[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Ziayi et al., 2021 - Google Patents

YAICD: Yet another IMSI catcher detector in GSM

Ziayi et al., 2021

View PDF @Full View
Document ID
15575534369488719784
Author
Ziayi P
Farmanbar S
Rezvani M
Publication year
Publication venue
Security and Communication Networks

External Links

Snippet

In GSM, the network is not authenticated which allows for man‐in‐the‐middle (MITM) attacks. Attackers can track traffic and trace users of cellular networks by creating a rogue base transceiver station (BTS). Such a defect in addition to the need for backward …
Continue reading at onlinelibrary.wiley.com (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/12Fraud detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/08Testing, supervising or monitoring using real traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis

Similar Documents

Publication Publication Date Title
Mjølsnes et al. Easy 4G/LTE IMSI catchers for non-programmers
US11323953B2 (en) Rogue base station router detection with machine learning algorithms
Li et al. FBS-Radar: Uncovering Fake Base Stations at Scale in the Wild.
Dabrowski et al. The messenger shoots back: Network operator based IMSI catcher detection
Dabrowski et al. IMSI-catch me if you can: IMSI-catcher-catchers
CN103891332B (en) Detect suspicious WAP (wireless access point)
Park et al. {White-Stingray}: Evaluating {IMSI} Catchers Detection Applications
Matte Wi-Fi tracking: Fingerprinting attacks and counter-measures
Nakarmi et al. Murat: Multi-rat false base station detector
CN110149599A (en) A kind of short message means of defence and terminal device
CN106878241A (en) Malice hot spot detecting method and system
Angelogianni et al. On identifying threats and quantifying cybersecurity risks of mnos deploying heterogeneous rats
Borgaonkar et al. White-stingray: evaluating imsi catchers detection applications
Ziayi et al. YAICD: Yet another IMSI catcher detector in GSM
Hou et al. Discovering emergency call pitfalls for cellular networks with formal methods
Yocam et al. 5G mobile networks: reviewing security control correctness for mischievous activity
Bitsikas et al. Freaky Leaky {SMS}: Extracting User Locations by Analyzing {SMS} Timings
Lovinger et al. Detection of wireless fake access points
Oh et al. Preventing SIM Box Fraud Using Device Model Fingerprinting.
CN105992214A (en) Method and apparatus for identifying pseudo base station
Huang et al. Developing xApps for rogue base station detection in SDR-enabled O-RAN
Ziayi et al. Research Article YAICD: Yet Another IMSI Catcher Detector in GSM
Park Why we cannot win: on fake base stations and their detection methods
Maatallaoui et al. The impact of radio frequency (rf) attacks on security and privacy: A comprehensive review
Hon Mobile wireless/cellular communications networks