unveiling the hidden dangers of public ip in 4g lte
play

Unveiling the Hidden Dangers of Public IP in 4G/LTE Networks Wai Kay - PowerPoint PPT Presentation

Unveiling the Hidden Dangers of Public IP in 4G/LTE Networks Wai Kay Leong , Aditya Kulkarni, Yin Xu, Ben Leong Mobile Internet is Hot ot 2 Public IP Whats the deal? Subscribers want Public IP 3 M2M M2M Machine to Machine


  1. Unveiling the Hidden Dangers of Public IP in 4G/LTE Networks Wai Kay Leong , Aditya Kulkarni, Yin Xu, Ben Leong

  2. Mobile Internet is Hot ot 2

  3. Public IP – What’s the deal? Subscribers want Public IP 3

  4. M2M M2M – Machine to Machine Delivery Vans Security Cameras Sensor Nodes Traffic Control 4

  5. Our Local Situation Public IP by default †  ISP A  ISP B Change APN Change APN  ISP C Free Public IP for LTE networks † Does not work for certain devices 5

  6. The Dangers of Public IP Susceptible to simple IP attacks 1. DoS Flooding 2. Quota Drain 3. Battery Drain 10. 42. 0. 1 No r out e NAT Private IP Public IP t o hos t Attacker 10. 42. 0. 1 215. 12. 5. 1 6

  7. Attack 1: DoS Flooding  Overwhelm the link/resources  Conventionally  Higher bandwidth (30 Mb/s)  Requires more data Malicious Packets Malicious Packets Normal traffic 7

  8. Buffer Sizing Matters ISP Buffer ISP A 2,000 pkts ISP B 600 pkts ISP C 800 ms Xu et al. PAM 2014  ISP C uses AQM Low traffic is sufficient to DoS  Drop packets older than 800 ms  Sized in packets  1,500- byte packet ≡ 1 -byte packet 8

  9. Experiment Set-up Send rate (Mb/s) Packet Size (bytes) UDP DoS Measure TCP throughput (kb/s) 9

  10. Results 10

  11. ISP C – AQM  No packet drops  Long UDP processing time  Delays TCP SYN/ACK 11

  12. Attack 2: Quota Drain  Data cost $$$  Limited free quota. Billed for dropped packets (Peng et al.) 1. Billed for unwanted packets 2. Gateway Node-B 12

  13. High Speed LTE 13

  14. Time to Drain Quota 20 1 MB every 15 min over 1 month 14

  15. Attack 3: Battery Drain  Network communication consumes power  LTE protocol states Incoming RRC CONNECTED data Active RRC IDLE Low power Long Short Timeout DRX DRX High power 15

  16. Power Monitor  Different ISPs  Different patterns  Same device  Packet size does not matter  More details in the paper 16

  17. Battery Consumption 24 times faster drain 17

  18. Defense Against Attacks  Avoid Public IP  Use Network Address Translation (NAT)  NAT traversal  can be slow  not 100% successful  requires NAT servers  Firewalls? 18

  19. Firewall on device Harm is already done ISP Subscriber Attacker 19

  20. Firewall on ISP  Hard to differentiate legitimate traffic  Complex firewall hard to deploy ISP Subscriber Legitimate User Attacker 20

  21. Proxy + Firewall  ISP firewall allows solicited access Proxy Server  Attacker can spoof as proxy ISP Subscriber IP: y.y.y.y Allows y.y.y.y IP: x.x.x.x src: y.y.y.y Attacker 21

  22. Double IP address  Give proxy a secret IP address Proxy Server IP: z.z.z.z ISP Subscriber IP: y.y.y.y Allows z.z.z.z IP: x.x.x.x src: y.y.y.y Attacker 22

  23. In Summary  Firewall prevents unsolicited access Proxy Server  Secret IP prevents spoofing IP: z.z.z.z  Proxy Firewall filters legitimate users ISP Subscriber IP: y.y.y.y Allows z.z.z.z Legitimate IP: x.x.x.x User src: y.y.y.y Attacker 23

  24. Conclusion  Public IP: Desirable, but Dangerous  Best to avoid public IP  Sometimes enabled by default!  Attacks are  Simple  Requires little resources  Can be hard to detect/differentiate  Proxy Solution  How effective or reliable? 24

  25. Moving Forward…  Mobile networks will be faster  More users  Personal  Commercial  Security is a concern  P2P or M2M 25

  26. Thank You Questions and Comments

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend