skip to main content
article

Unwanted traffic in 3G networks

Published:28 April 2006Publication History
Skip Abstract Section

Abstract

The presence of "unwanted" (or background) traffic in the Internet is a well-known fact. In principle any network that has been engineered without taking its presence into account might experience troubles during periods of massive exposure to unwanted traffic, e.g. during large-scale infections. A concrete example was provided by the spreading of Code-Red-II in 2001, which caused several routers crashes worldwide. Similar events might take place in 3G networks as well, with further potential complications arising from their high functional complexity and the scarcity of radio resources. For example, under certain hypothetical network con guration settings unwanted traffic, and specifically scanning traffic from infected Mobile Stations, can cause large-scale wastage of logical resources, and in extreme cases even starvation. Unwanted traffic is present nowdays also in GPRS/UMTS, mainly due to the widespread use of 3G connect cards for laptops. We urge the research community and network operators to consider the issue of 3G robustness to unwanted traffic as a prominent research area.

References

  1. DARWIN home page http://userver.ftw.at/_ricciato/darwin.Google ScholarGoogle Scholar
  2. A. Bavosa. Attacks and Counter Measures in 2.5G and 3G Cellular IP Networks. Juniper White Paper, June 2004. Online at www.juniper.net/solutions/literature/white papers/200074.pdf.Google ScholarGoogle Scholar
  3. C.C. Zou, W. Gong, D. Towsley. Code Red Worm Propagation Modeling and Analysis. 9th ACM Conf. on Computer and Comm. Security (CCS'02), 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Cisco. Dealing with mallocfail and High CPU Utilization Resulting From the "Code Red" Worm. www.cisco.com/warp/public/117/ts codred worm.pdf.Google ScholarGoogle Scholar
  5. E. Barkan, E. Biham, N. Keller. Instant Ciphertext Only Cryptanalysis of GSM Encrypted Communications. Crypto 2003, Santa Barbara, CA, August 2003.Google ScholarGoogle ScholarCross RefCross Ref
  6. F. Ricciato, P. Svoboda, E. Hasenleithner, W. Fleischer. On the Impact of Unwanted Traffic onto a 3G Network. Technical Report FTW-TR-2006-006, February 2006. Available online from {1}.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. G. M. Koien. An Introduction ro Access Security in UMTS. IEEE Wireless Communications, 11(1), 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. H. Holma, A. Toskala. WCDMA for UMTS. Wiley. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. H. Yang, F. Ricciato, S. Lu, L. Zhang. Securing a Wireless World. Proceedings of the IEEE, 94(2), 2006.Google ScholarGoogle Scholar
  10. J. Bannister, P. Mather, S. Coope. Convergence Technologies for 3G Networks. Wiley, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. J. M. Carlson, J. Doyle. HOT: Robustness and design in complex systems. Phys. Rev. Let., 84(11), 2000.Google ScholarGoogle ScholarCross RefCross Ref
  12. J. Twycross, M. M. Williamson. Implementing and testing a virus throttle. Tech. Report HPL-2003-103, May 2003. Online www.hpl.hp.com/techreports/2003.Google ScholarGoogle Scholar
  13. K. Ahmavaara, H. Haverinen, R. Pichna. Interworking Architecture Between 3GPP and WLAN systems. IEEE Communications Magazine, November 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. L. Kleinrock. The Internet: History and Future. Lectio Magistralis at Politecnico di Torino, October 2005. Online at www.tlc.polito.it/_nordio/seminars.Google ScholarGoogle Scholar
  15. O. Whitehouse. GPRS Wireless Security: Not Ready For Prime Time. Research Report by stake, June 2002. Online at www.atstake.com/research/reports.Google ScholarGoogle Scholar
  16. R. Pang et al. Characteristics of Internet Background Radiation. IMC'04, Taormina, Italy, October 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. S. Keshav. Why Cell Phones Will Dominate the Future Internet. Computer Communication Review, 35(2), April 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. W. Enck, P. Traynor, P. McDaniel, T. La Porta. Exploiting Open Functionality in SMS Capable Cellular Networks. 12th ACM Conf. on Computer and Comm. Security (CCS'05), November 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Unwanted traffic in 3G networks

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image ACM SIGCOMM Computer Communication Review
        ACM SIGCOMM Computer Communication Review  Volume 36, Issue 2
        April 2006
        57 pages
        ISSN:0146-4833
        DOI:10.1145/1129582
        Issue’s Table of Contents

        Copyright © 2006 Author

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 28 April 2006

        Check for updates

        Qualifiers

        • article

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader