330 likes | 490 Views
The 8th FTRA International Conference on Secure and Trust Computing, data management, and Applications ( STA 2011 ). A Framework for Detecting Malformed SMS Attack. Outline. Introduction Malformed message detection framework Evaluation and experimental results Conclusion . Introduction
E N D
The 8th FTRA International Conference on Secure and Trust Computing, data management, and Applications ( STA 2011) A Framework for Detecting Malformed SMS Attack
Outline • Introduction • Malformed message detection framework • Evaluation and experimental results • Conclusion
Introduction • Malformed message detection framework • Evaluation and experimental results • Conclusion
SMS Deliver Process BSC: Base Station Controller IWMSC: Interworking MSC GMSC: Gateway MSC MSC: Mobile Switch Center SMS_SUBMIT SMS_DELIVER
Short Message Service ( SMS ) • A message sent to and from a mobile phone are first sent to an intermediate component called the Short Message Service Center (SMSC) • The SMS message exists in 2 formats • SMS_SUBMIT: mobile phone to SMSC • SMS_DELIVER: SMSC to mobile phone
GSMModem • The SMS received on a mobile phone is handled through the GSMmodem • Provides an interface withthe GSM network and the application processor of a smart phone • Controlled through standardized AT commands Responsible for the communication between application processor and the modem Apps Telephony Stack AT commands AT Result Codes Responsible for cellular communications Modem
Example: SMS_DELIVER ///ATResult Code + the length of SMS Complete SMS string in hex.
Malformed SMS attack • Cause the application processor to reach an undefined state • Significant processing delays • Unauthorized access • Denying legitimate users access • … Apps Telephony Stack However, malformed message detection in mobile phones has received little attention Modem
In this Paper… • A malformed message detection framework was proposed • Automatically extracts novel syntactical features to detect a malformed SMS at the access layer of mobile phones
Introduction • Malformed message detection framework • Evaluation and experimental results • Conclusion
Common Idea • Anomalies are deviations from a learnt normal model [Patrick Dssel, et al.] • Learning→Normal model→Anomaly detection • Supported by our pilot studies • The distance values of malformed messages are normally greater than those of benign messages
SMS Detection Framework Message Analyzer Classification Feature Extraction Feature Selection
Message Analyzer • Message dissection • Transform incoming SMS messages into a format from which we can extract intelligent features • Extracts the complete SMS message string i.e. the second line of AT Result code Feature Extraction Feature Selection Classification Message Analyzer
Extraction of String Features • Mine features from an incoming SMS message • Exploit the properties of a suffix tree • Use a set of attribute stringsto model the content of the incoming message • Entrenching function : Extracts the ( attribute, value ) pair from the suffix tree • attribute: a feature string a • value: the frequency of a from the nodes of the suffix tree • Example Message Analyzer Feature Extraction Feature Selection Classification
Raw Model Vectors • For the purpose of training, we prepared a training data set 𝛫: • Set of messages used for training, 𝛫={ m1,…,mk} • After each mipasses through the entrenching function, we have ourraw model Message Analyzer Feature Extraction Feature Selection Classification
Feature Selection • The high dimensionality of the raw model will result in large processing overheads • Remove redundant features having low classification potential • Not at the cost of a high false alarm rate Message Analyzer Feature Selection Feature Extraction Classification
Selection Techniques • Use 3 selection mechanisms to obtain 3 distinct model set of attributes • Information Gain (IG) • Gain Ratio (GR) • Chi Squared (CH) Message Analyzer Feature Selection Feature Extraction Classification
Distance/Divergence • For a given vector of pairs, compute the deviation ( message score, distance ) of the vector • Use 2 well-known distance measures to obtain the score • Manhattan distance (md) • Itakura-Saito Divergence (isd) Message Analyzer Feature Extraction Feature Selection Classification
Classification • Threshold value • The largest distance score of a message in the training model • Raise an alarm • If the distance score of an incoming SMS is greater than the threshold value Message Analyzer Feature Extraction Feature Selection Classification
Review Training is only required in the beginning threshold message score
Introduction • Malformed message detection framework • Evaluation and experimental results • Conclusion
Evaluation • Collect real world dataset of SMS message • ≥ 5000 benign datasets • Developed modem terminal interface to collect more than 5000 real world benign SMS dataset • ≥ 5000 malformed datasets • SMS injection framework ( Mulliner, C., et al., 2009)
Experimental Goal • To select the best feature selection technique and distance measure • 3 feature selection modules • Information Gain (IG) • Gain Ratio (GR) • Chi-squared (CH) • 2 distance measures • Manhattan distance (md) • Itakura-Saito Divergence (isd)
Parameters and Definitions • Used 4 parameters to define the detection accuracy and the false alarm rate • True Positive (TP), False Positive (FP), False Negative (FN), True Negative (TN) • Detection Rate • False Alarm Rate
Results: Receiver Operating Characteristic Curves ROC using Manhattan Distance ROC using Itakura-Saito Divergence
Results: Overheads • Training and Threshold calculation overheads in ( ms/100 SMS ) • Testing overheads in ( ms/1 SMS ) using Information Gain, Gain Ratio and Chisquared for Manhattan distance and Itakura-Saito Divergence Provides the best performance Average training time = 3.5s/100SMS Average detection time of a malformed message = 10ms
Introduction • Malformed message detection framework • Evaluation and experimental results • Conclusion
Conclusion • A real time malformed message detection framework • Tested on real datasets of SMS messages • Successfully detects malformed messages with a detection accuracy of more than 98% • The future research will focus on further optimizing and deploying it on real world mobile devices and smart phones
Example of a Suffix Tree • Extract feature strings from an incoming message m=0110223 • The set of attribute strings is thus generated Message Analyzer Feature Extraction Feature Selection Classification
Example of Entrenching Function • Message m=0110223 • Set of attribute: • {3, 0, 1, 2, 23, 223, 110223, 10223, 0223, 0110223} • Vector of pairs • =(3, 1), (0, 2), (1, 2), (2, 2), (23, 1), (223, 1)… Message Analyzer Feature Extraction Feature Selection Classification
The RIL in the context of Android's Telephony system architecture [ref]