Toolkit for vulnerability assessment in 3G networks. Kameswari Kotapati The Pennsylvania State University University Park PA 16802



Similar documents
CAT A Practical Graph & SDL Based Toolkit for Vulnerability Assessment of 3G Networks

Wireless and Mobile Network Architecture

Mobile Wireless Overview

Global System for Mobile Communication Technology

Wireless and Mobile Network Architecture

Long-Term Evolution. Mobile Telecommunications Networks WMNet Lab

Chapter 10 VoIP for the Non-All-IP Mobile Networks

The 3GPP and 3GPP2 Movements Towards an All IP Mobile Network. 1 Introduction

1 Introduction. 2 Assumptions. Implementing roaming for OpenBTS

Cellular Technology Sections 6.4 & 6.7

TS-3GB-S.R0103-0v1.0 Network Firewall Configuration and Control (NFCC) - Stage 1 Requirements

TELECOMMUNICATIONS REGULATORY AUTHORITY BAHRAIN. Bahrain Number Portability Implementation Routing and Charging specification

Mobile Communications

Advanced SIP Series: SIP and 3GPP

GSM v. CDMA: Technical Comparison of M2M Technologies

Mobile Networking. SS7 Network Architecture. Purpose. Mobile Network Signaling

Advanced SIP Series: SIP and 3GPP Operations

ETSI TS V7.5.0 ( )

End-2-End QoS Provisioning in UMTS networks

Digital Communications Exploring SS7 signaling fraud that threatens mobile network security and subscriber privacy

Draft ETSI EN V7.1.0 ( )

Overview of Network Architecture Alternatives for 3GPP2 Femto Cells Jen M. Chen, et al. QUALCOMM Incorporated

GSM GSM TECHNICAL November 1996 SPECIFICATION Version 5.0.0

EAP-SIM Authentication using Interlink Networks RAD-Series RADIUS Server

Mobility Management Alternatives for Migration to Mobile Internet Session-Based Services

Realising the Virtual Home Environment (VHE) concept in ALL-IP UMTS networks

How To Connect Gsm To Ip On A Gsm Network On A Pnet On A Microsoft Cell Phone On A Pc Or Ip On An Ip Onc (Gsm) On A Network On An Iph (Gms) On An

All-IP Network Emergency Call Support

Mobility and cellular networks

Theory and Practice. IT-Security: GSM Location System Syslog XP 3.7. Mobile Communication. December 18, GSM Location System Syslog XP 3.

1G to 4G. Overview. Presentation By Rajeev Bansal Director(Mobile-1) Telecommunication Engineering Centre

The GSM and GPRS network T /301

Delivery of Voice and Text Messages over LTE

Mobile SCTP Transport Layer Mobility Management for the Internet

NGN Interconnection Standards & Protocols

Pronto Mobile Convergence Platform

CHANGE REQUEST CR xx

How To Understand The Gsm And Mts Mobile Network Evolution

ETSI TS V6.5.0 ( )

Lecture overview. History of cellular systems (1G) GSM introduction. Basic architecture of GSM system. Basic radio transmission parameters of GSM

3GPP TS V8.0.0 ( )

Cellular Networks: Background and Classical Vulnerabilities

Feature and Technical

Chapter 3: WLAN-GPRS Integration for Next-Generation Mobile Data Networks

Radio Access Network Traffic Generation for Mobile Switching Center

Locating Mobile Phones using Signalling System #7. Tobias Engel

Mobile Computing. Basic Call Calling terminal Network Called terminal 10/25/14. Public Switched Telephone Network - PSTN. CSE 40814/60814 Fall 2014

2 System introduction

Vulnerability Assessment of Wireless Network using Attack Graph

TORNADO Solution for Telecom Vertical

PARAMETERS TO BE MONITORED IN THE PROCESS OF OPERATION WHEN IMPLEMENTING NGN TECHNICAL MEANS IN PUBLIC TELECOMMUNICATION NETWORKS

OpenMTC. M2M Solutions for Smart Cities and the Internet of Things.

ALCATEL CRC Antwerpen Fr. Wellesplein 1 B-2018 Antwerpen +32/3/ ; Suresh.Leroy@alcatel.be +32/3/ ; Guy.Reyniers@alcatel.

GSM and IN Architecture

Mobile Application Part protocol implementation in OPNET

Information Services and Access Mechanism of Mobile Web for the Under-privileged

Evolution of GSM in to 2.5G and 3G

3GPP TR V3.1.0 ( )

SIP Roaming Server Product Overview. Mobile Convergence Technology

IP Telephony (Voice over IP)

Office Link System for FOMA Internal Line Connections

Benefits. Around-the-clock data collection and CDR warehousing ensures data is there when needed

Mobility Management 嚴 力 行 高 雄 大 學 資 工 系

Integrating Avaya Aura Presence Services with Microsoft OCS

Fixed versus Mobile Turning Convergence into Reality. Dieter Schuler, Wouter Franx Lucent Technologies

Convergent data center for future network

Efficient evolution to all-ip

of the existing VoLTE roaming and interconnection architecture. This article compares existing circuit-switched models with the earlier

INFORMATION SCIENCE. INFSCI 0010 INTRODUCTION TO INFORMATION SCIENCE 3 cr. INFSCI 0015 DATA STRUCTURES AND PROGRAMMING TECHNIQUES 3 cr.

An Oracle White Paper December The Value of Diameter Signaling in Security and Interworking Between 3G and LTE Networks

LTE Overview October 6, 2011

Chapter 10 Session Initiation Protocol. Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University

M E M O R A N D U M. Wireless Roaming Services for Emergency Medical Facilities

Global System for Mobile Communication (GSM)

This specification this document to get an official version of this User Network Interface Specification

Wireless Mobile Telephony

How To Understand The Performance Of A Cell Phone Network

Diameter in the Evolved Packet Core

VoIP in the Wireless World

How To Test The Performance Of A Gsm/ Network On A Cell Phone On A Pnet 2.5 (Gsm) On A Sim Sim (Gms) On An Ipn 2.2 (Ipnet) On The Ipnet

Mobile Office Security Requirements for the Mobile Office

WOICE: a Decentralized System for Ubiquitous VoIP Services

SIP: Ringing Timer Support for INVITE Client Transaction

METHODS OF INTEGRATING mvoip IN ADDITION TO A VoIP ENVIRONMENT

Network Access Security in Mobile 4G LTE. Huang Zheng Xiong Jiaxi An Sihua

Worldwide attacks on SS7 network

GSM services over wireless LAN

SIP Based Architecture for Integration of 1xRTT Femtocells

Service Continuity Path to smooth user experiences

White Paper. Interconnecting Networks with Dialogic s Global Multimedia Exchange Platform

CS Fallback Function for Combined LTE and 3G Circuit Switched Services

What is telecommunication? electronic communications? What is telephony?

Wireless Access of GSM

OFFICEED Service System

Ch GSM PENN. Magda El Zarki - Tcom Spring 98

Inter-Domain QoS Control Mechanism in IMS based Horizontal Converged Networks

Contents Introduction Why Fax over IP? How Real-time Fax over IP works Implementation with MessagePlus/Open Summary. About this document

CS Cellular and Mobile Network Security: GSM - In Detail

VOICE SERVICES FOR PSTN AND IP NETWORKS

Transcription:

Toolkit for vulnerability assessment in 3G networks Kameswari Kotapati The Pennsylvania State University University Park PA 16802

Contents Motivation Solution Overview Methodology Overview 3G Attack Graph Attack Scenario SDL Toolkit Architecture Algorithms Attack Categories Sample results Issues and Future Work

Research Area 3G Network Vulnerability Assessment

Motivation

Previously telecom network (2G, 3G) signaling and control (SS7) is closed, future networks are not Trend Telecom networks are moving toward IP for control and services Open interfaces for service introduction Interworking between networks required Open interfaces CROSS-NETWORK SERVICES CROSS-INSFRASTRUCTURE CYBER ATTACKS INCREASED VULNERABILITY of 3G data and 3G servers Interworking Architecture Increased Vulnerability

Evolution of Wireless Networks Home Location Registers Mobile Switching Centers 2G Cellular Closed Network Attacks are possible, but rare Network are now opening up Closed Control Network (SS7) Home Subscriber Servers Internet Telephony Servers Usage of IP opens up possible attacks Services still somewhat limited 3G Cellular/All-IP IP Network Media Gateways 2G Cellular Next Generation IP Services Servers 3G Cellular/ All-IP Two new dangers: Very open environment Passage into SS7 network

Realistic Future Network Environment CDMA2000 3G-IP UMTS BS Circuit Access MSC/VLR ANSI-41 Core HLR IP Access BS Circuit UMTS Core Access MSC/VLR BS IP Access HLR SIP Server Services in all-ip domain IP Core SIP Server UMTS-IP BS BS IP Access SIP Server WI-FI/802.16 Interworking between networks

Cross Infrastructure Cyber Attacks Cross Infrastructure Cyber Attacks may be defined as attacks on the wireless telecommunication network from the IP domain. Cascading effect may be defined as propagation of the attack across network elements 3G Network 3G Entity Attack Entry Point Server IP Network Attack Server Attack

Motivation Open Interfaces Increased Usage Heavy Reliance 3G Networks = Attractive targets Need : 3G Network Vulnerability Assessment Techniques

Solution Overview Cellular Network Vulnerability Assessment Toolkit (CAT)

Why not pre-existing tools? They find physical configuration vulnerabilities But Every 3G deployment has different physical configuration. Does not identify cascading effects. Lacks end-to-end vulnerability assessment across network components.

Why not Manual vulnerability Assessment? Complexity of 3G Network Each service comprises of 100 s of servers. Each server comprises of millions of state machines. Hence not feasible Gateway MSC/ VLR GMSC HLR Effect Effect App Server 3G Network IP Network Effect Application Attack

Cellular Network Vulnerability Assessment Toolkit - CAT Goal: Generate attack graphs that capture attack propagation in 3G networks Output attack graph: progression across network traces seed propagation through the network and impact on services User Input: 3G data parameters seeds: data that is corrupted by an attacker goals: data that is derived incorrectly System input Freely available 3GPP Technical telecommunication specification written in Specification and Description Language (SDL) (http://www.3gpp.org)

Methodology

Specification and Description Language (SDL)

Graphical language Developed by the International Telecommunication Union (ITU). Designated as the formal description language for specifying the functional behavior of telecommunication systems by major standards bodies. Object-oriented. Specification of event-driven, real-time, concurrent distributed systems interacting with discrete signals. SDL specifications do not indicate an implementation structure.

SDL Idle 1.State Name 2.Input Signal Name 3.Transition Action 4.Output Signal Name Provide Roaming Number Convert CSBC to basic service IMSI known in VLR Allocate MSRN Store compatibility Information Store Alerting Pattern Create IMSI Record Allocate LMSI 5.State Name Provide Roaming Number ACK Fig a: SDL Graphical Representative Syntax 6. Waiting For Roaming # Fig b: SDL Fragment of Process Provide Roaming Number in VLR

Attack Scenario

Call delivery Service GMSC HLR VLR MSC 1.Initial Address Message (IAM) 2.Send Rout Info (SRI) 3. Provide Roam Num (PRN) Air Interface 5. Send Rout Info Ack (SRI_ACK) 4.Provide Roam Num Ack (PRN_ACK) 6.Initial Address Message (IAM) 7.SIFIC 8.Page MS 9. Page Home Network Visiting Network

Telecom Database

Architecture of CAT User Input GUI Attack Graph Output Seeds Goal Analysis Engine Explore Using CAT - Forward -Mid-Point Integrated Data Structure Maximum View Output Telecommunication Specifications SDL Database Final View Prune a. Overall Architecture of CAT b. Functional Architecture

3G Attack Graph Nodes Condition Action Goal Edges Network Transitions Adversary Transitions Tree Number Represents tree to which node belongs. Nodes at a level with same tree number represent AND nodes.

Algorithms

Algorithm Principles Condition nodes may be constructed if the seed occurs in the message or actions. When the seed occur in incoming messages and corresponding 3G servers = corruption spreads from the message to the block When a seed occur in a 3G server with other seeds/goal = corruption spreads from the seed to other seeds/goal When the corrupt seed occurs in a 3G server and outgoing message = corruption spreads from the block to other block

Sample result: Speech attack

Attack Classification 1-Level Indirect attacks: corruption of Seed1 leads to corruption of the goal hence reaching the goal. (Seed 1 Goal) N-level indirect attacks: Given any k seeds Seed 1, Seed 2,..., Seed k and Goal, corruption of Seed 1 leads to corruption of some seed Seed i and so on until the Goal is corrupt. (Seed 1 Seed i Seed j Seed n Goal) Collaborative attack: a single seed cannot reach the Goal but the corruption of multiple seeds allows for reaching of the Goal i.e. Seed1 & Seed2 Goal

Issues with SDL Data links in messages SDL may not explicitly show data relations in request/response pairs Data dependencies in actions Details (input data output data) of subroutines may not be specified Relation between input and output data items may not be specified.

Future work SDL will be augmented with expert input to capture missing details. The process of deriving attack scenarios from attack graphs may be automated using expert systems, AI algorithms and expert systems.