Skip to main content

Detecting IMSI-Catcher Using Soft Computing

  • Conference paper
  • First Online:
Soft Computing in Data Science (SCDS 2015)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 545))

Included in the following conference series:

Abstract

Lately, from a secure system providing adequate user’s protection of confidentiality and privacy, the mobile communication has been degraded to be a less trustful one due to the revelation of IMSI catchers that enable mobile phone tapping. To fight against these illegal infringements there are a lot of activities aiming at detecting these IMSI catchers. However, so far the existing solutions are only device-based and intended for the users in their self-protection. This paper presents an innovative network-based IMSI catcher solution that makes use of machine learning techniques. After giving a brief description of the IMSI catcher the paper identifies the attributes of the IMSI catcher anomaly. The challenges that the proposed system has to surmount are also explained. Last but least, the overall architecture of the proposed Machine Learning based IMSI catcher Detection system is described thoroughly.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Foss, A.B., Johansen, P.A., Hager-Thoresen, F.: Secret surveillance of Norway’s leaders detected; Aftenposten (December 16, 2104). http://www.aftenposten.no/nyheter/iriks/Secret-surveillance-of-Norways-leaders-detected-7825278.html

  2. GSMK CRYPTOPHONE: http://www.cryptophone.de/en/

  3. Security Research Labs: https://opensource.srlabs.de/

  4. The Osmocom (Open Source Mobile Communication) project: http://openbsc.osmocom.org/trac/wiki/OsmocomOverview

  5. Android IMSI-Catcher Detector (#AIMSICD); https://secupwn.github.io/Android-IMSI-Catcher-Detector/

  6. Dabrowski, A., Pianta, N., Klepp, T., Mulazzani, M., Weippl, E.R.: IMSI-Catch Me If You Can: IMSI-Catcher-Catchers. In: Annual Computer Security Applications Conference (ACSAC). ACM (2014); 978-1-4503-3005-3/14/12

    Google Scholar 

  7. Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: A survey. ACM Computing Surveys 41(3), 1 (2009), doi:10.1145/1541880.1541882

    Article  Google Scholar 

  8. Hodge, V.J., Austin, J.: A Survey of Outlier Detection Methodologies. Artificial Intelligence Review 22(2), 85 (2004), doi:10.1007/s10462-004-4304-y

    Article  MATH  Google Scholar 

  9. Strobel, D.: IMSI Catcher, Chair for Communication Security, Ruhr-Universität Bochum (July 13, 2007)

    Google Scholar 

  10. 3GPP: Technical Specification TS 23.012 Location management procedures, V12.0.0 (September 2014)

    Google Scholar 

  11. 3GPP: Technical Specification TS 23.060 GPRS Service Description describes, V13.2.0 (March 2015)

    Google Scholar 

  12. Chen, Y.-S.: Chapter 2 Mobility Management for GPRS and UMTS; Department of Computer Science and Information Engineering National Taipei University

    Google Scholar 

  13. ElNashar, A., El-saidny, M., Sherif, M.: Design, Deployment and Performance of 4G-LTE Networks: A Practical Approach. John Wiley & Sons (2014); ISBN 1118703448, 9781118703441

    Google Scholar 

  14. Vert, R., Vert, J.-P.: Consistency and Convergence Rates of One-Class SVMs and Related Algorithms. JMLR 7, 817–854 (2006)

    MathSciNet  MATH  Google Scholar 

  15. Aftenposten data set. http://www.aftenposten.no/meninger/kommentarer/Derfor-publiserer-Aftenposten-hele-datagrunnlaget-for-mobilspionasje-sakene-7849555.html

  16. Anomaly Detection algorithm from Twitter. https://github.com/twitter/AnomalyDetection

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Thanh van Do .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer Science+Business Media Singapore

About this paper

Cite this paper

van Do, T., Nguyen, H.T., Momchil, N., Do, V.T. (2015). Detecting IMSI-Catcher Using Soft Computing. In: Berry, M., Mohamed, A., Yap, B. (eds) Soft Computing in Data Science. SCDS 2015. Communications in Computer and Information Science, vol 545. Springer, Singapore. https://doi.org/10.1007/978-981-287-936-3_13

Download citation

  • DOI: https://doi.org/10.1007/978-981-287-936-3_13

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-287-935-6

  • Online ISBN: 978-981-287-936-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics