首页 | 官方网站   微博 | 高级检索  
     

非接入层拒绝服务攻击分析与设计
引用本文:王华华,黄俊霖,何 沛,吴妙灵,张杰棠.非接入层拒绝服务攻击分析与设计[J].电讯技术,2022,62(3):354-360.
作者姓名:王华华  黄俊霖  何 沛  吴妙灵  张杰棠
作者单位:重庆邮电大学 通信与信息工程学院,重庆400065
基金项目:教育部-中国移动科研基金(MCM201805-2)
摘    要:随着移动通信网络的迅猛发展,其安全漏洞产生的影响更为广泛,使得安全性研究尤为重要.根据长期演进(Long Term Evolution,LTE)非接入层协议的漏洞,构建了针对网络端和终端的两种拒绝服务攻击模型,通过获取不同终端的国际移动用户标识并分别伪造鉴权拒绝消息和附着请求消息对目标发起不同危害程度的拒绝服务攻击.实...

关 键 词:移动通信  网络安全  非接入层  安全漏洞  拒绝服务  攻击模型

Analysis and design of denial of service attacks in non-access layer
WANG Huahu,HUANG Junlin,HE Pei,WU Miaoling,ZHANG Jietang.Analysis and design of denial of service attacks in non-access layer[J].Telecommunication Engineering,2022,62(3):354-360.
Authors:WANG Huahu  HUANG Junlin  HE Pei  WU Miaoling  ZHANG Jietang
Affiliation:School of Communication and Information Engineering,Chongqing University of Posts and Telecommunications,Chongqing 400065,China
Abstract:With the rapid development of mobile communication network,the impact of its security vulnerabilities is more extensive,which makes the security research particularly important.According to the vulnerability of LTE non-access layer protocol,two denial-of-service(DoS) attack models for network terminal and terminal are constructed in this paper.By obtaining the International Mobile Subscriber Identity(IMSI) of different terminals and faking the authentication denial message and attached request message respectively,DoS attack with different degree of damage is launched against the target.The experimental results show that the attack initiated by authentication denial can force the target terminal down to 2G network.However,the attack initiated by attachment request will increase the central processing unit utilization rate of the core network side from 30% to 80%,resulting in huge consumption of network resources and making it difficult for users to access normally.The research conclusion is helpful to promote the security evolution of non-access layer protocol.
Keywords:mobile communication  network security  non-access layer  security vulnerabilities  denial of service  attack model
本文献已被 万方数据 等数据库收录!
点击此处可从《电讯技术》浏览原始摘要信息
点击此处可从《电讯技术》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号