CAT - A Practical Graph & SDL Based Toolkit for Vulnerability Assessment of 3G Networks
نویسندگان
چکیده
This paper presents the Cellular Network Vulnerability Assessment Toolkit CAT, designed for end-to-end vulnerability assessment of 3G networks. It is the first tool of its kind to model and represent 3G network vulnerabilities and attacks as attack graphs. CAT uses freely available 3G telecommunication specifications written in SDL, the standard Specification and Description Language to produce attack graphs. Attack graphs generated by CAT are unique due to their: (1) global representation of the network, (2) independence from physical deployments, and (3) depiction of the 3G attack graph model and cascading effects.
منابع مشابه
CAT – A Practical SDL Based Attack Attribution Toolkit for 3G Networks
This paper presents the Cross Infrastructure Attack Attribution Toolkit (CAT), which is a utility to analyze the vulnerability of 3G networks using telecommunication specifications. CAT analyzes vulnerabilities by generating attack graphs, which show the global view of the network in the event of an attack. The uniqueness of CAT is as follows: (1) usage of telecommunication specification writte...
متن کامل3GPP Specification Aided Discovery of Cascading Attacks
This paper presents aCAT Advanced Cellular Network Vulnerability Assessment Toolkit, a graph based end-to-end vulnerability assessment tool for 3G networks. The novelties of this tool include (1) usage of technical specifications written in the Specification and Description Language (SDL); (2) the definition of a network dependency model for accurate chain derivation; and (3) exhaustive attack ...
متن کاملVULNERABILITY ASSESSMENT OF WATER DISTRIBUTION NETWORKS: GRAPH THEORY METHOD
The main functional purpose of a water distribution network is to transport water from a source to several domestic and industrial units while at the same time satisfying various requirements on hydraulic response. All the water distribution networks perform two basic operations: firstly the water network needs to deliver adequate amounts of water to meet specific requirements, and secondly the...
متن کاملDependency relation based vulnerability analysis of 3G networks: Can it identify unforeseen cascading attacks?
Cascading attacks pose a new threat to the third generation (3G) wireless telecommunications network. These attacks are dangerous and difficult to detect due to their remote far-reaching effects. To automate the accurate detection of these attacks and their remote effects, we developed a telecommunication specification based toolkit called the Advanced Cellular Network Vulnerability Assessment ...
متن کاملA Survey On the Vulnerability Parameters of Networks
The analysis of vulnerability in networks generally involves some questions about how the underlying graph is connected. One is naturally interested in studying the types of disruption in the network that maybe caused by failures of certain links or nodes. In terms of a graph, the concept of connectedness is used in dierent forms to study many of the measures of vulnerability. When certain vert...
متن کامل