360 likes | 509 Views
SMS Attacks and Defenses. SMS. A major source of revenue for cellphone companies 0.10 per text message vs. fixed rate UK experiences 69 million messages per day Open functionality Cell phones Web interfaces Email Instant messaging. SMS/Cellular Network Overview. Submitting a message
E N D
SMS • A major source of revenue for cellphone companies • 0.10 per text message vs. fixed rate • UK experiences 69 million messages per day • Open functionality • Cell phones • Web interfaces • Email • Instant messaging
SMS/Cellular Network Overview • Submitting a message • Via another mobile device • Through External Short Messaging Entities (ESMEs) • Email, web portals, voice mail, paging systems, software applications • Short Messaging Service Center (SMSC) • Examine incoming packets • Covert into SMS message format if needed • Placed into SMSC queue for forwarding
SMS/Cellular Network Overview (Cont.) • Routing a message • SMSC query Home Location Register (HLR) database • If found, the response contains Mobile Switch Center (MSC) serving the destination. Otherwise, stores the msg for later delivery
SMS/Cellular Network Overview (Cont.) • Wireless Delivery • Control Channels (CCH) • Common CCH • Paging channel (PCH) • Random Access Channel (RACH) • Standalone Dedicated CCH (SDCCH): authentication, encryption, deliver TMSI, SMS message • Traffic Channels (TCH)
Vulnerability Analysis:Bottlenecks in Cellular Networks • Delivery discipline • Not publicly available • Use grey-box analysis to infer delivery disciplines • SMSC capacity • Sending 400 incoming messages one per 60 seconds to a power-off target device • AT&T: all 400 messages were delivered • Verizon: only the last 100 messages were delivered (FIFO) • Sprint: only the first 30 messages were delivered (LIFO) • Mobile device SMS capacity • Nokia 3560: 30 messages • LG 4400: 50 messages • Treo 650: 500 (because its battery depletes) • Due to this limit, a successful DoS attack should distribute over a number of subscribers
Vulnerability Analysis:Bottlenecks in Cellular Networks (Cont.) • Root causes of DoS attack • Inherent cost imbalance between injecting SMS message and delivering messages to mobiles • Imbalance between injection and service rate • Injection rate • SMS providers offer plans with 30-35 msgs/sec/SMPP connection • Much higher when sent over web portal • Service rate: • Measured send time 0.71 seconds • Measured inter-arrival time • 7-8 secs for Verizon and AT&T • A few seconds and up to a few minutes for Sprint • Imbalance in message sizes • 700 bytes are required to send a 160 byte SMS message • If including ACKs and required web page download, the upload size can be up to 1600 bytes • Web portals allow you to multicast msgs
DoS Attacks • Attacking metropolitan area service • Attacking regional service • Targeted attacks
Creating Hit List • Motivations • Send to every possible phone is not effective • Many msgs. sent to dark address space is a strong indicator that attack is in progress • Goal: identify a list of phone numbers and their service providers
Creating Hit List • Web search of NPA/NXX • Responses contain the name of the service provider administering NPA/NXX domain, location, and the subdivision • E.g., 814-876-XXXX is owned by AT&T wireless in the greater State College • Does not reveal which phone numbers within NPA/NXX are activated • Web scraping • Using search engines and scripting tools to crawl web for phone numbers • They collected 865 unique numbers through this way • Web interface interaction • Send SMS via Web interface and watch for positive/negative ACKs • Positive acks indicates a hit • Negative ACKs: try another service provider web sites
Attacking Metropolitan Area Service • Observation • Traffic channel (TCH): SMS and voice traffic do not compete against each other • Control channel (CCH): voice and SMS share • Attacks: • Send lots of SMS to saturate control channel (e.g., paging channel, random access channel or SDCCH)
Attacking Regional Service • Speeding up SMS delivery • Offload SMS traffic from SS7 onto IP • New SMS: all aspects of processing speeds up, except SDCCH bottleneck • An attack requires 3.8 Gbps and a nation-wide hit-list to DoS nation-wide cellular networks • Only 370 Mbps if it can include ten different recipients on a single SMS
Targeted Attacks • Postal mail • In 2002, anonymous individuals inundated spammer Alan Ralsky with thousands of mail-order catalogs on a daily basis DoS • Same attack can be applied to SMS • Attacker wishes to stop a victim from receiving useful messages • A stock trader may want to delay/drop updates received by competitors • Flood the specified user with superfluous messages • Buffer overflows and msg loss • Delay msg delivery than its shelf-life • Deplete battery • The user cannot notice message due to overwhelming meaningless msgs • Most mobile phones hold up to 50 messages, and the remaining msgs are buffered at provider’s network up to a certain limit • When the buffer is full, any messages with content assumed to be known (outbox and read mssage in inbox) were automatically deleted (e.g., Nokia 3560) • Use of “Clear Inbox” function increases possiblity of a user accidentally deleting a legitimate text message arriving among the attack messages
Other Attacks • Spam • Viruses
Solutions • Rate limiting • Per source volume restriction at SMS gateway • Ineffective • Spoofing IP address • Existence of zombie networks make rate limiting not useful • Separation of voice and data • SMS sent from mobile receive higher priority than those sent from Internet • Resource provisioning • Weighted fair queueing • Weighted random early detection • Strict/dynamic resource provisioning • Direct channel allocation • Education
Smartphone Attacks • Over 100 mobile threats during 2004-05 • Major target: Symbian • Skulls • Disable functionalities, like SMS and MMS messaging, web browsing, built-in camera • Cabir • Worm using bluetooth to copy itself onto devices up to 30 feet • Cardtrap • Disable system applications and copies windows worms to the phone memory card • Locknut • Drops a binary that crash a critical system component, which results in locking the phone • Doomboot • Cannot start after the phone is rebooted • Check out http://www.f-secure.com/wireless/threats/
Challenges of Securing Smartphone • Open OS • Increasing # smartphones • In the near future, smartphones >> PCs • General user population • Phones are mobile increases infection rate • How to infect phones?
Challenges of Securing Smartphone • Open OS • Increasing # smartphones • In the near future, smartphones >> PCs • General user population • Phones are mobile increases infection rate • Multiple ways to infect phones • Synchronization • Removable memory cards • Bluetooth and infrared connections • WiFi • Cellular networks
Possible smart-phone attacks • DoS to base stations • DDoS to call centers and switches • Remote wiretapping • Phone blocking • SMS spamming • Identity theft and spoofing • Physical attack • National Crisis
Defenses • Internet side protection • NIDS, Firewalls, Patching, Shielding, … • Enforced quarantining from base station • Make seamless handoff challenging • Difficult to change deployed 802.11 APs • Telecom side protection • Abnormal behavior detection • Reactions (Rate limiting, Call filtering, Blacklist) • Advantage to take: Behavior of telecom users is highly predictable and most of the reaction building blocks already exist • Smart-phone side protection • Feature reduction • E.g., turn off bluetooth when not active • OS hardening • E.g., always display callee number when making a phone call • Lighting up LCD display when dialing • Hardware hardening • SIM card to authenticate OS and applications • Cooperation among the three parties
Cooperation among the three parties • The cellular carriers enforce smart-phones patching and shielding, and OS authentication • When smart-phone attacks are detected from the Internet • The Internet can inform telecom to prepare in advance • When telecom detects smart-phone attacks • Inform Internet to reject zombies on the black list • Need to judge if a device is a smart-phone • IP address to SIM ID or telephone number mapping
Course Overview • Part I: Introduction to wireless networks • Physical layer • MAC • Introduction to MAC and IEEE 802.11 • Channel assignment and channel hopping • Power control • Rate control • Multi-radio • Routing • Mobile IP • DSR and AODV • TCP over wireless • Problems with TCP over wireless • Other proposals
Course Overview (Cont.) • Part II: Different types of wireless networks • Wireless LANs • Wireless mesh networks • Sensor networks • Cellular networks • Delay tolerant networks • Vehicular networks • Cognitive networks • Emergent networks
Course Overview (Cont.) • Part III: Wireless network management and security • Localization • Wireless network diagnosis • Wireless network security
Fundamental Principle 1 Interference-aware • Interference is shown to have significant impact on wireless network performance • Lots of wireless research centers around reducing interference • Measuring interference • Modeling interference • Mitigating interference • Interference cancellation • Power control • Channel assignment • Scheduling • Routing • Embracing interference
Fundamental Principle 2 Leverage diversity • Antenna diversity • MIMO, MUP, MRD, • Topology diversity • Power control, Channel assignment, SSCH • Path diversity • Routing metrics, opportunistic routing • Application diversity • Delay tolerant vs. delay in-tolerant
application transport network link physical Fundamental Principle 3 Cross layer optimization App TCP Routing MAC Channel Antenna Power
Fundamental Principle 4 • Integration with Internet • Wireless networks are not isolated wireless networks impact future Internet design • Past Internet: adapt wireless nodes to existing Internet architecture • Cannot handle mobility, intermittent connectivity, in-network processing, … • Future Internet: adapt Internet architecture to make wireless nodes first class citizens • billions of cell phones compared to 500 millions PCs • 5 – 10 billion sensors
Fundamental Principle 5 • Let real applications drive interesting research • Last-mile problem • Disaster recovery networks • Smartphones • Home networking • …