Network Infrastructure Security in Cellular Data Networks: An Initial Investigation



Similar documents
Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

CS5008: Internet Computing

How To Understand The Gsm And Mts Mobile Network Evolution

Chapter 8 Security Pt 2

Chapter 3: WLAN-GPRS Integration for Next-Generation Mobile Data Networks

Linux Network Security

GSM GPRS. Course requirements: Understanding Telecommunications book by Ericsson (Part D PLMN) + supporting material (= these slides)

Dimensioning and Deployment of GSM Networks

A Systemfor Scanning Traffic Detection in 3G WCDMA Network

1 Introduction. Agenda Item: Work Item:

FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others

Outsourcing and network sharing: key considerations to solve the backhaul challenge

CEH Version8 Course Outline

TS-3GB-S.R0103-0v1.0 Network Firewall Configuration and Control (NFCC) - Stage 1 Requirements

Firewalls. Ola Flygt Växjö University, Sweden Firewall Design Principles

6WRUP:DWFK. Policies for Dedicated SQL Servers Group

Intrusion Detection Systems (IDS)

Network Security: A Practical Approach. Jan L. Harrington

CRYPTUS DIPLOMA IN IT SECURITY

Intrusion Detection Systems and Supporting Tools. Ian Welch NWEN 405 Week 12

Network Defense Tools

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Intro to Firewalls. Summary

Potential Targets - Field Devices

Banking Security using Honeypot

The HoneyNet Project Scan Of The Month Scan 27

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities

8 steps to protect your Cisco router

PDF vytvořeno zkušební verzí pdffactory UMTS

HONEYD (OPEN SOURCE HONEYPOT SOFTWARE)

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

UMTS/GPRS system overview from an IP addressing perspective. David Kessens Jonne Soininen

Chapter 10 VoIP for the Non-All-IP Mobile Networks

Handoff in GSM/GPRS Cellular Systems. Avi Freedman Hexagon System Engineering

1G to 4G. Overview. Presentation By Rajeev Bansal Director(Mobile-1) Telecommunication Engineering Centre

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

HoneyBOT User Guide A Windows based honeypot solution

Advancement in Virtualization Based Intrusion Detection System in Cloud Environment

CYBERTRON NETWORK SOLUTIONS

SY system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

Eudemon1000E Series Firewall HUAWEI TECHNOLOGIES CO., LTD.

Securing Cisco Network Devices (SND)

CSCI 4250/6250 Fall 2015 Computer and Networks Security

Firewalls, Tunnels, and Network Intrusion Detection

Mobile & Wireless Networking. Lecture 5: Cellular Systems (UMTS / LTE) (1/2) [Schiller, Section 4.4]

Introduction of Intrusion Detection Systems

Secure Software Programming and Vulnerability Analysis

How To Protect Your Network From Attack From A Hacker On A University Server

Index. Common Packet Channel (CPCH) 25 Compression 265, , 288 header compression 284

1 Introduction. Agenda Item: Work Item:

Windows Remote Access

Internet Security and Acceleration Server 2000 with Service Pack 1 Audit. An analysis by Foundstone, Inc.

Computer Security: Principles and Practice

ANNEXURE TO TENDER NO. MRPU/IGCAR/COMP/5239

International Journal of Enterprise Computing and Business Systems ISSN (Online) :

MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN

IDS / IPS. James E. Thiel S.W.A.T.

Virtual Learning Tools in Cyber Security Education

Mobile Communications

CS 640 Introduction to Computer Networks. Network security (continued) Key Distribution a first step. Lecture24

2G/3G Mobile Communication Systems

Computer Security DD2395

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Norton Personal Firewall for Macintosh

How To Protect Your Firewall From Attack From A Malicious Computer Or Network Device

Project Proposal Active Honeypot Systems By William Kilgore University of Advancing Technology. Project Proposal 1

Security: Attack and Defense

How to build and use a Honeypot. Ralph Edward Sutton, Jr. DTEC 6873 Section 01

Development of a Network Intrusion Detection System

Why Leaks Matter. Leak Detection and Mitigation as a Critical Element of Network Assurance. A publication of Lumeta Corporation

Network Security. 1 Pass the course => Pass Written exam week 11 Pass Labs

PROFESSIONAL SECURITY SYSTEMS

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

Web Application Security

Deployment of Snort IDS in SIP based VoIP environments

Second-generation (GenII) honeypots

Security Event Management. February 7, 2007 (Revision 5)

WICKSoft Mobile Documents for the BlackBerry Security white paper mobile document access for the Enterprise

Firewalls and Intrusion Detection

Network Monitoring Tool to Identify Malware Infected Computers

Introducing IBM s Advanced Threat Protection Platform

OfficeScan 10 Enterprise Client Firewall Updated: March 9, 2010

Topics in Network Security

Certified Ethical Hacker Exam Version Comparison. Version Comparison

WLAN Attacks. Wireless LAN Attacks and Protection Tools. (Section 3 contd.) Traffic Analysis. Passive Attacks. War Driving. War Driving contd.

Firewalls. Chapter 3

Network Security and Firewall 1

Firewall Introduction Several Types of Firewall. Cisco PIX Firewall

LTE Overview October 6, 2011

Dynamic Honeypot Construction

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Dos & DDoS Attack Signatures (note supplied by Steve Tonkovich of CAPTUS NETWORKS)

Host/Platform Security. Module 11

Real-time Network Monitoring and Security Platform for Securing Next-Generation Network. Assoc. Prof. Dr. Sureswaran Ramadass

GTP Security in 3G Core Network

Course Title: Penetration Testing: Security Analysis

Mobile Office Security Requirements for the Mobile Office

Use of Honeypot and IP Tracing Mechanism for Prevention of DDOS Attack

Transcription:

Network Infrastructure Security in Cellular Data Networks: An Initial Investigation Kavita Barapatre, Nirlesh Koshta, Vishal Sharma IIT Bombay, Mumbai, India and Fabio Ricciato Forschungszentrum Telekommunikation Wien (FTW), Vienna, Austria Copyright 2005-06

Outline of the Talk Motivation why worry about infrastructure security? GSM /GPRS network architecture & critical interfaces Attacks exploiting security loopholes in GSM/GPRS Impact of unwanted traffic: viruses, worms, trojans, Testbed setup and testing scenarios Methodology: nature of tests possible, what else is needed Tools for investigating network security SANOG 7, Mumbai, India, 23-24 Jan. 2006 2

Outline of the Talk Motivation why worry about infrastructure security? GSM /GPRS network architecture & critical interfaces Attacks exploiting security loopholes in GSM/GPRS Impact of unwanted traffic: viruses, worms, trojans, Testbed setup and testing scenarios Methodology: nature of tests possible, what else is needed Tools for investigating network security SANOG 7, Mumbai, India, 23-24 Jan. 2006 3

Why Infrastructure Security? Network Security Information Security - Keeping user s info. protected - Subject of cryptography - Not subject of this talk Infrastructure Security - Sustaining ability of network elements to provide connectivity between communicating entities - Subject of this talk Cellular GSM/CDMA networks moving to an IP core Network increasingly open Control/data segregation inherently less stringent Increased threats! Exposure to wireline-like security risks SANOG 7, Mumbai, India, 23-24 Jan. 2006 4

Motivation (contd) Interplay of IP and complex structure of cellular networks Gives rise to subtle phenomena that may not be easily conceived Need to be found empirically via intelligent experimentation Provider infrastructure security becomes key, imperative to Investigate susceptibilities and risks Evaluate options, fixes, and solutions Propose techniques and tools for proactive/reactive action SANOG 7, Mumbai, India, 23-24 Jan. 2006 5

Outline of the Talk Motivation why worry about infrastructure security? GSM /GPRS network architecture & critical interfaces Attacks exploiting security loopholes in GSM/GPRS Impact of unwanted traffic: viruses, worms, trojans, Testbed setup and testing scenarios Methodology: nature of tests possible, what else is needed Tools for investigating network security SANOG 7, Mumbai, India, 23-24 Jan. 2006 6

GSM Network Architecture SANOG 7, Mumbai, India, 23-24 Jan. 2006 7

Vulnerabilities in GSM Flaws in authentication and encryption No subscriber auth. in initial part of mobile originated call Radio interface well protected, fixed infrastructure vulnerable Access to AuC allows attacker to obtain auth. key Encrypted MS BS traffic can be captured & deciphered GSM encryption has been broken! Large scale attacks can be launched with relatively small traffic vols. SANOG 7, Mumbai, India, 23-24 Jan. 2006 8

A Signaling Channel DoS Attack in GSM MS BSC BTS Air Interface Abis Interface A Intf. MSC Channel Request Channel Required RACH Channel Active AGCH Channel Active ACK SDCCH Immediate Assign Immediate Assign Command SDCCH Malicious MS now repeats exercise Signaling channels end up assigned & lockout genuine MSs SANOG 7, Mumbai, India, 23-24 Jan. 2006 9

GPRS Network Architecture SANOG 7, Mumbai, India, 23-24 Jan. 2006 10

Vulnerabilities and Criticalities in GPRS Critical Interfaces Gi: Exposed to Internet and corporate networks Gp: Primary interconnection pt. between operator s n/w and untrusted external n/ws Gc: Allows access (via HLR) to key user info. from remote network during roaming Vulnerable Interfaces Gi: Exposed to all threats from Internet: viruses, DoS, and malicious network traffic Gp: Connection hijacking, overbilling from a roaming network during handover Gn: Not encrypted by default SANOG 7, Mumbai, India, 23-24 Jan. 2006 11

A DCH Lockout Attack in GPRS T = DCH release/dynamic reassignment timeout GSM/GPRS RAN MS with open PDP context & IP address Small IP pkt. at rate R > 1/T External Agent DCH never released! With multiple DCHs occupied, logical radio resources wasted Congestion in cell Lockout of genuine MSs 2.5G/3G 2.5G/3G Provider s Provider s Core Core Network Network BG Internet UMTS RAN Other Other 2.5G/3G 2.5G/3G CN CN SANOG 7, Mumbai, India, 23-24 Jan. 2006 12

Impact of Unwanted Traffic: Viruses, worms, trojans, GSM/GPRS RAN - Attacker can be inside your n/w! - Consider effect of large infections! - Viruses/worms from Internet detected in 3G core networks External Agent Internet 2.5G/3G 2.5G/3G Provider s Provider s Core Core Network Network Gi Firewall Internet BG UMTS RAN Other Other 2.5G/3G 2.5G/3G CN CN SANOG 7, Mumbai, India, 23-24 Jan. 2006 13

Outline of the Talk Motivation why worry about infrastructure security? GSM /GPRS network architecture & critical interfaces Attacks exploiting security loopholes in GSM/GPRS Impact of unwanted traffic: viruses, worms, trojans, Testbed setup and testing scenarios Methodology: nature of tests possible, what else is needed Tools for investigating network security SANOG 7, Mumbai, India, 23-24 Jan. 2006 14

Experimental Test-bed Setup & Testing Scenarios Testing can be: Intra-provider Inter-provider (CDMA-GSM) Wireless-wireline SANOG 7, Mumbai, India, 23-24 Jan. 2006 15

Outline of the Talk Motivation why worry about infrastructure security? GSM /GPRS network architecture & critical interfaces Attacks exploiting security loopholes in GSM/GPRS Impact of unwanted traffic: viruses, worms, trojans, Testbed setup and testing scenarios Methodology: nature of tests possible, what else is needed Tools for investigating network security SANOG 7, Mumbai, India, 23-24 Jan. 2006 16

Testing Methodology Taxonomy of Tests Active Probing Direct malicious generated traffic to SP s network or to a remote m/c on network. E.g. SYN attack Tear-drop attack Smurf attack Exploit various types of commun. Port-to-port IP address spoofing Passive Listening Provoke remote attacker(s) to attack m/c under observation Invoke attacks, HoneyD as bait Run intrusion detection systems on attacked m/c Apply intelligent algorithms for proactive threat inference Infer network parameters: RTT, buffers SANOG 7, Mumbai, India, 23-24 Jan. 2006 17

Outline of the Talk Motivation why worry about infrastructure security? GSM /GPRS network architecture & critical interfaces Attacks exploiting security loopholes in GSM/GPRS Impact of unwanted traffic: viruses, worms, trojans, Testbed setup and testing scenarios Methodology: nature of tests possible, what else is needed Tools for investigating network security SANOG 7, Mumbai, India, 23-24 Jan. 2006 18

Network Security Investigation Investigative Tools Detect Exploit Analyze NMAP Honeyd Snort Netcat PackEth NTOP SANOG 7, Mumbai, India, 23-24 Jan. 2006 19

Tools for Detecting Vulnerabilities Network MAPper (NMAP) Determines running apps. on target m/c Identifies open ports, OS, firewalls used by remote host(s) Netcat Utility used to read/write across network connections using TCP/UDP protocol(s) Feature-rich, network debugging and exploration tool SANOG 7, Mumbai, India, 23-24 Jan. 2006 20

Tools for Exploiting Vulnerabilities HoneyD: Creates virtual machines (VMs) VMs have unique IP addresses Lure attackers to themselves Can be Windows or Linux 10.129.22.16 Honeyd daemon PackETH Packet generator Generates packets of any protocol - ARP, TCP, UDP,... User configurable pkt. profiles 10.129.22.1 Honeypot on Windows 10.129.22.2 Honeypot on Linux 1 Internet 10.129.22.3 Honeypot on Solaris Attacker SANOG 7, Mumbai, India, 23-24 Jan. 2006 21

Tools for Analyzing Vulnerabilities Snort Real-time traffic analysis & packet logging Usable in multiple modes: Packet sniffer Data logger Intrusion detection Generates variety of alerts usable for proactive detection NTOP Traffic usage monitor & packet analyzer Supports mgt. activities: planning, opt., detection Tracks ongoing attacks, generates alarms SANOG 7, Mumbai, India, 23-24 Jan. 2006 22

NTOP at Work Packet size distribution Traffic breakdown by hosts seen TCP/UDP distribution by major protocols SANOG 7, Mumbai, India, 23-24 Jan. 2006 23

NMAP and Snort Working in Conjunction Attacking m/c: scans using NMAP Exposed m/c: performs analysis via Snort SANOG 7, Mumbai, India, 23-24 Jan. 2006 24

What More is Needed Radio Access Network (RAN) Core Network (CN) BTS BSS BSC Gb CS-CN PS-CN Information Servers Application Servers & Proxies SGSN GGSN GSM/GPRS RAN BTS RNS RNC IuPS Gn Gi Internet BG UTRAN Monitoring points PS-CN of other carrier SANOG 7, Mumbai, India, 23-24 Jan. 2006 25 Gp

Summary Cellular infrastructure security critically important in future Analyzed GSM /GPRS from a vulnerability standpoint Highlighted key aspects, such as Critical interfaces Sample attacks Effects of unwanted traffic! Presented our testbed setup and testing scenarios Focused on nature and types of test portfolio Reviewed tools and techniques to assess security SANOG 7, Mumbai, India, 23-24 Jan. 2006 26

References and Glossary SANOG 7, Mumbai, India, 23-24 Jan. 2006 27