MOBILE DATA CHARGING: NEW ATTACKS AND COUNTERMEASURES Chunyi Peng,

Slides:



Advertisements
Similar presentations
1. XP 2 * The Web is a collection of files that reside on computers, called Web servers. * Web servers are connected to each other through the Internet.
Advertisements

Module X Session Hijacking
Advanced Piloting Cruise Plot.
Network Monitoring System In CSTNET Long Chun China Science & Technology Network.
Security Issues In Mobile IP
Copyright (c) 2002 Japan Network Information Center Introduction of JPNICs New Registry System Izumi Okutani IP Address Section Japan Network Information.
New Packet Sampling Technique for Robust Flow Measurements Shigeo Shioda Department of Architecture and Urban Science Graduate School of Engineering, Chiba.
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Fred P. Baker CCIE, CCIP(security), CCSA, MCSE+I, MCSE(2000)
Can We Pay for What We Get in 3G Data Access? ACM MOBICOM 2012 Istanbul, Turkey Chunyi Peng, Guan-Hua Tu, Chi-Yu Li, Songwu Lu University of California,
Protocol layers and Wireshark Rahul Hiran TDTS11:Computer Networks and Internet Protocols 1 Note: T he slides are adapted and modified based on slides.
© 2009 Carnegie Mellon University IP Dossier Paul N. Krystosek, Ph.D. CERT/NetSA January 2008.
Zhiyun Qian, Z. Morley Mao (University of Michigan)
ABC Technology Project
Taming User-Generated Content in Mobile Networks via Drop Zones Ionut Trestian Supranamaya Ranjan Aleksandar Kuzmanovic Antonio Nucci Northwestern University.
Implementing Cognos Mobile
© 2005 AT&T, All Rights Reserved. 11 July 2005 AT&T Enhanced VPN Services Performance Reporting and Web Tools Presenter : Sam Levine x111.
Countering DoS Attacks with Stateless Multipath Overlays Presented by Yan Zhang.
Johan Garcia Karlstads Universitet Datavetenskap 1 Datakommunikation II Signaling/Voice over IP / SIP Based on material from Henning Schulzrinne, Columbia.
25 July, 2014 Hailiang Mei, TU/e Computer Science, System Architecture and Networking 1 Hailiang Mei Security and Privacy Concern.
VOORBLAD.
1 Network Address Translation (NAT) Relates to Lab 7. Module about private networks and NAT.
Defending Against Denial of Service Attacks Presented By: Jordan Deveroux 1.
© 2012 National Heart Foundation of Australia. Slide 2.
Network Fundamentals – Chapter 4 Sandra Coleman, CCNA, CCAI
25 seconds left…...
XP New Perspectives on Browser and Basics Tutorial 1 1 Browser and Basics Tutorial 1.
Slippery Slope
Services Course Windows Live SkyDrive Participant Guide.
What’s New in WatchGuard Dimension v1.2
We will resume in: 25 Minutes.
VPN AND REMOTE ACCESS Mohammad S. Hasan 1 VPN and Remote Access.
Xiao Zhang and Wenliang Du Dept. of Electrical Engineering & Computer Science Syracuse University.
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Security in VoIP Networks Juan C Pelaez Florida Atlantic University Security in VoIP Networks Juan C Pelaez Florida Atlantic University.
FIREWALLS Chapter 11.
1 Topic 2 – Lesson 4 Packet Filtering Part I. 2 Basic Questions What is packet filtering? What is packet filtering? What elements are inside an IP header?
Firewalls and Intrusion Detection Systems
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Guide to Computer Network Security
1 Lecture 20: Firewalls motivation ingredients –packet filters –application gateways –bastion hosts and DMZ example firewall design using firewalls – virtual.
1 Enabling Secure Internet Access with ISA Server.
1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and.
Firewalls CS432. Overview  What are firewalls?  Types of firewalls Packet filtering firewalls Packet filtering firewalls Sateful firewalls Sateful firewalls.
Middleboxes & Network Appliances EE122 TAs Past and Present.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
FIREWALL Mạng máy tính nâng cao-V1.
1 The Firewall Menu. 2 Firewall Overview The GD eSeries appliance provides multiple pre-defined firewall components/sections which you can configure uniquely.
A Virtual Honeypot Framework Author: Niels Provos Published in: CITI Report 03-1 Presenter: Tao Li.
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
Fundamentals of Proxying. Proxy Server Fundamentals  Proxy simply means acting on someone other’s behalf  A Proxy acts on behalf of the client or user.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Module 6: Integrating ISA Server 2004 and Microsoft Exchange Server.
Karlstad University Firewall Ge Zhang. Karlstad University A typical network topology Threats example –Back door –Port scanning –…–…
1 Network Firewalls CSCI Web Security Spring 2003 Presented By Yasir Zahur.
Chapter 8 Network Security Thanks and enjoy! JFK/KWR All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking:
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
An Analysis of Using Reflectors for Distributed Denial-of- Service Attacks Paper by Vern Paxson.
Role Of Network IDS in Network Perimeter Defense.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Security in Networking
Mobile Data Charging: New Attacks and Countermeasures
* Essential Network Security Book Slides.
POOJA Programmer, CSE Department
دیواره ی آتش.
Session 20 INST 346 Technologies, Infrastructure and Architecture
Presentation transcript:

MOBILE DATA CHARGING: NEW ATTACKS AND COUNTERMEASURES Chunyi Peng, Chi-Yu Li, Guan-Hua Tu, Songwu Lu, Lixia Zhang University of California, Los Angeles ACM CCS’12

Mobile Data Access 1.2 billion global users Cellular Network Core ACM CCS'12 C Peng (UCLA) Mobile Data Access 1.2 billion global users Cellular Network Core Network Internet

Mobile Data Charging Security: Cellular Network Metered charging ACM CCS'12 C Peng (UCLA) Mobile Data Charging Cellular Network Internet Metered charging based on actual data usage, e.g., $20/month for 300MB (AT&T) Bill Security: Can any attack make the users pay MORE/LESS?

How Charging Works & Be Secured ACM CCS'12 C Peng (UCLA) How Charging Works & Be Secured Cellular Network Authentication #1: Accounting @ core gateway only … #2: Both UL/DL per connection charged Gateway Internet Accounting NAT Policy #3: Policy defined by operators Bill

Toll-Free-Data-Access-Attack ACM CCS'12 C Peng (UCLA) Two Security Issues NAT Authentication Bill #1: Can the attacker bypass the security mechanism to exploit charging architecture loophole to make the users pay MORE? Stealth-spam-attack #2: Can the attacker exploit charging policy to pay LESS? Toll-Free-Data-Access-Attack

Threat Models Cellular network is not compromised ACM CCS'12 C Peng (UCLA) Threat Models Cellular network is not compromised Charging subsystem works as designed Security mechanism works as designed Mobile device is secure No malwares run at mobile-devices Attacker’s capability Only use installed apps @ mobile, or Deploy malicious servers outside cellular networks

Outline Stealth-spam-attack (pay MORE) ACM CCS'12 C Peng (UCLA) Outline Stealth-spam-attack (pay MORE) Vulnerability Attack design & implementation & damage Countermeasures & insight Toll-free-data-access-attack (pay LESS) Summary

Stealth-Spam-Attack

Security Against Spamming ACM CCS'12 C Peng (UCLA) Security Against Spamming Authentication Can security mechanism (e.g., NAT/Firewalls) block incoming spam? Outgoing-Spam Outgoing-Spam Incoming-Spam Outgoing-Spam due to malwares@mobile or spoofing. Simple, not addressed here. Private IP addr. is not accessible Access allowed only when initiated by the mobile NAT Bill

Vulnerability ✔ ✗ E-attacker NAT Different from conventional spamming, ACM CCS'12 C Peng (UCLA) Vulnerability Authentication Different from conventional spamming, e.g., Email/SMS spam Unawareness (stealthy) Long-lived (lasting hours or longer) Init a data service Incoming Spam Incoming traffic ✔ time Data Services (charged) ✗ (normal) Spam from the attacker trap the victim to open data access E-attacker Incoming Spam Actual charging time window (attacked) NAT Bill

Stealth-Spam-Attack Step1-Trap: init data access ACM CCS'12 C Peng (UCLA) Stealth-Spam-Attack Step1-Trap: init data access Example-1: click a malicious web link Example-2: login Skype once / stay online Step2-Spam: keep spamming No matter what status @mobile

Web-based Attack Implementation Result: charging keeps going ACM CCS'12 C Peng (UCLA) Web-based Attack Implementation Phone: click a malicious web link Attacker (server): send spam data at constant rate (disable TCP congest control and tear-down) Result: charging keeps going Even after the phone tears down TCP TCP FIN, timeout Even when many “TCP RESET” sent from the mobile

Damage vs. Spamming Rate ACM CCS'12 C Peng (UCLA) Damage vs. Spamming Rate Charging volume vs. spamming rate Operator-I Operator-II In proportion to spamming rate when rate is low Charging blocked when rate is high (> 1Mbps) The charged volume could be > the received one [Mobicom’12]

ACM CCS'12 C Peng (UCLA) Damage vs. Duration Spamming rate = 150Kbps No observed sign to end when the attack lasts 2 hours if the rate is low (spamming> 120MB)

Skype-based Attack Implementation Exploit Skype “loophole” Demo ACM CCS'12 C Peng (UCLA) Skype-based Attack Implementation Phone: do nothing (stay online once in Skype) Attacker: Skype call the victim and hang up Attacker (server): send spam data at constant rate Exploit Skype “loophole” allows data access from the host who attempts to call the victim before the attempt is accepted Demo Result: charging keeps going Even there is no any skype call session Even when many ICMP unreachable sent from the mobile

Demo: for a specific victim ACM CCS'12 C Peng (UCLA) Demo: for a specific victim Result: charging keeps going Even after Skype logout Even when there is no any skype call session Even when many “ICMP unreachable” sent from the mobile

Damage vs. Spamming Rate ACM CCS'12 C Peng (UCLA) Damage vs. Spamming Rate Charging volume vs. spamming rate Operator-I Operator-II No bounds on spamming rate compared with TCP-based attack

ACM CCS'12 C Peng (UCLA) Damage vs. Duration Spamming rate = 50Kbps No observed sign to end when the attack lasts 24 hours (spamming > 500MB)

Root Cause E-attacker NAT ≠ charging termination @ the operator ACM CCS'12 C Peng (UCLA) Root Cause Current system: Secure only the initialization IP forwarding can push packets to the victim (not controlled by the victim) Init a data service #1: Initial authentication ≠ authentication all along Incoming Spam Current system: Keep charging if data comes Local view @ core gateway Different views @ mobile: data conn. ends or never starts or exception happens Lack of feedback/control trap the victim to open data access E-attacker NAT #2: Data flow termination @ the phone ≠ charging termination @ the operator Bill

Countermeasures Spamming inevitable due to IP push model ACM CCS'12 C Peng (UCLA) Countermeasures Spamming inevitable due to IP push model Remedy: stop early when spamming happens Detection of unwanted traffic @mobile/operator Feedback (esp. from the mobile to the operator) At least allow users to stop data charging (no service) Exploit/design mechanisms in cellular networks: implicit- block, explicit-allow, explicit-stop Precaution, e.g., set a volume limit Application: be aware of spamming attack

Toll-Free-Data-Access-Attack

Vulnerability Both operators provide free DNS service ACM CCS'12 C Peng (UCLA) Vulnerability Both operators provide free DNS service Real data over 53 #1: free fake DNS loophole DNS packets OP-I: Free via port 53 OP-II: Free via UDP+Port 53 DNS flow ID: (srcIP, destIP, srcPort, destPort, protocol) OP-I: Packets via port 53 are free OP-II: Packets via UDP+Port 53 free Policy: Free DNS Service #2: no volume-check loophole Bill (DNS) = 0 Any enforcement for packets over port 53? OP-I: no observed limits, except 29KB for one request packet OP-II: no observed limits Bill (ANY-on-DNS) = 0

Toll-Free-Data-Access-Attack ACM CCS'12 C Peng (UCLA) Toll-Free-Data-Access-Attack Proxy outside cellular network Tunneling over 53 between the mobile and external network similar to calling 800-hotline Implementation HTTP-proxy on port 53 (only for web, OP-I) Sock-proxy on port 53 (for more apps, OP-I) DNS-tunneling on UDP-53 (all apps, OP-I, II) Results Free data access > 200MB, no sign of limits Demo if interested

Countermeasures Simplest fix: stop free DNS service Other suggestions ACM CCS'12 C Peng (UCLA) Countermeasures Simplest fix: stop free DNS service OP-III stopped it since this July Other suggestions Authenticate DNS service Only allow using authenticated DNS resolvers DNS message integrity check Provide free DNS quota

Beyond DNS Existing DNS tunneling tools: iodine etc, ACM CCS'12 C Peng (UCLA) Beyond DNS Existing DNS tunneling tools: iodine etc, Designed for data access when Internet access is blocked differentiated-charging policy e.g., free access to one website/ via some APN, or cheaper VoIP than Web Incentive to pay less (Attackers or even normal users) Bill Gap btw policy and its enforcement Bullet-proof design & practice

On Incentive Toll-Free-Data-Access-Attack ✔ Stealth-Spam-Attack ACM CCS'12 C Peng (UCLA) On Incentive Toll-Free-Data-Access-Attack ✔ Stealth-Spam-Attack Good news: no obvious and strong incentive No immediate gain for the attacker unless the ill- intentioned operator does it Monetary loss against the attacker’s adversary Unexpected incentive in the future?

More information/demo in ACM CCS'12 C Peng (UCLA) Summary More information/demo in http://metro.cs.ucla.edu/projects.html Assess the vulnerability of 3G/4G data charging system Two types of attacks, Toll-free-data-access-attack (free > 200MB) Enforcement of differentiated-charging policy Stealth-spam-attack (overcharging > 500MB) Rooted in charging architecture, security mechanism and IP model No observed volume limits Insight IP push model is not ready for metered-charging Feedback or control needed during data charging Differentiated-charging policy has to secure itself No sign of limits