A Quantitative Analysis of the Insecurity of Embedded Network Devices: Results of a Wide-Area Scan Ang Cui and Salvatore J. Stolfo Department of Computer.

Slides:



Advertisements
Similar presentations
Penetration Testing Biometric System
Advertisements

WEB AND WIRELESS AUTOMATION connecting people and processes InduSoft Web Solution Welcome.
David Grochocki et al.  Lures Potential attackers  Smartmeters do two way communication  Millions of Meters has to be replaced  Serious damages just.
GSM BASED VOTING MACHINE Project Guide: Mr. Gulshan Dubey Lecturer ECE Department Project Team: Himanshu Rewal Vikas Anand Abhishek Bose Sunil Kumar Vikas.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
Cynthia Kuo, Mark Luk, Rohit Negi, Adrian Perrig Carnegie Mellon University Message-In-a-Bottle: User-Friendly and Secure Cryptographic Key Deployment.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Gefördert durch das Kompetenzzentrenprogramm DI Alfred Wertner 19. September 2014 Ubiquitous Personal Computing © Know-Center Security.
Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses Authors: Daniel Halperin, Thomas S. Heydt-Benjamin, Benjamin.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
N ETWORK S ECURITY Presented by: Brent Vignola. M ATERIAL OVERVIEW … Basic security components that exist in all networks Authentication Firewall Intrusion.
Dr. Sarbari Gupta Electrosoft Services Tel: (703) Security Characteristics of Cryptographic.
Network Security Testing Techniques Presented By:- Sachin Vador.
Security Awareness: Applying Practical Security in Your World
Web server security Dr Jim Briggs WEBP security1.
Contact Center Security Strategies Grant Sainsbury Practice Director, Dimension Data.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Improving Security. Networking Terms Node –Any device on a network Protocol –Communication standards Host –A node on a network Workstation 1.A PC 2.A.
A Guide to major network components
Computer Networks IGCSE ICT Section 4.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses Zac Chupka Jeff Signore.
Internet Relay Chat Security Issues By Kelvin Lau and Ming Li.
Port Knocking Software Project Presentation Paper Study – Part 1 Group member: Liew Jiun Hau ( ) Lee Shirly ( ) Ong Ivy ( )
Introduction to Honeypot, Botnet, and Security Measurement
ECE 578: COMPUTER NETWORK AND SECURITY
Computer Networks. Network Connections Ethernet Networks Single wire (or bus) runs to all machines Any computer can send info to another computer Header.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Introduction Implantable Medical Devices (IMDs) are vulnerable to exploitation (last paper) Unauthorized data retrieval Malicious commands Millions of.
COEN 252 Computer Forensics
A Feasible IMD Communication Protocol: Security without Obscurity REU fellow(s):, Jason Wang 1, Keyon Mohebzad 2, Luke Johnson 3, Faculty mentor: N. Sertac.
Computer Networks Unit 1 – BTA 3O Ms. Chytra. Introduction to Networks Most people working in an office with more than a few computers will be using some.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Honeypot and Intrusion Detection System
Common Cyber Defenses Tom Chothia Computer Security, Lecture 18.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
A Virtual Honeypot Framework Author: Niels Provos Published in: CITI Report 03-1 Presenter: Tao Li.
Security and Privacy for Implantable Medical Devices Presented by : Dilip Simha.C.R.
CPT 123 Internet Skills Class Notes Internet Security Session A.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Presented by Spiros Antonatos Distributed Computing Systems Lab Institute of Computer Science FORTH.
Wireless Network Security Presented by: Prabhakaran Theertharaman.
They Can Hear Your Heartbeats: Non-Invasive Security for Implantable Medical Devices Shyamnath Gollakota, Haitham Hassanieh, Benjamin Ransford, Dina Katabi,
Securing Wireless Medical Implants Shyamnath Gollakota Haitham Hassanieh Benjamin Ransford Dina Katabi Kevin Fu.
Chapter 2 Securing Network Server and User Workstations.
1 Introduction to Malcode, DoS Attack, Traceback, RFID Security Cliff C. Zou 03/02/06.
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
Wireless Networks. Wireless Network A wireless network transports data from one device to another without cables or wires – RF signals – Microwaves –
Azam Supervisor : Prof. Raj Jain
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
Chapter 7 Part 2 Networks. Why would I ever consider a wired network connection over a wireless? – Wireless signals are more susceptible to interference.
Education – Partnership – Solutions Information Security Office of Budget and Finance Christopher Giles Governance Risk Compliance Specialist The Internet.
There is a lot to talk about if we think of the advantages of a wireless connection, the most important of its aspects is mobility and everything that.
Securing a Wireless Home Network BY: ARGA PRIBADI.
ASHRAY PATEL Securing Public Web Servers. Roadmap Web server security problems Steps to secure public web servers Securing web servers and contents Implementing.
Security and Privacy for Implantable Medical Devices Presented by Tuo Yu 1.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Wireless security. Submitted To: Er. S.K. Soni [Dy. Head,CSE] Submitted By: Gurjeet Barar CSE Branch IV Year(VII sem) A-2 Batch JODHPUR INSTITUTE OF ENGINEERING.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Computer Networks CSC September 23,
Port Knocking Benjamin DiYanni.
Wireless Network Security
Firewalls.
Introduction to Computers
Securing Wireless Medical Implants
Proximity-based Access Control for Implantable Medical Devices
They Can Hear Your Heartbeats: Non-Invasive Security for Implantable Medical Devices Shyamnath Gollakota, Haitham Hassanieh, Benjamin Ransford, Dina Katabi,
Introduction to Networking Security
Presentation transcript:

A Quantitative Analysis of the Insecurity of Embedded Network Devices: Results of a Wide-Area Scan Ang Cui and Salvatore J. Stolfo Department of Computer Science, Columbia University

Motivation Embedded network devices have become an ubiquitous fixture in the modern home, office as well as in the global communication infrastructure

Widely deployed and often misconfigured, embedded network devices constitute highly attractive targets for exploitation

Questions How have embedded devices been exploited in the past? How feasible is large scale exploitation of embedded devices?

Questions How can we quantitatively measure the level of embedded device insecurity on a global scale?

Questions How can compromised embedded devices be used to benefit malicious attackers?

How many vulnerable embedded devices are there in the world? What are they? Where are they?

What are the most efficient methods of securing vulnerable embedded devices?

Technique Scan the entire internet First, nmap is used to scan large portions of the internet for open TCP ports 23 and 80. The results of scan is stored in a SQL database. Identify device type.

Use default passwords to try to log into embedded devices by verification profile Gain root access

Each scan takes approximately four weeks and involves two or three sweeps of the entire monitored IP space Increase likelihood of getting connection Allow for comparison over time

Ethical Concerns Make sure we are not overloading networks Make it easy to opt out of research Have secondary checks (Columbia University NOC) Rigid security policies for protecting data

Sensitive experimental data is purged from the production database regularly Transferred to an IronKey [4] USB stick for encrypted offline storage

Results Identified approximately 1.1 million vulnerable devices. (as of now the paper cites 540,000) Over 96% of such accessible devices remain vulnerable after a 4-month period

300,000 vulnerable embedded devices within two ISP networks in Asia. Residential ISPs constitute over 68% of the entire vulnerable population.

3 types of devices are 55% of vulnerable This could be used for massive DDOS attack DDOS

HP JetDirect Printer Servers represent 44,000 of vulnerable devices Located in 2505 unique organizations This allows hackers to see data and dataflow Office Espionage

END

SHYAMNATH GOLLAKOTA, HAITHAM HASSANIEH, BENJAMIN RANSFORD, DINA KATABI, AND KEVIN FU ACM SIGCOMM 2011 They Can Hear Your Heartbeats: Non-Invasive Security for Implantable Medical Devices

Implantable Medical Devices (IMD) Cardiac Defibrillators Neurostimulator s Cochlear Implants

Wireless Interaction in IMD

Pro: Safety and Cost Con: Security and Privacy Easier communication with implant Remote monitoring Reduces hospital visits by 40% and cost per visit by $1800 [Journal of the American College of Cardiology, 2011] Passive attack: Eavesdrop on private data Active attack: Send unauthorized commands Wireless Interaction in IMD

Possible Security Measurements Cryptography? Problems 1) In emergencies, patient may be taken to a foreign hospital where doctors do not have the secret key 2) Millions of patients already have implants with no crypto; would require surgery to replace

Ideal Solution Cryptography? => The “Shield” Problems 1) In emergencies, patient may be taken to a foreign hospital where doctors do not have the secret key => can be non-intrusively disable 2) Millions of patients already have implants with no crypto; would require surgery to replace => external security module

Traditional System

Doctor configures the shield with a secret key  Shield acts as proxy Use encryption Shield encrypts the implant data and forwards it to doctor Shield: Secure Legal Communication

Shield jams unauthorized commands Turn off therapy  Implants can’t decode or react to illegal commands Implant ID Shield listens on medium Shield: Jam Illegal Communication

Technical Issue Needs to be able to Tx (jam) and Rx at the same time. Needs to be small enough to be portable. ≈ 40 cm wavelength 2

Solution The “Antidote” w/o antidote: 50% BER w/ antidote: 0.2% packet loss

Implementation USRP2 (Universal Software Radio Peripheral) Antenna *2 FPGA Ethernet interface SD card reader

Evaluation IMD: Medtronic TM cardiac implants Legal user: Medtronic TM IMD programmer Attacker: USRP2 Shield: USRP2 Human body: bacon & beef

30 m 20cm Test Bed IMD & Shield fixed in one place 20 locations for attacker to test

Phase1: Passive Eavesdrop Worst case scenario Attacker is only 20cm away from IMD Average loss rate 0.2%

Phase2: Active Attack Simulating two kinds of attackers 1) Off-the-shelf IMD programmer 2) Self-modified programmer with x100 transmission power

Phase2-1: Off-the-shelf Attacker w/o Shield w/ Shield Less than 14 meters

Any attack successful No attack successful Without the Shield 14 m

Any attack successful No attack successful With the Shield 20 cm

Phase2-2: x100 Power Attacker Too powerful, cannot jam it due to limited battery power of Shield However, can warn the wearer by beeping and/or vibration to leave the location

Phase2-2: x100 Power Attacker

Any attack successful No attack successful Without the Shield 27 m

Any attack successful No attack successful With the Shield

Phase2-2: x100 Power Attacker Cannot totally eliminate the hazard But, Raise the bar of active attack Provide detection of hazard

Conclusion First to secure medical implants without modifying them Other applications in RFIDs, small low-power sensors, legacy devices Convergence of wireless and medical devices open up new research problems

Few Comments (kcir) Meticulous foot notes Kind of verbose/repetitive DoS -> wears out the battery Technical invention in disguise of an application work, incurs more attention