• Corpus ID: 9225750

A Silent SMS Denial of Service ( DoS ) Attack

@inproceedings{Croft2007ASS,
  title={A Silent SMS Denial of Service ( DoS ) Attack},
  author={Neil J. Croft and Martin S. Olivier},
  year={2007}
}
Global System for Mobile communications (GSM) is a popular mobile communications network. Short Message Service (SMS) is an easily adopted person-to-person communications technology for mobile devices. The GSM architecture allows for the insertion of mass application-generated SMS messages directly into the network infrastructure. This is achieved through a SMS Mobile Switching Centre (SMSC) using a variety of request-response protocols, for example Short Message Peer-ToPeer Protocol (SMPP… 

Figures and Tables from this paper

Review of Short Messaging Service Security
TLDR
All the existing security mechanisms in SMS and security shortfalls and various attacks on GSM networks which include Authentication, Encryption, Equipment Identification and Subscriber Identity Confidentiality, Denial of service Attacks, Brute force attack, Replay Attack are described as well as the manifestation of network vulnerabilities.
On forensics: A silent SMS attack
  • N. Croft
  • Computer Science
    2012 Information Security for South Africa
  • 2012
TLDR
This paper describes, from a forensic perspective, how a silent application-generated SMS (attack) is discovered, and investigates the possibilities of retrieving silent SMS evidence at both the handset and network level.
On privacy in mobile voice communication networks
TLDR
This thesis develops a systematic approach to identifying areas of privacy concern in a current mobile communication networks in an effort to outline mobile communication privacy principles and how applicable they are in Next Generation Networks.
SMS Spam Identification Based on Message Duplication Detection by Cuckoo Filters
  • Computer Science
  • 2014
TLDR
A method to detect spam messages using the chronological characteristics of the spamming campaigns and the similarity among the spam messages’ contents which servers a single goal is presented.
Ghost telephonist impersonates you: Vulnerability in 4G LTE CS fallback
TLDR
This work found one vulnerability in CSFB (Circuit Switched Fallback) where the authentication step is missing, which allows an attacker to impersonate a victim and named this attack as ‘Ghost Telephonist’.
Protection mechanisms for signaling DoS attacks on 3G mobile networks: Comparative study and future perspectives
TLDR
The considerable signaling load of the IDLE-DCH state transitions that can be exploited by malicious entities to launch signaling DoS attacks are examined and a new horizon for more secure 3G systems based on the randomization defense mechanisms is opened up.
How an SMS-based malware infection will get throttled by the wireless link
  • I. Murynets, R. Jover
  • Computer Science
    2012 IEEE International Conference on Communications (ICC)
  • 2012
TLDR
It is the first known work that accounts for the wireless link of the network in modeling of malware propagation and shows that spreading rate of cellular malware is tightly bounded by the actual network architecture and strongly diverges from the pattern seen in regular wired Internet-connected networks.
Security Evaluation of the Windows Mobile Operating System Master of Science Thesis
TLDR
This report analyzes the Windows Mobile 6.1 operating system and its security features, looked into its security model, and looked into some of the related research work regarding the operating system's security.
A NEW DEFENSE MECHANISM AGAINST SMISHING ATTACKS USING GRAY WOLF OPTIMIZER
TLDR
A novel framework of the SMS phishing detection presented, which combines feature extraction, oversampling, optimization algorithm for feature selection and classification, and results and output.
Threat modeling framework for mobile communication systems
TLDR
This work systematically organize the attacks on mobile communications into various tactics and techniques, designed to model adversarial behavior in terms of its attack phases and to be used as a common taxonomy matrix.
...
...

References

SHOWING 1-10 OF 25 REFERENCES
SMS: The Short Message Service
TLDR
SMS technology evolved out of the global system for mobile communications standard, an internationally accepted cell phone network specification the European Telecommunications Standards Institute created and the 3rd Generation Partnership Project maintains the SMS standard.
Overview of the GSM system and protocol architecture
  • M. Rahnema
  • Computer Science
    IEEE Communications Magazine
  • 1993
The global system for mobile telecommunications (GSM), which provides terminal mobility, with personal mobility provided through the insertion of a subscriber identity module (SIM) into the GSM
Digital cellular telecommunications system (Phase 2+); Technical realization of the Short Message Service (SMS); Point to Point (PP)(GSM 03.40 version 6
  • European telecommunications Standard Institute, ETSI
  • 1998
Signaling System Number 7
Web reference,http://www.white-cell.com
  • Web reference,http://www.white-cell.com
  • 2007
Digital cellular telecommunications system (Phase 2+); Alphabets and language-specific information (GSM 03
  • European telecommunications Standard Institute, ETSI
  • 1998
Short Message Peer to Peer Protocol Specification v3.4, The SMS Forum
  • Short Message Peer to Peer Protocol Specification v3.4, The SMS Forum
  • 1999
Short Message Peer to Peer Protocol Specification v5.0, The SMS Forum
  • Short Message Peer to Peer Protocol Specification v5.0, The SMS Forum
  • 2003
Using compatible keys in achieving subscriber privacy channelling for billing in GSM Networks
  • Proceedings of the Fifth International Network Conference, S. Furnell, P. Dowland, and G. Kormentzas
  • 2005
Digital cellular telecommunications system (Phase 2); Security related network functions
  • European Telecommunications Standards Institute, November 1999.
  • 1999
...
...