Adversarial Trends in Mobile Communication Systems: From Attack Patterns to Potential Defenses Strategies

Hsin Yi Chen, Siddharth Prakash Rao*

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

1 Citation (Scopus)

Abstract

Understanding attack patterns and attacker behavior has always been a prominent security research topic to provide insights into adversarial trends and defense strategies. In this paper, we demonstrate the process of analyzing adversarial trends in mobile communication systems using a conceptual threat modeling framework combined with graph analysis methodologies. We model 60 attacks using the Bhadra framework [30] and conduct graph-theory-based analysis to deduce insights. We observed the attack patterns, the diversity of attack paths given an attacker’s ability or target impact, and the importance of each technique from a network graph viewpoint and discussed potential defense strategies that mobile operators can deploy accordingly. Our main contribution is demonstrating the potential of Bhadra for analyzing the security posture of an operator’s network and simplifying the complexity of the mobile networks to communicate the security analysis results.

Original languageEnglish
Title of host publicationSecure IT Systems - 26th Nordic Conference, NordSec 2021, Proceedings
EditorsNicola Tuveri, Antonis Michalas, Billy Bob Brumley
PublisherSpringer
Pages153-171
Number of pages19
ISBN (Print)9783030916244
DOIs
Publication statusPublished - 2021
MoE publication typeA4 Conference publication
EventNordic Conference on Secure IT Systems - Virtual, Online
Duration: 29 Nov 202130 Nov 2021
Conference number: 26

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume13115 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

ConferenceNordic Conference on Secure IT Systems
Abbreviated titleNordSec
CityVirtual, Online
Period29/11/202130/11/2021

Keywords

  • Attack patterns
  • Mobile networks
  • Threat modeling

Fingerprint

Dive into the research topics of 'Adversarial Trends in Mobile Communication Systems: From Attack Patterns to Potential Defenses Strategies'. Together they form a unique fingerprint.

Cite this