Presentation 2006-10-25
Analysis of malicious traffic in the mobile network
Masashi YAMASHITA, Yuji CHIKAHIRO, Kazuo SUGIYAMA,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) As the mobile network evolutes to be "ubiquitous", we have faced a paradigm shift: the interfaces of the mobile terminal for bearer and application become open; terminals achieve wireless p2p communications; terminals act as gateways to sensor networks; a variety of service applications become integrated into networks under 3GPP NGN. Since this future mobile network is considered to interconnect with other IP networks in the future, it is expected that virus/worm/botnet in the internet jeopardizes the mobile network, while anomaly traffic caused by the worm etc. among enormous mobile terminals significantly influences on the Internet. Here our challenges are to clarify the underlying problem statement, and to establish anomaly traffic detection methods under a condition where infected mobile nodes move around. This paper surveys infection mechanism in the future mobile networks, and suggest a framework where both core network elements and mobile network elements corporate to reduce anomaly traffic.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) mobile network / Worm / malicious traffic / botnet
Paper # NS2006-111
Date of Issue

Conference Information
Committee NS
Conference Date 2006/10/18(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Network Systems(NS)
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) Analysis of malicious traffic in the mobile network
Sub Title (in English)
Keyword(1) mobile network
Keyword(2) Worm
Keyword(3) malicious traffic
Keyword(4) botnet
1st Author's Name Masashi YAMASHITA
1st Author's Affiliation NTT DoCoMo Research Labs.()
2nd Author's Name Yuji CHIKAHIRO
2nd Author's Affiliation NTT DoCoMo Research Labs.
3rd Author's Name Kazuo SUGIYAMA
3rd Author's Affiliation NTT DoCoMo Research Labs.
Date 2006-10-25
Paper # NS2006-111
Volume (vol) vol.106
Number (no) 310
Page pp.pp.-
#Pages 4
Date of Issue