Show simple item record

dc.contributor.advisorMjølsnes, Stig Frodenb_NO
dc.contributor.authorSuraev, Maximnb_NO
dc.date.accessioned2014-12-19T14:14:10Z
dc.date.available2014-12-19T14:14:10Z
dc.date.created2011-08-26nb_NO
dc.date.issued2011nb_NO
dc.identifier437116nb_NO
dc.identifierntnudaim:5972nb_NO
dc.identifier.urihttp://hdl.handle.net/11250/262435
dc.description.abstractGSM network capable of connecting to any operator providing SIP trunk has beenconstructed to serve as a target for controlled experiment on DoS attacks againstGSM. The usage of this network as a tool to perform DoS attack against mobilephones was also investigated and documented.Open source implementation of testing tool to check DoS resilience of any GSMbase station against RACH flood attack was developed as part of this thesis.Additionally, the analysis of the GSM flaws which opened the possibility for DoSattacks, and the analysis of potential countermeasures is presented.nb_NO
dc.languageengnb_NO
dc.publisherInstitutt for telematikknb_NO
dc.subjectntnudaim:5972no_NO
dc.subjectMSSECMOB Master in Security and Mobile Computingno_NO
dc.subjectno_NO
dc.titleDenial-of-service attack resilience of the GSM access network.nb_NO
dc.typeMaster thesisnb_NO
dc.source.pagenumber67nb_NO
dc.contributor.departmentNorges teknisk-naturvitenskapelige universitet, Fakultet for informasjonsteknologi, matematikk og elektroteknikk, Institutt for telematikknb_NO


Files in this item

Thumbnail
Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record