the detector together with a simple attack mitigation
technique and provided some simulation results on
network load, end-to-end delay and wasted commu-
nication resources. Certain settings of the mecha-
nism manage to detect attacks and lower their im-
pact. Further improvements could be done in com-
bining the proposed mechanism with the one based
on ’low bandwidth usage’ characteristic to obtain bet-
ter results.
ACKNOWLEDGEMENTS
This work is part of the EU FP7 project NEMESYS
(Enhanced Network Security for Seamless Service
Provisioning in the Smart Mobile Ecosystem), un-
der grant agreement no.317888 within the FP7-ICT-
2011.1.4 Trustworthy ICT domain.
REFERENCES
Abdelrahman, O. H. and Gelenbe, E. (2014). Signalling
storms in 3G mobile networks. In Proceedings of
IEEE International Conference on Communications
(ICC’14), Communication and Information Systems
Security Symposium, pages 1017–1022, Sydney, Aus-
tralia.
Cisco (2015). Cisco visual networking index: Global mo-
bile data traffic forecast update, 2014–2019. White
Paper.
Filippoupolitis, A., Hey, L., Loukas, G., Gelenbe, E., and
Timotheou, S. (2008). Emergency response simula-
tion using wireless sensor networks. In Proceedings
of the 1st international conference on Ambient me-
dia and systems, page 21. ICST (Institute for Com-
puter Sciences, Social-Informatics and Telecommuni-
cations Engineering).
Gabriel, C. (2012). DoCoMo demands Google’s help with
signalling storm.
Gelenbe, E., Abdelrahman, O. H., and G
¨
orbil, G. (2014).
Time-outs and counters against storms.
Gelenbe, E., Gellman, M., and Loukas, G. (2004). De-
fending networks against denial of service attacks. In
Carapezza, E., editor, Proceedings of the Conference
on Optics/Photonics in Security and Defence (SPIE),
Unmanned/Unattended Sensors and Sensor Networks,
volume 5611, pages 233–243, London, UK.
Gelenbe, E., G
¨
orbil, G., Tzovaras, D., Liebergeld, S., Gar-
cia, D., Baltatu, M., and Lyberopoulos, G. L. (2013a).
NEMESYS: enhanced network security for seamless
service provisioning in the smart mobile ecosystem.
In Gelenbe, E. and Lent, R., editors, Information Sci-
ences and Systems 2013 - Proceedings of the 28th In-
ternational Symposium on Computer and Information
Sciences, ISCIS 2013, Paris, France, October 28-29,
2013, volume 264 of Lecture Notes in Electrical En-
gineering, pages 369–378. Springer.
Gelenbe, E., G
¨
orbil, G., Tzovaras, D., Liebergeld, S., Gar-
cia, D., Baltatu, M., and Lyberopoulos, G. L. (2013b).
Security for smart mobile networks: The NEMESYS
approach. In 2013 International Conference on Pri-
vacy and Security in Mobile Systems, PRISMS 2013,
Atlantic City, NJ, USA, June 24-27, 2013, pages 1–8.
IEEE.
Gelenbe, E. and Loukas, G. (2007). A self-aware approach
to denial of service defence. Computer Networks,
51(5):1299–1314.
Gelenbe, E. and Morfopoulou, C. (2011). A framework for
energy-aware routing in packet networks. The Com-
puter Journal, 54(6):850–859.
Gorbil, G., Abdelrahman, O. H., and Gelenbe, E. (2014).
Storms in mobile networks. In Proceedings of the 9th
ACM Symposium on QoS and Security for Wireless
and Mobile Networks (Q2SWinet’14), pages 119–126.
Gorbil, G., Abdelrahman, O. H., Pavloski, M., and Gelenbe,
E. (2015). Modeling and analysis of RRC-based sig-
naling storms in 3G networks. IEEE Transactions
on Emerging Topics in Computing, Special Issue on
Emerging Topics in Cyber Security, PP(99):1–14.
Gupta, M., Jha, S., Koc, A., and Vannithamby, R. (2013).
Energy impact of emerging mobile internet applica-
tions on LTE networks: issues and solutions. Commu-
nications Magazine, IEEE, 51(2):90–97.
Kaspersky Lab and INTERPOL (2014). Mobile Cyber
Threats. Joint Report.
Mulliner, C. and Seifert, J.-P. (2010). Rise of the iBots:
Owning a telco network. In Proc. 5th Inter. Conf. on
Malicious and Unwanted Software (MALWARE’10),
pages 71–80.
Pavloski, M. and Gelenbe, E. (2014). Signaling attacks in
mobile telephony. In Proceedings of the 11th Interna-
tional Conference on Security and Cryptography (SE-
CRYPT’14), pages 206–212.
Pavloski, M., Gorbil, G., and Gelenbe, E. (accepted, 2015).
Bandwidth Usage - Based Detection of Signaling At-
tacks. In 30th International Symposium on Computer
and Information Sciences. Springer Verlag.
Ramachandran, S. (2010). Web metrics: Size and number
of resources.
Ricciato, F., Coluccia, A., and DAlconzo, A. (2010). A
review of dos attack models for 3g cellular networks
from a system-design perspective. Computer Commu-
nications, 33(5):551 – 558.
Varga, A. and Hornig, R. (2008). An overview of the OM-
NeT++ simulation environment. In Proc. 1st Inter.
Conf. on Simulation Tools and Techniques for Com-
munications, Networks and Systems W’shops (Simu-
tools’08), pages 60:1–60:10.
SECRYPT2015-InternationalConferenceonSecurityandCryptography
418