cs 5410 computer and network security cellular network
play

CS 5410 - Computer and Network Security: Cellular Network Security - PowerPoint PPT Presentation

CS 5410 - Computer and Network Security: Cellular Network Security Professor Kevin Butler Fall 2015 Southeastern Security for Enterprise and Infrastructure (SENSEI) Center Reminders Poster showcase next Monday For final project: turn


  1. CS 5410 - Computer and Network Security: Cellular Network Security Professor Kevin Butler Fall 2015 Southeastern Security for Enterprise and Infrastructure (SENSEI) Center

  2. Reminders • Poster showcase next Monday • For final project: turn in all of your code, plus a makefile and instructions on how to run it Southeastern Security for Enterprise and Infrastructure (SENSEI) Center 2

  3. Unintended Consequences • The law of unintended consequences states that 
 most human actions have at least 
 one unintended consequence. • Rigidity in networks: how would you characterize the rigidity of: • The Internet? • The telephone network? Southeastern Security for Enterprise and Infrastructure (SENSEI) Center 3

  4. Low Rate DoS Attacks • While recent attacks on cellular networks seem unrelated, there is a common factor that catalyzes them all. 
 • Comparing multiple attacks uncovers causality: ‣ SMS Attack 
 (JCS’09, CCS’05) ‣ Network Characterization and 
 Clash of Design 
 Partial Mitigations (TON’10, MobiCom’06) Philosophies ‣ Data Teardown/Setup Attacks 
 (USENIX Security’07) 
 • The architecture of cellular networks inherently makes them susceptible to denial of service attacks. Southeastern Security for Enterprise and Infrastructure (SENSEI) Center 4

  5. SMS Delivery (simplified) CCH MSC PSTN HLR VLR VLR Network SMSC MSC Internet ESME Southeastern Security for Enterprise and Infrastructure (SENSEI) Center 5

  6. Control Channels • Control channels are used for a handful of infrequently used functions. ‣ Call setup, SMS delivery, mobility management, etc... 
 • The SDCCH allows the network to perform most of these functions. 
 • The number of SDCCHs typically depends on the expected use in an area. PCH ‣ 4/8/12... RACH AGCH SDCCH Southeastern Security for Enterprise and Infrastructure (SENSEI) Center 6

  7. 
 
 GSM TDMA Frames • TDMA Frame: 
 Frame: 4.615 msec Slot 0 Slot 1 Slot 2 Slot 3 Slot 4 Slot 5 Slot 6 Slot 7 51 Multiframe: Frame 0 Frame 1 Frame 2 ... Frame 50 235.365 msec Southeastern Security for Enterprise and Infrastructure (SENSEI) Center 7

  8. From Frames to Channels 26 Multiframe: 120.00 ms 7 } 0 1 2 3 Frame: 4.615ms 4 5 6 Southeastern Security for Enterprise and Infrastructure (SENSEI) Center 8

  9. Recognition • Once you fill the SDCCH channels with SMS traffic, call setup is blocked Voice X SMS SMS SMS SMS SMS SMS SMS SMS • The goal of an adversary is therefore to fill SDCCHs with SMS traffic. ‣ Not as simple as you might think... Southeastern Security for Enterprise and Infrastructure (SENSEI) Center 9

  10. Reconnaissance • Can such an attack be launched by targeting a single phone? ‣ Low end phones: 30-50 msgs ‣ High end phones: 500+ msgs (battery dies) 
 • How do you get messages into the network? ‣ Email, IM, provider websites, bulk senders, etc... 
 • Don’t the networks have protections? ‣ IP Address blocking, Spam filtering Southeastern Security for Enterprise and Infrastructure (SENSEI) Center 10

  11. 
 
 
 
 
 
 Finding Phones • North American Numbering Plan (NANP) 
 NPA-NXX-XXXX Numbering Plan Exchange Numbering Plan Area (Area code) ‣ Mappings between providers and exchanges publicly documented and available on the web • Implication : An adversary can identify the prefixes used in a target area. Southeastern Security for Enterprise and Infrastructure (SENSEI) Center 11

  12. 
 
 Web-Scraping • Googling for phone numbers gives us better results: 
 7,300 in NYC 
 6,184 in D.C. 
 in 5 seconds... Southeastern Security for Enterprise and Infrastructure (SENSEI) Center 12

  13. Provider Interfaces • Almost all provider interfaces indicate whether or not a number is good. ‣ Some sites even tell you a target phone’s availability. 
 • This interface is an “oracle” for available phones. Southeastern Security for Enterprise and Infrastructure (SENSEI) Center 13

  14. Exploit (Metro) Sectors in SDCCHs per Messages per Manhattan sector SDCCH per hour „ 12 SDCCH « „ 900 msg/hr « (55 sectors ) C � 1 sector 1 SDCCH 594 , 000 msg/hr � 165 msg/sec � • 165 msgs/sec * 1500 bytes = 1933.6 kb/sec • 193.36 kb/sec on multi-send interface... • Comparison: Cable modem ~= 768 kb/sec Southeastern Security for Enterprise and Infrastructure (SENSEI) Center 14

  15. Attack Profile 1.2 SDCCH Utilization TCH Utilization 1 0.8 SDCCH Utilization Utilization 0.6 TCH Utilization 0.4 0.2 0 0 500 1000 1500 2000 2500 3000 3500 4000 Time (seconds) • Applied simulation and analysis to better characterize the attacks. • Examined call blocking under multiple arrival patterns with exponentially distributed service times. • Using 495 msgs/sec, a blocking probability of 71% is possible with the bandwidth of a cable modem. Southeastern Security for Enterprise and Infrastructure (SENSEI) Center 15

  16. Security Goals • Goal: To preserve the fidelity of both voice services and legitimate text messages during targeted SMS attacks. 
 • Security Model: ‣ We must trust equipment in the network core. ‣ We can not trust Internet users or customer devices. 
 Southeastern Security for Enterprise and Infrastructure (SENSEI) Center 16

  17. Placing Mitigations MSC PSTN HLR VLR VLR Network SMSC MSC Internet ESME Southeastern Security for Enterprise and Infrastructure (SENSEI) Center 17

  18. Solution Classifications • Scheduling/Shaping/Regulation ‣ WFQ, Leaky Bucket, Priority Queues ‣ AQM (WRED, REM, AVQ) 
 • Resource Provisioning 1 1 Service Queue (SMS) SDCCH (SMS) Service Queue (Voice) SDCCH (Voice) TCH (Voice) TCH (Voice) ‣ SRP 0.8 0.8 Percent of Attempts Blocked Percent of Attempts Blocked 0.6 0.6 0.4 0.4 ‣ DRP 0.2 0.2 0 0 0 500 1000 1500 2000 2500 3000 3500 4000 0 500 1000 1500 2000 2500 3000 3500 4000 Time (seconds) Time (seconds) 1 1 SDCCH (SMS) SDCCH SDCCH (Voice) ‣ DCA TCH TCH (Voice) Service Queue 0.8 0.8 Percent of Attempts Blocked 0.6 0.6 Utilization 0.4 0.4 0.2 0.2 0 0 0 500 1000 1500 2000 2500 3000 3500 4000 0 500 1000 1500 2000 2500 3000 3500 4000 Time (seconds) Time (seconds) Southeastern Security for Enterprise and Infrastructure (SENSEI) Center 18

  19. WRED - Overview High Med Low t med,max t med,min t low,min t low,max Southeastern Security for Enterprise and Infrastructure (SENSEI) Center 19

  20. WRED - Overview High Med Low t med,max t med,min t low,min t low,max ρ N Q = P Q 1 − ρ ρ target = ρ actual (1 − P drop ) P drop = P drop,high · λ high + P drop,med · λ med + P drop,low · λ low λ SMS P drop = P drop,max · ( Q avg − t min ) ( t max − t min ) Southeastern Security for Enterprise and Infrastructure (SENSEI) Center 20

  21. WRED - Results 1 1 Service Queue (SMS - Priority 1) SDCCH Service Queue (SMS - Priority 2) TCH Service Queue (SMS - Priority 3) Service Queue 0.8 0.8 Percent of Attempts Blocked 0.6 0.6 Average Queue 
 Utilization Occupancy Low Priority 0.4 0.4 SMS Blocking 0.2 0.2 0 0 0 500 1000 1500 2000 2500 3000 3500 4000 0 500 1000 1500 2000 2500 3000 3500 4000 Time (seconds) Time (seconds) • Messages of high and medium-priority experience no blocking, but increased delay. • An average of 77% of low-priority messages are blocked. • This is a nice solution, assuming meaningful partitioning of flows. Southeastern Security for Enterprise and Infrastructure (SENSEI) Center 21

  22. ...and yet... • Performance improvements come from one of two changes: speedup or parallelization. 
 • As diverse as our solutions appear, they all attempt to maximize performance through the latter. ‣ In many senses, we are not solving the problem - we are pushing food around on our plate. 
 • Adding bandwidth should logically 
 address this problem. Southeastern Security for Enterprise and Infrastructure (SENSEI) Center 22

  23. Cellular Data Networks • GPRS/EDGE provide much higher bandwidth service. 
 • Packet-switched data services are attractive to providers and users for a number of reasons. 
 • User devices operate in one of three 
 states: IDLE, STANDBY and READY. STANDBY ‣ IDLE: The device is unavailable. READY Paging Timer Request Expires ‣ STANDBY: Available, but not 
 STANDBY Timer READY exchanging packets. Expires GPRS GPRS ‣ READY: Actively listening for packets. Detach Attach IDLE Southeastern Security for Enterprise and Infrastructure (SENSEI) Center 23

  24. Data Architecture HLR Internet GGSN SGSN IP Address SGSN 192.168.100.1 192.168.1.2 192.168.100.2 192.168.1.2 Southeastern Security for Enterprise and Infrastructure (SENSEI) Center 24

  25. Real Network Configs • To make these simulations represent reality, we use a Samsung Blackjack in Field Test Mode to discover settings of an operational network. 
 • Field Test Mode tells us that control channels for voice and data are shared in real networks. ‣ Voice and data traffic may be 
 able to interfere with each 
 other. Southeastern Security for Enterprise and Infrastructure (SENSEI) Center 25

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend