Honeynets in 3G – A Game Theoretic Analysis

Christos K. Dimitriadis

Abstract

Although security improvements were implemented in the air interface of Third Generation (3G) mobile systems, important security vulnerabilities remain in the mobile core network, threatening the whole service provision path. This paper presents an overview of the results of a security assessment on the Packet Switched domain of a mobile operator’s core network and studies the benefits from implementing a Honeynet in 3G, by the deployment of game theory.

References

  1. Neimi, V., Nyberg, K.: UMTS Security. John Wiley & Sons (2003)
  2. 3rd Generation Partnership Project: TS 23.002 - Network architecture (2004)
  3. Wisely, D., Eardley, P., Burness, L.: IP for 3G-Networking Technologies for Mobile Communications. John Wiley & Sons, ISBN 0-471-48697-3 (2002)
  4. Whitehouse, O., Murphy, G.:Attacks and Counter Measures in 2.5G and 3G Cellular IP Networks. @stake press (2004)
  5. Kameswari, K., Peng, L., Yan. S., Thomas, F.,L,: A Taxonomy of Cyber Attacks on 3G Networks. IEEE International Conference on Intelligence and Security (2005).
  6. Donald, W., Scott, L.: Wireless Security Threat Taxonomy, IEEE Workshop on Information Assurance (2003)
  7. El-Fishway, N., Nofal, M., Tadros, A.: An Improvement on Secure Communication in PCS. Performance, Computing, and Communications Conference, Conference Proceedings of the 2003 IEEE International (2003)
  8. Mitchell, C. J.: Security for Mobility. IEE Telecommunication Series, 51, 2004.
  9. The Honeynet Project Know Your Enemy. 2nd ed Learning About Security Threats. Addison-Wesley (2004)
  10. Osborne, M.J., Rubinstein, A.: A course in game theory, MIT press (1997)
  11. Nash, J.: Equilibrium points in n-person games. Proceedings of the National Academy of the USA 36(1):48-49 (1950)
  12. Rabin, M.: Risk Aversion and Expected-Utility Theory: A Calibration Theorem, Econometrica 68(5), 1281-1292, September (2000)
Download


Paper Citation


in Harvard Style

K. Dimitriadis C. (2006). Honeynets in 3G – A Game Theoretic Analysis . In Proceedings of the 4th International Workshop on Security in Information Systems - Volume 1: WOSIS, (ICEIS 2006) ISBN 978-972-8865-52-8, pages 146-152. DOI: 10.5220/0002482901460152


in Bibtex Style

@conference{wosis06,
author={Christos K. Dimitriadis},
title={Honeynets in 3G – A Game Theoretic Analysis},
booktitle={Proceedings of the 4th International Workshop on Security in Information Systems - Volume 1: WOSIS, (ICEIS 2006)},
year={2006},
pages={146-152},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002482901460152},
isbn={978-972-8865-52-8},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 4th International Workshop on Security in Information Systems - Volume 1: WOSIS, (ICEIS 2006)
TI - Honeynets in 3G – A Game Theoretic Analysis
SN - 978-972-8865-52-8
AU - K. Dimitriadis C.
PY - 2006
SP - 146
EP - 152
DO - 10.5220/0002482901460152