Unveiling the Hidden Dangers of Public IP in 4G/LTE Networks Wai Kay - - PowerPoint PPT Presentation

unveiling the hidden dangers of public ip in 4g lte
SMART_READER_LITE
LIVE PREVIEW

Unveiling the Hidden Dangers of Public IP in 4G/LTE Networks Wai Kay - - PowerPoint PPT Presentation

Unveiling the Hidden Dangers of Public IP in 4G/LTE Networks Wai Kay Leong , Aditya Kulkarni, Yin Xu, Ben Leong Mobile Internet is Hot ot 2 Public IP Whats the deal? Subscribers want Public IP 3 M2M M2M Machine to Machine


slide-1
SLIDE 1

Unveiling the Hidden Dangers of Public IP in 4G/LTE Networks

Wai Kay Leong, Aditya Kulkarni, Yin Xu, Ben Leong

slide-2
SLIDE 2

Mobile Internet is Hot

  • t

2

slide-3
SLIDE 3

Public IP – What’s the deal?

Subscribers want Public IP

3

slide-4
SLIDE 4

M2M

4

M2M – Machine to Machine

Delivery Vans Security Cameras Sensor Nodes Traffic Control

slide-5
SLIDE 5

Our Local Situation

5

 ISP A  ISP B  ISP C

Public IP by default† Change APN Change APN

†Does not work for certain devices

Free Public IP for LTE networks

slide-6
SLIDE 6

The Dangers of Public IP

Susceptible to simple IP attacks

  • 1. DoS Flooding
  • 2. Quota Drain
  • 3. Battery Drain

Private IP

  • 10. 42. 0. 1

NAT

  • 10. 42. 0. 1

No r out e t o hos t

Public IP

  • 215. 12. 5. 1

6

Attacker

slide-7
SLIDE 7

Attack 1: DoS Flooding

 Overwhelm the link/resources  Conventionally

 Higher bandwidth (30 Mb/s)  Requires more data

Normal traffic Malicious Packets Malicious Packets

7

slide-8
SLIDE 8

Buffer Sizing Matters

ISP Buffer

ISP A 2,000 pkts ISP B 600 pkts ISP C 800 ms

 ISP C uses AQM

 Drop packets older than 800 ms

 Sized in packets

 1,500-byte packet ≡ 1-byte packet

Xu et al. PAM 2014

Low traffic is sufficient to DoS

8

slide-9
SLIDE 9

Experiment Set-up

UDP DoS

Send rate (Mb/s) Packet Size (bytes) Measure TCP throughput (kb/s)

9

slide-10
SLIDE 10

Results

10

slide-11
SLIDE 11

ISP C – AQM

11

 No packet drops  Long UDP processing time  Delays TCP SYN/ACK

slide-12
SLIDE 12

Attack 2: Quota Drain

 Data cost $$$  Limited free quota.

1.

Billed for dropped packets (Peng et al.)

2.

Billed for unwanted packets

12

Gateway Node-B

slide-13
SLIDE 13

High Speed LTE

13

slide-14
SLIDE 14

Time to Drain Quota

14

20

1 MB every 15 min over 1 month

slide-15
SLIDE 15

Attack 3: Battery Drain

 Network communication consumes power  LTE protocol states

15

RRC IDLE RRC CONNECTED

Incoming data Timeout Low power High power

Active Short DRX Long DRX

slide-16
SLIDE 16

Power Monitor

16

 Different ISPs  Different patterns

 Same device

 Packet size does not matter  More details in the paper

slide-17
SLIDE 17

Battery Consumption

17

24 times faster drain

slide-18
SLIDE 18

Defense Against Attacks

18

 Avoid Public IP

 Use Network Address Translation (NAT)

 NAT traversal

 can be slow  not 100% successful  requires NAT servers

 Firewalls?

slide-19
SLIDE 19

Firewall on device

Harm is already done

19

Subscriber ISP Attacker

slide-20
SLIDE 20

Firewall on ISP

 Hard to differentiate legitimate traffic  Complex firewall hard to deploy

20

ISP Attacker Legitimate User Subscriber

slide-21
SLIDE 21

Proxy + Firewall

 ISP firewall allows solicited access  Attacker can spoof as proxy

21

ISP

Attacker

Subscriber IP: x.x.x.x

Proxy Server

IP: y.y.y.y Allows y.y.y.y

src:y.y.y.y

slide-22
SLIDE 22

Double IP address

 Give proxy a secret IP address

22

ISP

Attacker

Subscriber IP: x.x.x.x

Proxy Server

IP: y.y.y.y Allows z.z.z.z

src:y.y.y.y

IP: z.z.z.z

slide-23
SLIDE 23

In Summary

23

ISP

Attacker

Subscriber IP: x.x.x.x

Proxy Server

IP: y.y.y.y Allows z.z.z.z

src:y.y.y.y

IP: z.z.z.z

 Firewall prevents unsolicited access  Secret IP prevents spoofing  Proxy Firewall filters legitimate users

Legitimate User

slide-24
SLIDE 24

Conclusion

24

 Public IP: Desirable, but Dangerous

 Best to avoid public IP  Sometimes enabled by default!

 Attacks are

 Simple  Requires little resources  Can be hard to detect/differentiate

 Proxy Solution

 How effective or reliable?

slide-25
SLIDE 25

Moving Forward…

25

 Mobile networks will be faster  More users

 Personal  Commercial

 Security is a concern

 P2P or M2M

slide-26
SLIDE 26

Thank You

Questions and Comments