |
CN103891332B (en) | Detect suspicious WAP (wireless access point) | |
Park et al. | {White-Stingray}: Evaluating {IMSI} Catchers Detection Applications | |
Matte | Wi-Fi tracking: Fingerprinting attacks and counter-measures | |
Nakarmi et al. | Murat: Multi-rat false base station detector | |
CN110149599A (en) | A kind of short message means of defence and terminal device | |
CN106878241A (en) | Malice hot spot detecting method and system | |
Angelogianni et al. | On identifying threats and quantifying cybersecurity risks of mnos deploying heterogeneous rats | |
Borgaonkar et al. | White-stingray: evaluating imsi catchers detection applications | |
Ziayi et al. | YAICD: Yet another IMSI catcher detector in GSM | |
Hou et al. | Discovering emergency call pitfalls for cellular networks with formal methods | |
Yocam et al. | 5G mobile networks: reviewing security control correctness for mischievous activity | |
Bitsikas et al. | Freaky Leaky {SMS}: Extracting User Locations by Analyzing {SMS} Timings | |
Lovinger et al. | Detection of wireless fake access points | |
Oh et al. | Preventing SIM Box Fraud Using Device Model Fingerprinting. | |
CN105992214A (en) | Method and apparatus for identifying pseudo base station | |
Huang et al. | Developing xApps for rogue base station detection in SDR-enabled O-RAN | |
Ziayi et al. | Research Article YAICD: Yet Another IMSI Catcher Detector in GSM | |
Park | Why we cannot win: on fake base stations and their detection methods | |
Maatallaoui et al. | The impact of radio frequency (rf) attacks on security and privacy: A comprehensive review | |
Hon | Mobile wireless/cellular communications networks |