Feeds

DOS attacks threaten mobile network security

Falling down

The Power of One eBook: Top reasons to choose HP BladeSystem

New types of denial of service attacks threatened the security of mobile data networks, a senior telecoms security researcher warned last week.

Krishan Sabnani, vice president of networking research at Bell Labs, said inherent weaknesses in the mobile IP protocol allow the launch of attacks that are relatively straightforward to mount but hard to detect and thwart.

The attacks would take the form of repeatedly setting up and releasing connections, for example, a form of attack analogous with the SYN Flood assaults that have long being a problem on the fixed-line (wired) internet. Other attacks might rely on preventing mobile devices from going into a dormant mode, thereby draining battery life.

"We need to especially monitor the mobile networks – with limited bandwidth and terminal battery — for DOS attacks," Sabnani said during a session at the Cyber Infrastructure Protection Conference at City College of New York last Thursday, Network World reports.

Worse still the resources needed to launch an attack might be out of all proportion to the damage that could be inflicted, Sabnani suggested.

"One cable modem user with 500Kbps upload capacity can attack over one million mobile users simultaneously," he said.

Sabnani outlined various types of attack against mobile IP networks: re-establishing connections after they have been released to create congestion at radio network controllers, thereby causing problems for legitimate subscribers; sending packets to prevent a mobile device from going into sleep mode; placing rogue devices on a network that generate spurious traffic that can be hard to pin down; and excessive port scanning as a result of connected devices that are infected with computer malware.

Bell Labs' is using Sabnani's research into DOS threats to develop security appliances designed especially for mobile network architecture and protocols, marketed by Alcatel-Lucent as the 9900 Wireless Network Guardian.

"We have developed algorithms based on traffic profiling and statistical models that can detect low-volume wireless DOS attacks," Sabnani explained. "The system detects and mitigates traffic that will cause RNC signaling overload, unnecessary airlink usage, paging overload, and unnecessary subscriber battery drain." ®

Designing a Defense for Mobile Applications

More from The Register

next story
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
Putin: Crack Tor for me and I'll make you a MILLIONAIRE
Russian Interior Ministry offers big pile o' roubles for busting pro-privacy browser
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.