Studyspark Study Document

Attack Causality in Internet-Connected Cellular Networks, Internet Essay

Pages:2 (796 words)

Sources:2

Subject:Crime

Topic:Attack

Document Type:Essay

Document:#96861854


Attack Causality in Internet-Connected Cellular Networks," internet infrastructure security researchers Patrick Traynor, Patrick McDaniel and Thomas La Porta address the convergence of telecommunication and internet networks, and "how the architecture of cellular networks makes these systems susceptible to denial of service attacks" (2007). Rather than attribute the threat posed by denial of service attacks to the oft cited cause of limited bandwidth capability, the authors contend that telecommunication and internet networks are constructed on fundamentally divergent design platforms. As the authors state directly, "to support our assertion, we present two new vulnerabilities in cellular data services & #8230; (and) these attacks specifically exploit connection setup and teardown procedures in networks implementing the General Packet Radio Service (GPRS)" (Traynor, McDaniel & La Porta, 2007), and despite the complexity of this semantic construction, the implication of their assertion is clear. The article goes on to explain that the Standalone Dedicated Control Channel (SDCCH) -- which is used to authenticate and deliver content during the transmission of a text message -- is critical to the setup phase of both text messages and voice calls. By inundating the SDCCH with nefarious text messages during a denial of service attack, perpetrators of online criminal activity can effectively flood a network to prevent the delivery of genuine text messages and voice calls.

Discussion 2:

The 8th edition of the Blue Box podcast by Dan York and Jonathan Zar focuses on the issue of government wiretapping and online surveillance, and whether or not the ostensible national security benefits outweigh institutionalized infringement of internet privacy. As York and Zar note in the podcast, terrorist networks seeking to inflict harm on the U.S. And its interests have adopted an especially invasive method of launching demoralizing and disturbing attacks. One of the main points mentioned in the podcast concerns the adjustments made by terrorist groups in response to increase pressure on their organizational efforts, as the use of internet phones has allowed for clandestine communication. The federal government's tactical wing, including the Central Intelligence Agency and the Department of Homeland Security, have expressed nearly universal alarm as to the threat of internet-based cyberterrorism attacks detrimentally affecting the nation's essential infrastructure. The latest Threat Assessment identifies "nation states, terrorist networks, organized criminal groups, individuals, and other cyber actors with varying combinations of access, technical sophistication and intent" while warning that these threats are highly likely "to target…


Sample Source(s) Used

References

Traynor, P., McDaniel, P., & La Porta, T. (2007, August). On attack causality in internet-

connected cellular networks. In Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium (pp. 1-16). USENIX Association. Retrieved from https://www.usenix.org/legacy/event/sec07/tech/full_papers/traynor/traynor_html/

U.S. Department of Homeland Security, Office of Intelligence and Analysis. Homeland security threat assessment: Evaluating threats 2008-2013. Washington, DC: Government Printing

Office, 2008. Retrieved from http://info.publicintelligence.net/DHS- Threats2008-

Cite this Document

Join thousands of other students and "spark your studies."

Sign Up for FREE
Related Documents

Studyspark Study Document

Attacks on Pearl Harbor and the World

Pages: 27 (8509 words) Sources: 1+ Subject: Terrorism Document: #50813272

Attacks on Pearl Harbor and the World Trade Center had similar historical events surrounding each attack. Franklin Delano Roosevelt and George W. Bush used similar policies to combat further attacks and unite the nation The paper highlights the entwined American reactions to the September 11 attacks and the Pearl Harbor attacks. The paper illustrates the similarities in which the over-prevailing backgrounds of each event created reactions to the devastating measures that

Studyspark Study Document

Are Video Games Art

Pages: 30 (8319 words) Sources: 40 Subject: Recreation Document: #81588196

Pervasive Video Games as Art The form and function of art has evolved and changed quite a bit over the years, decades and millennia. Paintings and sculpture have been artistic mainstays for much to most of the world of the civilized human race. However, with the technological revolution that has roared up over the last fifty years or so, new forms of art have bubbled to the proverbial surface. Digital technology

Join thousands of other students and

"spark your studies".