Information Security and Computer Fraud
ISSN (Print): 2376-9602 ISSN (Online): 2376-9629 Website: http://www.sciepub.com/journal/iscf Editor-in-chief: Sergii Kavun
Open Access
Journal Browser
Go
Information Security and Computer Fraud. 2017, 5(1), 1-8
DOI: 10.12691/iscf-5-1-1
Open AccessArticle

Detecting and Tracking Pseudo Base Stations in GSM Signal Hijacking and Frauds: a Visualized Approach

Yongxing Li1, Yang Heng1, Ankang Hao1, Tianxing Wang1, Xiaojie Liu2 and Lan Huang1,

1College of Computer Science, Yangtze University, Jingzhou, Hubei, China

2Beijing Gehua CATV Network Co. Ltd., Beijing, China

Pub. Date: September 18, 2017

Cite this paper:
Yongxing Li, Yang Heng, Ankang Hao, Tianxing Wang, Xiaojie Liu and Lan Huang. Detecting and Tracking Pseudo Base Stations in GSM Signal Hijacking and Frauds: a Visualized Approach. Information Security and Computer Fraud. 2017; 5(1):1-8. doi: 10.12691/iscf-5-1-1

Abstract

Pseudo base station (PBS), sometimes called fake base station, refers to cellular base stations that are employed for malicious and usually illegal purposes. Through the pitfalls of the GSM protocol, PSBs can hijack GSM signals of cellphones close by. Most PBSes are portable, for example hidden in vans or even carried in backpacks, and are deployed in densely populated regions. Then they can steal personal information from neighboring smartphones, or send intriguing messages to them that would ultimately lead to telecom frauds. In recent years, there has been a terrifying increase in the number of telecom frauds and the smartphones infected by viruses sent from PBSes. This urgently calls for methods and systems that can effectively identify and track PBSes. In this study, we designed and implemented a PBS detecting and tracking system, by conducting topic analysis of messages received by cellphones and analyzing their temporal and spatial distribution patterns. Using the system, we could perform a variety of exploratory analysis, including categorizing PBSes into either stationary or moving PBSes, discovering and visualizing their behavior patterns, and identifying districts that tend to suffer from a particular type of fraud messages.

Keywords:
pseudo base station telecom fraud topic modeling trajectory clustering visualization

Creative CommonsThis work is licensed under a Creative Commons Attribution 4.0 International License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

Figures

Figure of 12

References:

[1]  Cappella, N.. Fake Mobile Base Stations Used to Spread Malware in China. [Online]. Available: https://thestack.com/security/2017/03/23/fake-mobile-base-stations-used-to-spread-malware-in-china/ [Accessed Aug. 20, 2017].
 
[2]  Zhang, C.. Malicious Base Station and Detecting Malicious Base Station Signal. Communications System Design, 2014, pp. 59-64.
 
[3]  Borgaonkar, R., Martin, A., Park, S., Shaik, A., Seifert, J.-P.. White-Stingray: Evaluating IMSI Catechers Detection Applications. In: 11th USENIX Workshop on Offensive Technologies, 2017.
 
[4]  Kang, A., Lee, J. D., Kang, W. M., Barolli, L., Park, J. H.. Security Considerations for Smart Phone Smishing Attacks. In: Jeong H., S. Obaidat M., Yen N., Park J. (eds) Advances in Computer Science and its Applications. Lecture Notes in Electrical Engineering, vol 279. Springer, Berlin, Heidelberg.
 
[5]  ChinaDaily. 124 Arrested for Cross-Border Telecom Fraud [Online]. Available: http://www.chinadaily.com.cn/china/2017-07/27/content_30267342.htm [Accessed Aug. 20, 2017].
 
[6]  ChinaDaily. 77 Telecom Fraud Suspects Returned to China from Fiji [Online]. Available: http://www.chinadaily.com.cn/china/2017-08/05/content_30349375.htm. [Accessed Aug. 20, 2017].
 
[7]  Hilas, C. S.. Designing an Expert System for Fraud Detection in Private Telecommunications Networks. Expert Systems with Applications, 2009, 36 (9): pp. 11559-11569.
 
[8]  Bergholz, A., Paaß, G., Reichartz, F., Strobel, S., Chang, J. H.. Improved Phishing Detection using Model-Based Features. In: Fifth Conference on Email and Anti-Spam, 2008.
 
[9]  Joo, J. W., Moon, S. Y., Singh, S., Park, J. H.. S-Detector: an Enhanced Security Model for Detecting Smishing Attack for Mobile Computing. Telecommunication Systems, 2017, 66(1): pp. 29-38.
 
[10]  Ney, P., Smith, I., Cadamuro, G., Kohno, T.. SeaGlass: Enabling City-Wide IMSI-Catcher Detection. In: Proceedings on Privacy Enhancing Technologies, 2017(3).
 
[11]  Li, Z., Wang, W., Wilson, C., Chen, J., Qian, C., Jung, T., Zhang, L., Liu, K., Li, X., Liu, Y.. FBS-Radar: Uncovering Fake Base Stations at Scale in the Wild. In: 23rd Network and Distributed System Security Symposium, 2017.
 
[12]  Meng, J.. Detection and Location of GSM Pseudo Base Station Based on Software Defined Radio. Master Thesis, 2016, Lanzhou Jiaotong University.
 
[13]  Goldberg, Y., Levy, O.. word2vec Explained: Deriving Mikolov et al.’s negative-sampling word-embedding method. arXiv preprint arXiv:1402.3722, 2014.
 
[14]  ChinaVis 2017. [Online]. Available: http://chinavis.org/2017/challenge.html. [Accessed Aug. 20, 2017].
 
[15]  Ester, M., Kriegel, H. P., Sander, J., Xu, X.. A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise. In: 2nd International Conference on Knowledge Discovery and Data Mining, 1996, pp. 226-231.