Abstract
The presence of "unwanted" (or background) traffic in the Internet is a well-known fact. In principle any network that has been engineered without taking its presence into account might experience troubles during periods of massive exposure to unwanted traffic, e.g. during large-scale infections. A concrete example was provided by the spreading of Code-Red-II in 2001, which caused several routers crashes worldwide. Similar events might take place in 3G networks as well, with further potential complications arising from their high functional complexity and the scarcity of radio resources. For example, under certain hypothetical network con guration settings unwanted traffic, and specifically scanning traffic from infected Mobile Stations, can cause large-scale wastage of logical resources, and in extreme cases even starvation. Unwanted traffic is present nowdays also in GPRS/UMTS, mainly due to the widespread use of 3G connect cards for laptops. We urge the research community and network operators to consider the issue of 3G robustness to unwanted traffic as a prominent research area.
- DARWIN home page http://userver.ftw.at/_ricciato/darwin.Google Scholar
- A. Bavosa. Attacks and Counter Measures in 2.5G and 3G Cellular IP Networks. Juniper White Paper, June 2004. Online at www.juniper.net/solutions/literature/white papers/200074.pdf.Google Scholar
- C.C. Zou, W. Gong, D. Towsley. Code Red Worm Propagation Modeling and Analysis. 9th ACM Conf. on Computer and Comm. Security (CCS'02), 2002. Google ScholarDigital Library
- Cisco. Dealing with mallocfail and High CPU Utilization Resulting From the "Code Red" Worm. www.cisco.com/warp/public/117/ts codred worm.pdf.Google Scholar
- E. Barkan, E. Biham, N. Keller. Instant Ciphertext Only Cryptanalysis of GSM Encrypted Communications. Crypto 2003, Santa Barbara, CA, August 2003.Google ScholarCross Ref
- F. Ricciato, P. Svoboda, E. Hasenleithner, W. Fleischer. On the Impact of Unwanted Traffic onto a 3G Network. Technical Report FTW-TR-2006-006, February 2006. Available online from {1}.Google ScholarDigital Library
- G. M. Koien. An Introduction ro Access Security in UMTS. IEEE Wireless Communications, 11(1), 2004. Google ScholarDigital Library
- H. Holma, A. Toskala. WCDMA for UMTS. Wiley. Google ScholarDigital Library
- H. Yang, F. Ricciato, S. Lu, L. Zhang. Securing a Wireless World. Proceedings of the IEEE, 94(2), 2006.Google Scholar
- J. Bannister, P. Mather, S. Coope. Convergence Technologies for 3G Networks. Wiley, 2004. Google ScholarDigital Library
- J. M. Carlson, J. Doyle. HOT: Robustness and design in complex systems. Phys. Rev. Let., 84(11), 2000.Google ScholarCross Ref
- J. Twycross, M. M. Williamson. Implementing and testing a virus throttle. Tech. Report HPL-2003-103, May 2003. Online www.hpl.hp.com/techreports/2003.Google Scholar
- K. Ahmavaara, H. Haverinen, R. Pichna. Interworking Architecture Between 3GPP and WLAN systems. IEEE Communications Magazine, November 2003. Google ScholarDigital Library
- L. Kleinrock. The Internet: History and Future. Lectio Magistralis at Politecnico di Torino, October 2005. Online at www.tlc.polito.it/_nordio/seminars.Google Scholar
- O. Whitehouse. GPRS Wireless Security: Not Ready For Prime Time. Research Report by stake, June 2002. Online at www.atstake.com/research/reports.Google Scholar
- R. Pang et al. Characteristics of Internet Background Radiation. IMC'04, Taormina, Italy, October 2004. Google ScholarDigital Library
- S. Keshav. Why Cell Phones Will Dominate the Future Internet. Computer Communication Review, 35(2), April 2005. Google ScholarDigital Library
- W. Enck, P. Traynor, P. McDaniel, T. La Porta. Exploiting Open Functionality in SMS Capable Cellular Networks. 12th ACM Conf. on Computer and Comm. Security (CCS'05), November 2005. Google ScholarDigital Library
Index Terms
- Unwanted traffic in 3G networks
Recommendations
Robust dynamic Call Admission Control framework for prioritised multimedia traffic in wireless cellular networks
Next generation wireless cellular networks aim at supporting Wireless Multimedia Services (WMSs) with different classes of traffic characterised by diverse Quality of Service (QoS) and bandwidth requirements. They will use micro/pico cellular ...
A Novel Method to Characterize Unwanted Email Traffic
CASON '10: Proceedings of the 2010 International Conference on Computational Aspects of Social NetworksThis paper proposes a novel method to characterize unwanted email traffic. Research object is a significant, diverse, and representative set of Internet email traffic, The email session we choose is based on an extended deterministic finite automata (...
Adaptive radio resource with borrowing for multi-operators 3G+ wireless networks with heterogeneous traffic
Recently, sharing the radio access network (RAN) has become an important issue for 3G and beyond mobile wireless operators. In addition to user and service considerations, there are economic and technical advantages to 3G and beyond shared networks. ...
Comments