The present disclosure relates to the field of wireless communication, and in particular, to communication exchanged on a wireless local area network (WLAN).
US Publication 2011/0150211, whose disclosure is incorporated herein by reference, describes an architecture and technique to aid in the decryption of encrypted wireless signals for lawful intercept by determining the current encryption key. It may also be used to decrypt encrypted signals on internal interfaces of the wireless and wireline networks.
Kostrzewa, Adam, “Development of a man in the middle attack on the GSM Um-Interface,” Apr. 15, 2011, Master thesis, Technische Universitat Berlin, which is incorporated herein by reference, presents elements of the “man-in-the-middle” attack, based on the A5/2 weakness, on the radio connection between mobile and base station.
Barkan, Elad Pinhas, “Cryptanalysis of Ciphers and Protocols,” March 2006, Research thesis, Technion—Israel Institute of Technology, which is incorporated herein by reference, presents four independent contributions in the field of cryptanalysis.
Mourad, Hassan, “The Fall of SS7—How Can the Critical Security Controls Help?,” 2015, The SANS Institute, which is incorporated herein by reference, discusses vulnerabilities in the Signaling System 7 (SS7) protocol, and examines the possibility of using security controls to enhance the security of SS7 interconnections.
There is provided, in accordance with some embodiments of the present disclosure, a system that includes a wireless network interface and one or more processors. The processors are configured to obtain at least one authentication vector issued by a Home Location Register (HLR) server that serves a cellular network, independently of any cooperation with the cellular network. The processors are further configured to cause, subsequently, a mobile communication terminal to exchange communication with the processors, over a WiFi wireless local area network (WLAN) and via the wireless network interface, using an encryption key that is derived from the authentication vector.
In some embodiments, the processors are further configured to decrypt the communication, using the encryption key.
In some embodiments, the processors are configured:
to cause the mobile communication terminal to communicate an identifier of the mobile communication terminal to the processors, and
to obtain the authentication vector, using the identifier.
In some embodiments, the identifier is an International Mobile Subscriber Identity (IMSI).
In some embodiments, the processors are configured to cause the HLR server to communicate the authentication vector to the processors, by passing the identifier, via a Signaling System 7 (SS7) network, to the HLR server.
In some embodiments, the processors are configured to obtain the authentication vector by:
soliciting the mobile communication terminal to associate with the processors, by imitating a base station serving the cellular network, and
subsequently, deriving the authentication vector from communication exchanged between the mobile communication terminal and the processors.
In some embodiments, the processors are configured to obtain the authentication vector by monitoring communication from the HLR server over a Signaling System 7 (SS7) network, and extracting the authentication vector from the monitored communication.
In some embodiments, the encryption key is derived from the authentication vector in accordance with an Extensible Authentication Protocol (EAP) selected from the group consisting of: EAP-Subscriber Identity Module (EAP-SIM), and EAP-Authentication and Key Agreement (EAP-AKA).
There is further provided, in accordance with some embodiments of the present disclosure, a method. The method includes, using one or more processors, obtaining at least one authentication vector issued by a Home Location Register (HLR) server that serves a cellular network, independently of any cooperation with the cellular network. The method further includes, using the one or more processors, subsequently causing a mobile communication terminal to exchange communication with the processors, over a WiFi wireless local area network (WLAN), using an encryption key that is derived from the authentication vector.
There is further provided, in accordance with some embodiments of the present disclosure, a computer software product including a tangible non-transitory computer-readable medium in which program instructions are stored. The instructions, when read by one or more processors, cause the processors to obtain at least one authentication vector issued by a Home Location Register (HLR) server that serves a cellular network, and to cause, subsequently, a mobile communication terminal to exchange communication with the processors, over a WiFi wireless local area network (WLAN), using an encryption key that is derived from the authentication vector.
The present disclosure will be more fully understood from the following detailed description of embodiments thereof, taken together with the drawings, in which:
Extensible Authentication Protocol (EAP) is an authentication framework frequently used in WiFi WLANs. EAP includes various methods (or “mechanisms”) for authentication. For example, EAP-SIM is used for authentication and session key distribution using the Subscriber Identity Module (SIM) of the Global System for Mobile Communications (GSM). As another example, EAP-AKA, where “AKA” stands for Authentication and Key Agreement, is an EAP mechanism for authentication and session key distribution using the Universal Mobile Telecommunications System (UMTS) Subscriber Identity Module (USIM).
In some EAP methods, such as EAP-SIM and EAP-AKA, a terminal that is requesting to use a WiFi access point communicates an identifier (typically, a temporary identifier, such as a Temporary Mobile Subscriber Identity (TMSI)) of the terminal to the access point. The access point then communicates the identifier to an Authentication, Authorization and Accounting (AAA) server, which uses the identifier to request a plurality of authentication vectors from the Home Location Register (HLR) server of the cellular network that serves the terminal. Upon receiving the authentication vectors, the AAA server communicates, via the access point, a challenge to the terminal, in which the terminal must compute a value derived from the authentication vectors. If the terminal responds successfully to the challenge, the AAA server derives an encryption key from the authentication vectors, and passes the encryption key to the access point. In parallel, the terminal derives the same encryption key from the authentication vectors. The terminal and access point are thus authorized to begin exchanging communication with one another, using the encryption key for encryption and decryption.
In some cases, law enforcement entities, security-monitoring entities, or other entities may wish to monitor communication exchanged over a WLAN. A challenge in performing such monitoring is that, as described above, communication exchanged under EAP methods such as EAP-SIM and EAP-AKA is encrypted, such that unless the encryption key, and/or authentication vectors from which the encryption key is derived, are known, the communication typically cannot be decrypted. Moreover, since such entities are not recognized as partners of the cellular network, the entities cannot request authentication vectors from the cellular network.
To address the above challenge, the present disclosure provides systems and methods for obtaining authentication vectors issued, for use by a mobile communication terminal, by a Home Location Register (HLR) that serves a cellular communication network, even independently of any cooperation with the cellular network (i.e., even without partnering or otherwise cooperating with the cellular network). Further to obtaining the authentication vectors, the terminal is caused to communicate over a WiFi WLAN using an encryption key derived from the obtained authentication vectors, e.g., per the EAP-SIM or EAP-AKA protocol. Since the encryption key is known, communication from the terminal may be decrypted.
Typically, embodiments described herein provide an AAA server, such as a Remote Authentication Dial-In User Service (RADIUS) server, which is configured to imitate the behavior of a “legitimate” AAA server in almost all respects. For example, the provided AAA server passes challenges, via the access point, to the mobile terminal, and, upon a challenge being answered correctly, derives an appropriate encryption key for communication. The provided AAA server differs from a legitimate AAA server, however, in that the provided AAA server uses authentication vectors that were obtained using the methods described herein, rather than using authentication vectors received, via the normal authorized channels, from the HLR server that serves the cellular network. Embodiments described herein further provide an access point that is configured to communicate with both the provided AAA server and the “target” mobile communication terminal.
The present description describes three specific techniques by which the authentication vectors may be obtained, as follows:
(i) In some embodiments, there is further provided an “impersonating” Visitor Location Register (VLR) server that does not serve the cellular network. First, the provided VLR server obtains access to the SS7 network. Subsequently, by imitating the behavior of a legitimate VLR server, the provided VLR server uses the SS7 protocol to obtain the authentication vectors from the HLR server. The AAA server then obtains the authentication vectors from the provided VLR server.
(ii) In other embodiments, there is further provided an interrogation device which, by imitating a legitimate base station serving the cellular network, solicits the mobile communication terminal to associate with the interrogation device. Subsequently, the terminal exchanges communication with the interrogation device, using an encryption key that is derived from authentication vectors provided by the HLR server. By using a deciphering server to decrypt the communication, the interrogation device obtains these authentication vectors, and stores them in a database. The AAA server then retrieves the authentication vectors from the database.
(iii) In yet other embodiments, there is further provided an SS7 probe, which obtains authentication vectors communicated from the HLR server to other entities on the SS7 network. The probe stores the authentication vectors in a database, and the authentication vectors are subsequently retrieved from the database by the AAA server.
Embodiments described herein may be used for any suitable authentication method, including EAP-SIM and EAP-AKA. In the EAP-SIM method, each authentication vector—per the GSM protocol—includes a random number, an expected-response number derived from the random number, and a session key derived from the random number. In the EAP-AKA authentication method, each authentication vector—per the UMTS communication protocol—includes, in addition to a random number, an expected-response number, and a session key, (i) an authentication token derived from the random number, and (ii) an integrity key derived from the random number.
Reference is made to
As shown in
In some embodiments, two or more of access point 22, AAA server 23, VLR server 26, interrogation device 32, and deciphering server 36 are physically co-located (e.g., by being disposed on a common wireless router or a common computer), and/or share a common processor. For such embodiments, references below to communication between system components may indicate communication between processes. For example, the description of
In general, processor 38, and any other processor belonging to system 21, may be embodied as a single processor, or as a cooperatively networked or clustered set of processors. Processor 38, and any other processor belonging to system 21, is typically a programmed digital computing device comprising a central processing unit (CPU), random access memory (RAM), non-volatile secondary storage, such as a hard drive or CD ROM drive, network interfaces, and/or peripheral devices. Program code, including software programs, and/or data are loaded into the RAM for execution and processing by the CPU and results are generated for display, output, transmittal, or storage, as is known in the art. The program code and/or data may be downloaded to the computer in electronic form, over a network, for example, or it may, alternatively or additionally, be provided and/or stored on non-transitory tangible media, such as magnetic, optical, or electronic memory. Such program code and/or data, when provided to the processor, produce a machine or special-purpose computer, configured to perform the tasks described herein.
In
The access point then communicates the identifier to AAA server 23, which is also provided by the monitoring entity. AAA server 23 is configured to communicate with VLR server 26, which is provided by the monitoring entity, rather than with a legitimate VLR server that serves the cellular network that serves the mobile communication terminal. AAA server 23 passes the identifier to VLR server 26.
VLR server 26 first obtains access to SS7 network 27, e.g., by accepting a relevant commercial offering of a service provider, as described in the aforementioned article by Mourad, which is incorporated herein by reference. Subsequently, VLR server 26 pretends to be a legitimate VLR server, by passing the identifier, via the SS7 network, to the HLR server 28 serving the cellular network that serves terminal 20, and requesting authentication vectors from HLR server 28. HLR server 28 then uses the identifier to generate the authentication vectors, and passes the authentication vectors, via the SS7 network, to VLR server 26, as if VLR server were a legitimate VLR server. The VLR server then passes these authentication vectors to the AAA server. Alternatively, the VLR server stores the authentication vectors in a database (DB) 30, from which the AAA server subsequently retrieves the authentication vectors.
Subsequently, AAA server 23 passes, to access point 22, a challenge that is based on the authentication vectors, and access point 22 forwards the challenge to terminal 20. Terminal 20 calculates a response to the challenge, and then communicates the response, via the access point, to the AAA server. Upon receiving the response, the AAA server derives the encryption key from the authentication vectors, and communicates the encryption key to the access point. (Alternatively, the AAA server may derive the encryption key before receiving the response.) The terminal also derives the encryption key.
Subsequently, the terminal and the access point begin exchanging communication with one another, the communication being encrypted using the encryption key. The access point uses the encryption key to decrypt the communication, and passes the decrypted communication to remote server 24.
The embodiment of
In contrast, in the embodiments of
By way of introduction, in GSM cellular communication, a base station belonging to a cellular network communicates a random number to the device that is requesting to use the cellular network. The device then derives a number from the random number, and returns the derived number to the base station. If the derived number is as expected, i.e., it matches the expected-response number, the device is authenticated, and may thus begin to use the base station. GSM communication then begins, using an encryption key derived from an authentication vector that includes the random number, the expected-response number, and a session key that is derived from the random number.
The embodiment of
Subsequently, the base station, treating the interrogation device as if the interrogation device were the mobile terminal, passes the random number from the authentication vector to the interrogation device. The interrogation device, imitating the behavior of the base station, then communicates the random number to the terminal. The terminal computes the expected-response number, and passes the expected-response number to the interrogation device. Subsequently, the interrogation device, again imitating the terminal, passes the expected-response number to the base station. Upon receiving the expected-response number, the base station authenticates the interrogation device, and the interrogation device, again imitating the base station, authenticates the terminal. (The authentication steps are not explicitly shown in the FIGURE.) The terminal then begins to exchange communication with the base station, with the interrogation device acting as the “man in the middle.” The communication is encrypted using an encryption key derived from the authentication vector.
The embodiment of
The above process is repeated several times, until database 30 stores a sufficient number of authentication vectors for terminal 20. Subsequently, upon a request from terminal 20 to use the access point, the access point requests the relevant identifier (e.g., the IMSI) of the terminal, and passes the identifier to the AAA server. The AAA server then uses the identifier to retrieve, from the database, authentication vectors that were generated for use by the terminal. (Typically, database 30 stores authentication vectors for a plurality of terminals, each authentication vector being associated in the database with the identifier of the terminal for which the authentication vector was issued.) The order of events then proceeds as in
Interrogation devices that solicit mobile phones by imitating the operation of a legitimate base station are sometimes referred to as “IMSI catchers.” Examples of IMSI catching techniques are described, for example, by Strobel in “IMSI Catcher,” Jul. 13, 2007, which is incorporated herein by reference, by Asokan et al., in “Man-in-the-Middle Attacks in Tunneled Authentication protocols,” the 2003 Security Protocols Workshop, Cambridge, UK, Apr. 2-4, 2003, which is incorporated herein by reference, and by Meyer and Wetzel in “On the Impact of GSM Encryption and Man-in-the-Middle Attacks on the Security of Interoperating GSM/UMTS Networks,” proceedings of the 15th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, Barcelona, Spain, Sep. 5-8, 2004, pages 2876-2883, which is incorporated herein by reference.
In
For example,
Subsequently, upon a request from terminal 20 to use the access point, authentication vectors are retrieved from the database, as described above with reference to
In general, it is noted that the authentication vectors retrieved from database 30 by AAA server 23 may have been originally stored in the database per any one or more of the methods described herein. For example, the AAA server may retrieve three authentication vectors: one that was stored in the database by VLR server 26 (
Notwithstanding the above, there is an important difference between the embodiment of
In general, the scope of the present disclosure is not limited to the particular embodiments shown in
It will be appreciated by persons skilled in the art that the present disclosure is not limited to what has been particularly shown and described hereinabove. Rather, the scope of the present disclosure includes both combinations and subcombinations of the various features described hereinabove, as well as variations and modifications thereof that are not in the prior art, which would occur to persons skilled in the art upon reading the foregoing description. Documents incorporated by reference in the present patent application are to be considered an integral part of the application except that to the extent any terms are defined in these incorporated documents in a manner that conflicts with the definitions made explicitly or implicitly in the present specification, only the definitions in the present specification should be considered.
Number | Date | Country | Kind |
---|---|---|---|
245299 | Apr 2016 | IL | national |
This application is a Continuation of application Ser. No. 15/495,067, filed Apr. 24, 2017, pending, which claims priority to Israeli Patent Application No. 245299, filed Apr. 25, 2016, which applications are hereby incorporated by this reference in their entireties.
Number | Name | Date | Kind |
---|---|---|---|
5689442 | Swanson et al. | Nov 1997 | A |
6097817 | Bilgic | Aug 2000 | A |
6404857 | Blair et al. | Jun 2002 | B1 |
6718023 | Zolotov | Apr 2004 | B1 |
6741992 | McFadden | May 2004 | B1 |
6757361 | Blair et al. | Jun 2004 | B2 |
6950521 | Marcovici | Sep 2005 | B1 |
7134141 | Crosbie | Nov 2006 | B2 |
7216162 | Amit et al. | May 2007 | B2 |
7225343 | Honig et al. | May 2007 | B1 |
7269157 | Klinker et al. | Sep 2007 | B2 |
7287278 | Liang | Oct 2007 | B2 |
7374096 | Overhultz et al. | May 2008 | B2 |
7466816 | Blair | Dec 2008 | B2 |
RE40634 | Blair et al. | Feb 2009 | E |
7587041 | Blair | Sep 2009 | B2 |
7769875 | Moisand et al. | Aug 2010 | B1 |
RE43103 | Rozman et al. | Jan 2012 | E |
8176527 | Njemanze et al. | May 2012 | B1 |
8201245 | Dewey et al. | Jun 2012 | B2 |
RE43528 | Rozman et al. | Jul 2012 | E |
RE43529 | Rozman et al. | Jul 2012 | E |
8215546 | Lin et al. | Jul 2012 | B2 |
8224761 | Rockwood | Jul 2012 | B1 |
8351900 | Lotvonen et al. | Jan 2013 | B2 |
RE43987 | Rozman et al. | Feb 2013 | E |
8402543 | Ranjan et al. | Mar 2013 | B1 |
8413244 | Nachenberg | Apr 2013 | B1 |
8496169 | Christofferson | Jul 2013 | B2 |
8499348 | Rubin | Jul 2013 | B1 |
8578493 | McFadden | Nov 2013 | B1 |
8682812 | Ranjan | Mar 2014 | B1 |
8762948 | Zaitsev | Jun 2014 | B1 |
8838951 | Hicks et al. | Sep 2014 | B1 |
8839417 | Jordan | Sep 2014 | B1 |
8850579 | Kalinichenko | Sep 2014 | B1 |
8869268 | Barger | Oct 2014 | B1 |
9385865 | Wix et al. | Jul 2016 | B2 |
20020129140 | Peled et al. | Sep 2002 | A1 |
20030031322 | Beckmann et al. | Feb 2003 | A1 |
20030097439 | Strayer et al. | May 2003 | A1 |
20050018618 | Mualem et al. | Jan 2005 | A1 |
20050108377 | Lee et al. | May 2005 | A1 |
20050202815 | Verma et al. | Sep 2005 | A1 |
20060026680 | Zakas | Feb 2006 | A1 |
20060253703 | Eronen et al. | Nov 2006 | A1 |
20060262742 | Dommaraju et al. | Nov 2006 | A1 |
20070180509 | Swartz et al. | Aug 2007 | A1 |
20070186284 | McConnell | Aug 2007 | A1 |
20070192863 | Kapoor et al. | Aug 2007 | A1 |
20070294768 | Moskovitch et al. | Dec 2007 | A1 |
20080014873 | Krayer et al. | Jan 2008 | A1 |
20080028463 | Dagon et al. | Jan 2008 | A1 |
20080141376 | Clausen et al. | Jun 2008 | A1 |
20080150698 | Smith et al. | Jun 2008 | A1 |
20080184371 | Moskovitch et al. | Jul 2008 | A1 |
20080196104 | Tuvell et al. | Aug 2008 | A1 |
20080261192 | Huang et al. | Oct 2008 | A1 |
20080285464 | Katzir | Nov 2008 | A1 |
20090036143 | Martin et al. | Feb 2009 | A1 |
20090106842 | Durie | Apr 2009 | A1 |
20090122762 | Kitazoe et al. | May 2009 | A1 |
20090135730 | Scott et al. | May 2009 | A1 |
20090150999 | Dewey et al. | Jun 2009 | A1 |
20090158430 | Borders | Jun 2009 | A1 |
20090172397 | Kim | Jul 2009 | A1 |
20090216760 | Bennett | Aug 2009 | A1 |
20090249484 | Howard et al. | Oct 2009 | A1 |
20090267730 | Zhang | Oct 2009 | A1 |
20090282476 | Nachenberg et al. | Nov 2009 | A1 |
20100037314 | Perdisci | Feb 2010 | A1 |
20100071065 | Khan et al. | Mar 2010 | A1 |
20100100949 | Sonwane | Apr 2010 | A1 |
20100124196 | Bonar et al. | May 2010 | A1 |
20110080267 | Clare et al. | Apr 2011 | A1 |
20110099620 | Stavrou et al. | Apr 2011 | A1 |
20110150211 | Anderson | Jun 2011 | A1 |
20110154497 | Bailey | Jun 2011 | A1 |
20110167494 | Bowen et al. | Jul 2011 | A1 |
20110271341 | Satish et al. | Nov 2011 | A1 |
20110302653 | Frantz et al. | Dec 2011 | A1 |
20110320816 | Yao et al. | Dec 2011 | A1 |
20120017281 | Banerjee | Jan 2012 | A1 |
20120167221 | Kang et al. | Jun 2012 | A1 |
20120174225 | Shyamsunder et al. | Jul 2012 | A1 |
20120222117 | Wong et al. | Aug 2012 | A1 |
20120256730 | Scott et al. | Oct 2012 | A1 |
20120304244 | Xie et al. | Nov 2012 | A1 |
20120311708 | Agarwal et al. | Dec 2012 | A1 |
20120327956 | Vasudevan | Dec 2012 | A1 |
20130014253 | Neou | Jan 2013 | A1 |
20130333038 | Chien | Dec 2013 | A1 |
20140075557 | Balabine et al. | Mar 2014 | A1 |
20140098797 | Kanamarlapudi et al. | Apr 2014 | A1 |
20140148196 | Bassan-Eskenazi et al. | May 2014 | A1 |
20140160955 | Lum | Jun 2014 | A1 |
20140207917 | Tock et al. | Jul 2014 | A1 |
20140298469 | Marion et al. | Oct 2014 | A1 |
20150023504 | Wix et al. | Jan 2015 | A1 |
20150135265 | Bagrin | May 2015 | A1 |
20150135326 | Bailey, Jr. | May 2015 | A1 |
20150140097 | Goldfarb | May 2015 | A1 |
20150180658 | Korenfeld et al. | Jun 2015 | A1 |
20160050562 | Pudney et al. | Feb 2016 | A1 |
20160182460 | Alexander et al. | Jun 2016 | A1 |
20160269900 | Goldfarb | Sep 2016 | A1 |
20170013121 | Baeder et al. | Jan 2017 | A1 |
20170310486 | Goldfarb | Oct 2017 | A1 |
Number | Date | Country |
---|---|---|
2010116292 | Oct 2010 | WO |
Entry |
---|
Mobile Subscriber WiFi Privacy, O'Hanlon et al, May 2017 (Year: 2017). |
Secure Access Control for Location-Based Applications in WLAN Systems, Cho et al, Oct. 2006 (Year: 2006). |
3GPP TS 24.008 v3.8.0, “3rd Generation Partnership Project; Technical Specification Group Core Network; Mobile radio interface layer 3 specification; Core Network Protocols—Stage 3,” Release 1999, (Jun. 2001), 442 pages. |
Aho, A. V., et al., “Efficient String Matching: An Aid to Bibliographic Search,” Communication of the ACM, vol. 18, No. 6, Jun. 1975, pp. 333-340. |
Altshuler, Y., et al., “How Many Makes a Crowd? On the Evolution of Learning as a Factor of Community Coverage,” LNCS 7227, 2012, pp. 43-52. |
Altshuler, Y., et al., “Incremental Learning with Accuracy Prediction of Social and Individual Properties from Mobile-Phone Data,” IEEE, 2011, 10 pages. |
Altshuler, Y., et al., “Trade-Offs in Social and Behavioral Modeling in Mobile Networks,” LNCS 7812, 2013, pp. 412-423. |
Argamon, S., et al., “Automatically Profiling the Author of an Anonymous Text,” Communication of the ACM, vol. 52, No. 2, Feb. 2009, pp. 119-123. |
Argamon, S., et al., “Gender, Genre, and Writing Style in Formal Written Texts,” Text & Talk, vol. 23, Issue 3, 2003, 32 pages. |
Asokan, N., et al., “Man-in-the-Middle in Tunneled Authentication Protocols,” Draft version 1.3 (latest public version: http://eprint.iacr.org/2002/163/, Nov. 11, 2002, 15 pages. |
Atkinson, M., et al., “Near Real Time Information Mining in Multilingual News,” World Wide Web Conference, Apr. 20-24, 2009, 2 pages. |
Bailey, M., et al., “Automated Classification and Analysis of Internet Malware,” RAID, 2007, pp. 178-197. |
Barkan, E.P., “Cryptanalysis of Ciphers and Protocols,” Research Thesis submitted to the Senate of the Technion, Israel Institute of Technology, 2006, 200 pages. |
Bayer, U., et al., Scalable, Behavior-Based Malware Clustering, Secure Systems Lab, Technical University, Vienna, 2009, 18 pages. |
Bilge, L., et al., “Exposure: Finding Malicious Domains Using Passive DNS Analysis,” Feb. 2011, 17 pages. |
“Cell Scanning and Catcher Detection in unnoticeable pocket size,” NetHawk C2, Data sheet, version 1.4, EXFO, 2010, 4 pages. |
Cellusys, “SS7 Vulnerabilities,” e-book, 2016, 53 pages. |
Cloudshield, Inc., “Lawful Intercept Next-Generation Platform,” 2009, 6 pages. |
Coffman, T., et al., “Graph-Based Technologies for Intelligence Analysis,” CACM, Mar. 2004, 12 pages. |
Corney, M., et al. “Gender-Preferential Text Mining of E-mail Discourse,” Proceedings of the 18th Annual Computer Security Applications Conference, 2002, 8 pages. |
De Vel, O., et al., “Language and Gender Author Cohort Analysis of E-mail for Computer Forensics,” Defence Science and Technology Organisation, Australia, 2002, 16 pages. |
Dharmapurikar, S., et al., “Fast and Scalable Pattern Matching for Network Intrusion Detection Systems,” IEEE Journal on Selected Areas in Communications, Oct. 2006, vol. 24, Issue 10, pp. 1781-1792. |
Dietrich, C. J., et al., “CoCoSpot: Clustering and recognizing botnet command and control channels using traffic analysis,” 2012, pp. 475-486. |
Eagle, N., et al., “Inferring friendship network structure by using mobile phone data,” PNAS, vol. 106, No. 36, 2009, pp. 15274-15278. |
Engel, T., “SS7: Locate. Track. Manipulate.” 2014, 55 pages. |
Eslahi, M., “botAnalytics: Improving HTTP-Based Botnet Detection by Using Network Behavior Analysis system,” Dissertation, Faculty of Computer Science and Information Technology, University of Malaya, 2010, 124 pages. |
Estival, D., et al., “Author Profiling for English Emails,” Proceedings of the 10th Conference of the Pacific Association for Computational Linguistics, 2007, pp. 263-272. |
Fisk, M., et al., “Applying Fast String Matching to Intrusion Detection,” Los Alamos National Laboratory and University of California San Diego, Jun. 1975, 22 pages. |
FoxReplay Analyst, Fox Replay BV, http//www.foxreplay.com, Revision 1.0, Nov. 2007, 5 pages. |
FoxReplay Analyst Product Brochure, Fox-IT BV, http//www.foxreplay.com, 2006, 2 pages. |
Girardin, F., et al., “Detecting air travel to survey passengers on a worldwide scale,” Journal of Location Based Services, 2010, 26 pages. |
Goldfarb, E., “Mass Link Analysis: Conceptual Analysis,” Jun. 24, 2007, Version 1.1, 21 pages. |
Goswami, S., et al., “Stylometric Analysis of Bloggers'Age and Gender,” Proceedings of the Third International ICWSM Conference, 2009, pp. 214-217. |
Gu, G., et al., “BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection,” USENIX Security Symposium, vol. 5, No. 2, XP61009228, 2008, 16 pages. |
Gu, G., et al., “BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic,” Proceedings of the 15th Annual Network and Distributed System Security Symposium (NDSS'08), San Diego, California, 2008, 18 pages. |
Kostrzewa, A., “Development of a man in the middle attack on the GSM Um-Interface,” Master Thesis, 2011, 88 pages. |
Jacob, G., et al., “Jackstraws: Picking Command and Control Connections from Bot Traffic,” Proceedings of the 20th Usenix Security Symposium, San Francisco, 2011, 16 pages. |
Lakhina, A., et al., “Mining Anomalies Using Traffic Feature Distributions,” SIGCOMM, 2005, pp. 217-228. |
Livadas, C., et al., “Using Machine Learning Techniques to Identify Botnet Traffic,” In 2nd IEEE LCN Workshop on Network Security (WoNS'2006), 2006, pp. 967-974. |
Meyer, U., et al., “On the Impact of GSM Encryption and Man-in-the-Middle Attacks on the Security of Interoperating GSM/UMTS Networks,” proceedings of the 15th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, 2004, pp. 2876-2883. |
Mohrehkesh, S., et al., “Demographic Prediction of Mobile User from Phone Usage,” Proceedings Mobile Data Challenge by Nokia Workshop, Newcastle, United Kingdom, 2012, 4 pages. |
Mourad, H., “The Fall of SS7—How Can the Critical Security Controls Help?” The SANS Institute, 2015, 29 pages. |
Navarro, G., et al., “Flexible Pattern Matching in Strings: Practical On-Line Search Algorithms for Texts and Biological Sequences,” Cambridge University Press, 2002, 166 pages. |
Netronome SSL Inspector Solution Overview White Paper, “Examining SSL-encrypted Communications,” 2010, 8 pages. |
Nohl, K., “Mobile self-defense,” Security Research Labs, 2015, 24 pages. |
Pan, L., “Effective and Efficient Methodologies for Social Network Analysis,” Dissertation submitted to faculty of Virginia Polytechnic Institute and State University, Blacksburg, Virginia, Dec. 11, 2007, 148 pages. |
Radiator, EAP-SIM, EAP-AKA and EAP-AKA' Support, White Paper, Open System Consultants Pty. Ltd., 2014, 17 pages. |
Rangel, F., et al., “Overview of the Author Profiling Task at PAN 2013,” CLEF 2013 Evaluation Labs, 2013, 13 pages. |
Rieck, K., et al., “Botzilla: Detecting the ‘Phoning Home’ of Malicious Software,” Proceedings of the ACM Symposium on Applied Computing (SAC), Sierre, Switzerland, 2010, 7 pages. |
Rohde & Schwarz GmbH & Co. KG, “Accessnet-T, DMX-500 R2, Digital Mobile exchange,” Product Brochure, Secure Communications, Mar. 2000, 4 pages. |
Rohde & Schwarz GmbH & Co. KG, “Accessnet-T IP,” Product Brochure, Secure Communications, Jan. 2000, 4 pages. |
Rohde & Schwarz GmbH & Co. KG, “Digital Standards for R&S SMU200A, R&S SMATE200A, R&S SMJ100A, R&S SMBV100A and R&S AMU200A,” Data Sheet, Test & Measurement, May 2000, 68 pages. |
Rohde & Schwarz GmbH & Co. KG, “GAPM Passive GSM Test System,” Technical Information, 2009, 37 pages. |
Rohde & Schwarz GmbH & Co. KG, “Integrated Digital Audio Software R&S AllAudio,” Specifications, 2000, 8 pages. |
Rohde & Schwarz GmbH & Co. KG, “R&S AllAudio Integrated Digital Audio Software,” Product Brochure, Radiomonitoring & Radiolocation, Feb. 2000, 12 pages. |
Rohde & Schwarz GmbH & Co. KG, “R&S AllAudio Integrierte digitale Audio-Software,” Product Brochure, Feb. 2002, 12 pages. |
Rohde & Schwarz GmbH & Co. KG, “R&S Ammos GX425 Software,” http://www2.rohde-schwarz.com/en/products/radiomonitoring/Signal_Analysis/GX425, Jul. 30, 2010, 1 page. |
Rohde & Schwarz GmbH & Co. KG, “R&S Ammos GX430 PC-Based Signal Analysis and Signal Processing Standalone software solution,” http://www2.rohde-schwarz.com/en/products/radiomonitoring/Signal_Analysis/GX430, Jul. 30, 2010, 1 page. |
Rohde & Schwarz GmbH & Co. KG, “R&S RA-CM Continuous Monitoring Software,” Product Brochure, Radiomonitoring & Radiolocation, Jan. 2001, 16 pages. |
Rohde & Schwarz GmbH & Co. KG, “R&S Ramon COMINT/CESM Software,” Product Brochure, Radiomonitoring & Radiolocation, Jan. 2000, 22 pages. |
Rohde & Schwarz GmbH & Co. KG, “R&S TMSR200 Lightweight Interception and Direction Finding System,” Technical Information, Aug. 14, 2009, 8SPM-ko/hn, Version 3.0, 10 pages. |
Schulzrinne, H., et al., “RTP: A Transport Protocol for Real-Time Applications,” Standards Track, Jul. 2003, 89 pages. |
Sheng, L., et al., “A Graph Query Language and Its Query Processing,” IEEE, Apr. 1999, pp. 572-581. |
Signaling System 7 (SS7) Security Report, Positive Technologies, 2014, 15 pages. |
Soghoian, C., et al., “Certified Lies: Detecting and Defeating Government Interception Attacks Against SSL,” 2010, 19 pages. |
Stamatatos, E., “Author identification: Using text sampling to handle the class imbalance problem,” Science Direct, Information Processing and Management, vol. 44, 2008, pp. 790-799. |
Strobel, D., “IMSI Catcher,” Seminararbeit, Ruhr-Universität Bochum, 2007, pp. 13-24. |
Svenson, P., et al., “Social network analysis and information fusion for anti-terrorism,” CIMI, 2006, 8 pages. |
“TEMS™ Pocket—A Complete Measurement Smartphone System in Your Hand,” Ascom Network Testing, 2013, 2 pages. |
Thonnard, O., et al., “Actionable Knowledge Discovery for Threats Intelligence Support Using a Multi-Dimensional Data Mining Methodolgy,” 2008 IEEE International Conference on Data Mining Workshops, 2008, pp. 154-163. |
Tongaonkar, A. S., “Fast Pattern-Matching Techniques for Packet Filtering,” Stony Brook University, May 2004, 44 pages. |
Vedaldi, A., “An implementation of SIFT detector and descriptor,” University of California at Los Angeles, 2007, 7 pages. |
Verint Systems Inc., “Mass Link Analysis: Solution Description,” Dec. 2008, 16 pages. |
Wang, H., et al., “NetSpy: Automatic Generation of Spyware Signatures for NIDS,” Proceedings of the 22nd Annual Computer Security Applications Conference, Miami Beach, Florida, Dec. 2006, ten pages. |
“Wireless Network Optimization Platform—LTE,” E6474A Drive Test, JDSU, Communications Test & Measurement Solutions, 2012, 4 pages. |
Yu, F., et al., “Fast and Memory-Efficient Regular Expression Matching for Deep Packet Inspection,” ANCS'06, San Jose, California, Dec. 3-5, 2006, 10 pages. |
Yu, F., et al., “Gigabit Rate Packet Pattern-Matching Using TCAM,” Proceedings of the 12th IEEE International Conference on Network Protocols (ICNP'04), 2004, 10 pages. |
Number | Date | Country | |
---|---|---|---|
20200382322 A1 | Dec 2020 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 15495067 | Apr 2017 | US |
Child | 16994928 | US |