DocumentCode :
2076559
Title :
Anomaly detection in cellular Machine-to-Machine communications
Author :
Murynets, Ilona ; Jover, Roger Piqueras
Author_Institution :
AT&T Security Res. Center, New York, NY, USA
fYear :
2013
fDate :
9-13 June 2013
Firstpage :
2138
Lastpage :
2143
Abstract :
Communication networks are rapidly evolving with connectivity reaching far beyond cell-phones, computers and tablets. Novel applications are emerging based on the widespread presence of network-enabled sensors and actuators. Machine-to-Machine (M2M) devices such as power meters, medical sensors and asset tracking appliances provide a new dimension to telecommunication services. The majority of these novel systems require low bandwidth and base their communications and control protocols on the Short Messaging Service (SMS). SMS-based attacks pose a serious threat to M2M devices and the servers/users communicating with them. Researchers have demonstrated how to remotely control embedded devices and leverage them for malicious message floods. These attacks can potentially be masked by the massive amounts of legitimate text messages traveling the airwaves daily and providing data connectivity to these connected M2M appliances. In this paper we propose two algorithms for detecting anomalous SMS activities and attacks on aggregate, cluster and individual device levels. Once these algorithms detect an anomaly they automatically determine the cause of the anomaly. Effectiveness of the algorithms has been demonstrated on real life SMS communication traffic of M2M devices connected to the network of one of the main tier-1 providers in the US.
Keywords :
cellular radio; electronic messaging; protocols; security of data; telecommunication security; M2M devices; SMS-based attacks; US; anomaly detection; asset tracking appliances; cell-phones; cellular machine-to-machine communications; communication networks; computers; control protocols; legitimate text messages; malicious message floods; medical sensors; network-enabled actuators; network-enabled sensors; power meters; real life SMS communication traffic; short messaging service; tablets; telecommunication services; Clustering algorithms; Context; Detection algorithms; Home appliances; Mobile communication; Monitoring; Security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Communications (ICC), 2013 IEEE International Conference on
Conference_Location :
Budapest
ISSN :
1550-3607
Type :
conf
DOI :
10.1109/ICC.2013.6654843
Filename :
6654843
Link To Document :
بازگشت