9-1-1 DDoS: Attacks, Analysis and Mitigation
Title | 9-1-1 DDoS: Attacks, Analysis and Mitigation |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Guri, M., Mirsky, Y., Elovici, Y. |
Conference Name | 2017 IEEE European Symposium on Security and Privacy (EuroS P) |
Date Published | apr |
Publisher | IEEE |
Keywords | 9-1-1 DDoS, 911, 911 emergency service, anonymized attacks, anonymized phones, anonymous attacks, Baseband, baseband firmware, Botnet, cellular, cellular identifiers, cellular network protocols, Cellular networks, cellular radio, composability, Computer crime, computer network security, critical infrastructure sectors, critical infrastructures, cryptographic protocols, DDoS, DDoS attack mitigation, distributed denial of service attack, e911, emergency call centers, emergency services, FCC regulations, firmware, Human Behavior, invasive software, Metrics, Mobile handsets, mobile phone Botnet, Object recognition, PSAP, pubcrawl, Resiliency, rootkit, smartphone, TDoS, Terrorism |
Abstract | The 911 emergency service belongs to one of the 16 critical infrastructure sectors in the United States. Distributed denial of service (DDoS) attacks launched from a mobile phone botnet pose a significant threat to the availability of this vital service. In this paper we show how attackers can exploit the cellular network protocols in order to launch an anonymized DDoS attack on 911. The current FCC regulations require that all emergency calls be immediately routed regardless of the caller's identifiers (e.g., IMSI and IMEI). A rootkit placed within the baseband firmware of a mobile phone can mask and randomize all cellular identifiers, causing the device to have no genuine identification within the cellular network. Such anonymized phones can issue repeated emergency calls that cannot be blocked by the network or the emergency call centers, technically or legally. We explore the 911 infrastructure and discuss why it is susceptible to this kind of attack. We then implement different forms of the attack and test our implementation on a small cellular network. Finally, we simulate and analyze anonymous attacks on a model of current 911 infrastructure in order to measure the severity of their impact. We found that with less than 6K bots (or \$100K hardware), attackers can block emergency services in an entire state (e.g., North Carolina) for days. We believe that this paper will assist the respective organizations, lawmakers, and security professionals in understanding the scope of this issue in order to prevent possible 911-DDoS attacks in the future. |
URL | https://ieeexplore.ieee.org/document/7961982 |
DOI | 10.1109/EuroSP.2017.23 |
Citation Key | guri_9-1-1_2017 |
- Mobile handsets
- DDoS attack mitigation
- distributed denial of service attack
- e911
- emergency call centers
- emergency services
- FCC regulations
- firmware
- Human behavior
- invasive software
- Metrics
- DDoS
- mobile phone Botnet
- Object recognition
- PSAP
- pubcrawl
- Resiliency
- rootkit
- smartphone
- TDoS
- Terrorism
- cellular identifiers
- 911
- 911 emergency service
- anonymized attacks
- anonymized phones
- anonymous attacks
- Baseband
- baseband firmware
- botnet
- Cellular
- 9-1-1 DDoS
- cellular network protocols
- Cellular networks
- cellular radio
- composability
- Computer crime
- computer network security
- critical infrastructure sectors
- critical infrastructures
- Cryptographic Protocols