CAT – A Practical SDL Based Attack Attribution Toolkit for 3G Networks

نویسندگان

  • Kameswari Kotapati
  • Peng Liu
  • Thomas F. LaPorta
چکیده

This paper presents the Cross Infrastructure Attack Attribution Toolkit (CAT), which is a utility to analyze the vulnerability of 3G networks using telecommunication specifications. CAT analyzes vulnerabilities by generating attack graphs, which show the global view of the network in the event of an attack. The uniqueness of CAT is as follows: (1) usage of telecommunication specification written in Specification and Description Language (SDL) to derive attack graphs, (2) implementation of simple algorithms that output attack graphs irrespective of intruder profile and network configuration, and (3) generation of attack graphs that are exhaustive, succinct and loop free with low redundancy.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

CAT - A Practical Graph & SDL Based Toolkit for Vulnerability Assessment of 3G Networks

This paper presents the Cellular Network Vulnerability Assessment Toolkit CAT, designed for end-to-end vulnerability assessment of 3G networks. It is the first tool of its kind to model and represent 3G network vulnerabilities and attacks as attack graphs. CAT uses freely available 3G telecommunication specifications written in SDL, the standard Specification and Description Language to produce...

متن کامل

3GPP Specification Aided Discovery of Cascading Attacks

This paper presents aCAT Advanced Cellular Network Vulnerability Assessment Toolkit, a graph based end-to-end vulnerability assessment tool for 3G networks. The novelties of this tool include (1) usage of technical specifications written in the Specification and Description Language (SDL); (2) the definition of a network dependency model for accurate chain derivation; and (3) exhaustive attack ...

متن کامل

An efficient non-repudiation billing protocol in heterogeneous 3G-WLAN networks

The wireless communication with delivering variety of services to users is growing rapidly in recent years. The third generation of cellular networks (3G), and local wireless networks (WLAN) are the two widely used technologies in wireless networks. 3G networks have the capability of covering a vast area; while, WLAN networks provide higher transmission rates with less coverage. Since the two n...

متن کامل

Dependency relation based vulnerability analysis of 3G networks: Can it identify unforeseen cascading attacks?

Cascading attacks pose a new threat to the third generation (3G) wireless telecommunications network. These attacks are dangerous and difficult to detect due to their remote far-reaching effects. To automate the accurate detection of these attacks and their remote effects, we developed a telecommunication specification based toolkit called the Advanced Cellular Network Vulnerability Assessment ...

متن کامل

On the detection of signaling DoS attacks on 3G/WiMax wireless networks

Third Generation (3G) wireless networks based on the CDMA2000 and UMTS standards are now increasingly being deployed throughout the world. Because of their complex signaling and relatively limited bandwidth, these 3G networks are generally more vulnerable than their wireline counterparts, thus making them fertile ground for new attacks. In this paper, we identify and study a novel Denial of Ser...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005