DocumentCode
2076559
Title
Anomaly detection in cellular Machine-to-Machine communications
Author
Murynets, Ilona ; Jover, Roger Piqueras
Author_Institution
AT&T Security Res. Center, New York, NY, USA
fYear
2013
fDate
9-13 June 2013
Firstpage
2138
Lastpage
2143
Abstract
Communication networks are rapidly evolving with connectivity reaching far beyond cell-phones, computers and tablets. Novel applications are emerging based on the widespread presence of network-enabled sensors and actuators. Machine-to-Machine (M2M) devices such as power meters, medical sensors and asset tracking appliances provide a new dimension to telecommunication services. The majority of these novel systems require low bandwidth and base their communications and control protocols on the Short Messaging Service (SMS). SMS-based attacks pose a serious threat to M2M devices and the servers/users communicating with them. Researchers have demonstrated how to remotely control embedded devices and leverage them for malicious message floods. These attacks can potentially be masked by the massive amounts of legitimate text messages traveling the airwaves daily and providing data connectivity to these connected M2M appliances. In this paper we propose two algorithms for detecting anomalous SMS activities and attacks on aggregate, cluster and individual device levels. Once these algorithms detect an anomaly they automatically determine the cause of the anomaly. Effectiveness of the algorithms has been demonstrated on real life SMS communication traffic of M2M devices connected to the network of one of the main tier-1 providers in the US.
Keywords
cellular radio; electronic messaging; protocols; security of data; telecommunication security; M2M devices; SMS-based attacks; US; anomaly detection; asset tracking appliances; cell-phones; cellular machine-to-machine communications; communication networks; computers; control protocols; legitimate text messages; malicious message floods; medical sensors; network-enabled actuators; network-enabled sensors; power meters; real life SMS communication traffic; short messaging service; tablets; telecommunication services; Clustering algorithms; Context; Detection algorithms; Home appliances; Mobile communication; Monitoring; Security;
fLanguage
English
Publisher
ieee
Conference_Titel
Communications (ICC), 2013 IEEE International Conference on
Conference_Location
Budapest
ISSN
1550-3607
Type
conf
DOI
10.1109/ICC.2013.6654843
Filename
6654843
Link To Document