OS Fingerprinting and Tethering Detection in Mobile Networks

Slides:



Advertisements
Similar presentations
Overview The TCP/IP Stack. The Link Layer (L2). The Network Layer (L3). The Transport Layer (L4). Port scanning & OS/App detection techniques. Evasion.
Advertisements

© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 OSI Transport Layer Network Fundamentals – Chapter 4.
Fundamentals of Computer Networks ECE 478/578 Lecture #20: Transmission Control Protocol Instructor: Loukas Lazos Dept of Electrical and Computer Engineering.
1 Reading Log Files. 2 Segment Format
Module A.  This is a module that some teachers will cover while others will not  This module is a refresher on networking concepts, which are important.
A Framework for Classifying Denial of Service Attacks Alefiya Hussain, John Heidemann and Christos Papadopoulos presented by Nahur Fonseca NRG, June, 22.
1 CCNA 2 v3.1 Module Intermediate TCP/IP CCNA 2 Module 10.
TCP. Learning objectives Reliable Transport in TCP TCP flow and Congestion Control.
Transport Layer TCP and UDP IS250 Spring 2010
Gursharan Singh Tatla Transport Layer 16-May
Port Knocking Software Project Presentation Paper Study – Part 1 Group member: Liew Jiun Hau ( ) Lee Shirly ( ) Ong Ivy ( )
1 Lab 3 Transport Layer T.A. Youngjoo Han. 2 Transport Layer  Providing logical communication b/w application processes running on different hosts 
Identification of Mobile Devices from Network Traffic Measurements - a HTTP User Agent Method Master’s Thesis August 2 8, 2012 Supervisor – Prof. Heikki.
Differences between In- and Outbound Internet Backbone Traffic Wolfgang John and Sven Tafvelin Dept. of Computer Science and Engineering Chalmers University.
Firewalls. Evil Hackers FirewallYour network Firewalls mitigate risk Block many threats They have vulnerabilities.
1 Semester 2 Module 10 Intermediate TCP/IP Yuda college of business James Chen
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
CIS 450 – Network Security Chapter 3 – Information Gathering.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Event Detection using Customer Care Calls 04/17/2013 IEEE INFOCOM 2013 Yi-Chao Chen 1, Gene Moo Lee 1, Nick Duffield 2, Lili Qiu 1, Jia Wang 2 The University.
Transmission Control Protocol TCP. Transport layer function.
MonNet – a project for network and traffic monitoring Detection of malicious Traffic on Backbone Links via Packet Header Analysis Wolfgang John and Tomas.
1 Impact of IT Monoculture on Behavioral End Host Intrusion Detection Dhiman Barman, UC Riverside/Juniper Jaideep Chandrashekar, Intel Research Nina Taft,
Firewall Fingerprinting Amir R. Khakpour 1, Joshua W. Hulst 1, Zhihui Ge 2, Alex X. Liu 1, Dan Pei 2, Jia Wang 2 1 Michigan State University 2 AT&T Labs.
Remote Physical Device Fingerprinting Authors: Tadayoshi Kohno, Andre Broido, KC Claffy Presented: IEEE Symposium on Security and Privacy, 2005 Kishore.
Lecture 22 Network Security CS 450/650 Fundamentals of Integrated Computer Security Slides are modified from Hesham El-Rewini.
User Fingerprinting Jeffrey Pang 1 Ben Greenstein 2 Ramakrishna Gummadi 3 Srinivasan Seshan 1 David Wetherall 2,4 Presenter: Nan Jiang Most Slides:
Network Layer4-1 The Internet Network layer forwarding table Host, router network layer functions: Routing protocols path selection RIP, OSPF, BGP IP protocol.
Automating Analysis of Large-Scale Botnet Probing Events Zhichun Li, Anup Goyal, Yan Chen and Vern Paxson* Lab for Internet and Security Technology (LIST)
A Framework for Classifying Denial of Service Attacks Alefiya Hussain, John Heidemann, Christos Papadopoulos Reviewed by Dave Lim.
Understanding the network level behavior of spammers Published by :Anirudh Ramachandran, Nick Feamster Published in :ACMSIGCOMM 2006 Presented by: Bharat.
Networking Basics CCNA 1 Chapter 11.
The Devil and Packet Trace Anonymization Authors: Ruoming Pang, Mark Allman, Vern Paxson and Jason Lee Published: ACM SIGCOMM Computer Communication Review,
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
1 Version 3.1 Module 10 Intermediate TCP/IP (Layer 4)
© 2002, Cisco Systems, Inc. All rights reserved..
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
Cisco I Introduction to Networks Semester 1 Chapter 7 JEOPADY.
11 CS716 Advanced Computer Networks By Dr. Amir Qayyum.
AntMonitor: A System for Monitoring from Mobile Devices
Re-evaluating the WPA2 Security Protocol
Port Scanning James Tate II
Introduction to TCP/IP networking
CSE 4905 IPsec.
The Devil and Packet Trace Anonymization
IT443 – Network Security Administration Instructor: Bo Sheng
Kiyoshi Kodama, SE Japan 07-Oct-2008
Event Detection using Customer Care Calls
Multipath QUIC: Design and Evaluation
Security in Networking
IS3440 Linux Security Unit 6 Using Layered Security for Access Control
TASK 4 Guideline.
De-anonymizing the Internet Using Unreliable IDs By Yinglian Xie, Fang Yu, and Martín Abadi Presented by Peng Cheng 03/22/2017.
Chapter 4.
6. Operating Systems Finger printing & Scanning
* Essential Network Security Book Slides.
Monkey See, Monkey Do A Tool for TCP Tracing and Replaying
Goals Introduce the Windows Server 2003 family of operating systems
Wide Area Networks and Internet CT1403
SPEAKER: Yu-Shan Chou ADVISOR: DR. Kai-Wei Ke
Net 323 D: Networks Protocols
Memento: Making Sliding Windows Efficient for Heavy Hitters
Identifying Slow HTTP DoS/DDoS Attacks against Web Servers DEPARTMENT ANDDepartment of Computer Science & Information SPECIALIZATIONTechnology, University.
ITECH1102 Networking and Security
Wireless Spoofing Attacks on Mobile Devices
NET 323D: Networks Protocols
Unconstrained Endpoint Profiling (Googling the Internet)‏
EVAPI - Enumeration Auburn Hacking club
Modeling and Evaluating Variable Bit rate Video Steaming for ax
Presentation transcript:

OS Fingerprinting and Tethering Detection in Mobile Networks Yi-Chao Chen The University of Texas at Austin Joint work: Yong Liao‡, Mario Baldi‡, Sung-Ju Lee‡, Lili Qiu† Narus Inc. ‡, The University of Texas at Austin† IMC 2014

Mobile OS Fingerprinting Problem statement Infer what operating system a device is running by analyzing the packets it’s generating. Tethering detection: identify mobile devices which are sharing the Internet access ? The number of mobile devices will exceed the world’s population by 2015. mobile data traffic last year was nearly 18 times the size of the entire global Internet in 2000 ? ?

Importance Tethering detection Security Billing for shared access in mobile networks Security Policy enforcement in enterprise networks Tethering: tethering allows sharing the Internet connection of the phone or tablet with other devices such as laptops. At&t policy for tethering Knowing OS can launch attack – known security hole in iOS SSH Allow malicious to access your phone IMC 2014

Existing Works Application Transport Network Link HTTP user agent [P0f], DHCP options [Satori] Application TCP handshake, timeout, MTU, flags, init seq. number [P0f, NMap, VEYSET02, PAM04, RAID03], TCP Timestamp [INFOCOM99, IMW02] Transport IP TTL, ID, dest address [P0f, PAM04] Network 802.11 MAC fields, SSID, frame size [MOBICOM07] Link Well known tool P0f: dynamics in TCP handshake and IP flags usage Some other finds maximal transmission unit in TCP syn packet are different across OSes IMC 2014

Limitation of Existing Works Existing works focus on the Internet traffic Mobile networks impose new challenges: Dynamic frequency due to power saving Clock skew, boot time estimation, … Short connections TCP flavors, initial sequence number, … Features might have changed in mobile OSes TCP MTU, IP flags, … Clock frequency has been successfully and widely adopted in identifying NAT hosts, routes, … but not in mobile networks due to dynamic frequency clock skew, one of the prominent metrics used for device finger printing identified in the previous works doesn't work well for mobile devices. IMC 2014

Approach Identify features to fingerprint mobile device OSes Detect tethering Clock frequency stability, boot time estimation IP Time-to-Live, ID Monotonicity TCP timestamp option, window size scale option, timestamp monotonicity Combine multiple features Quantify the performance Individual and combined features OS fingerprinting and tethering detection All identify useful Which are new Which are changed (how) IMC 2014

Dataset Lab trace 56 mobile user traces 14 Android phones and tablets traces Samsung Galaxy S5, HTC Ones, HTC Inspire phones, Google Nexus 10 tablet 10 iOS traces iPhone 4s, iPhone5s, iPad 2, iPod Touch iOS 5.1.1, iOS 6.1 32 Windows laptops traces running Windows XP or Windows 7 Each capture lasts 10~30 minutes IMC 2014

Other Datasets Trace Time Duration # IPs Lab Trace SIGCOMM08 Trace Oct. 2013 2 hours 56 SIGCOMM08 Trace Aug. 2008 1 day 223 OSDI06 trace Nov. 2006 292 IMC 2014

High clock frequency std. suggests iOS Features Clock Frequency The frequency is stable in Android and Windows, but vary over time in iOS devices High clock frequency std. suggests iOS See this figure, it’s reasonable to …

low violation ratio suggests Windows. Features IP ID Monotonicity iOS: randomize the IP ID of each packet Android: Some devices completely randomize the IP IDs Some periodically reset to random values. Windows: IP ID consistently increase monotonically High violation ratio suggests iOS; low violation ratio suggests Windows. The identification field in the IP header is primarily used in IP de-fragmentation.

Low ratio of TCP TS option suggests Windows. Features TCP Timestamp Option iOS and Android have TCP TS Option, but Windows doesn’t Low ratio of TCP TS option suggests Windows. The TCP timestamp option is used for measuring round trip time and protecting against wrapped sequence numbers.

Features IP Time-To-Live TCP Window Size Scale Option Boot time estimation Refer to the paper for details IMC 2014

Combining Features No single feature works in all scenarios Naïve Bayes classifier Probability of being OSx Why independent it still works, we can remove the assumption if we have larger dataset Probability of finding feature fi in OSx’s traffic Probability of finding feature fi in all traffic IMC 2014

Tethering Detection Apply the same technique for tethering detection. Features which identify mobile devices IP Time-To-Live TCP timestamp monotonicity Clock frequency Boot time estimation Multiple OSes IMC 2014

Evaluation – Single Feature No single feature identifies all OSes accurately. Precision: the fraction of identified OS are correct Recall: the fraction of the OS that are correctly identified

Evaluation – Combing Features Combining all features yields the best result.

Evaluation – Tethering Detection Combining all features also yields the best result in tethering detection.

Conclusion Contributions Evaluate the individual and combined features Identify new features for mobile OS fingerprinting and tethering detection Develop a probabilistic scheme that combines multiple features Evaluate the individual and combined features Combing multiple features yields the best performance OS fingerprinting: 100% precision, 80% recall Tethering detection: 79%-89% recall when targeting 80% precision Through our preliminary result, This is an initial study, we There are still tasks remains .. IMC 2014

Thank You! yichao@cs.utexas.edu IMC 2014

Backup Slides IMC 2014

Mobile OS Fingerprinting The number of mobile devices will exceed the world’s population by 2014. mobile data traffic last year was nearly 18 times the size of the entire global Internet in 2000 IMC 2014

Features IP Time-To-Live (TTL) Windows: 64 or 128 iOS and Android: 64

Features TCP Window Size Scale Option iOS: 16 Windows and Android: 2, 4, 64, or 256 This option allows TCP client and server to negotiate and use a larger window size

Evaluation – Comparing Classifiers Probability based classifier outperforms other classifiers by 5~21% in F1-score measurement.