Yan Chen Lab for Internet and Security Technology (LIST) Dept. of Electrical Engineering and Computer Science Northwestern University

Slides:



Advertisements
Similar presentations
Security Issues In Mobile IP
Advertisements

IPv6 Mobility Support Henrik Petander
 IPv6 Has built in security via IPsec (Internet Protocol Security). ◦ IPsec Operates at OSI layer 3 or internet layer of the Internet Protocol Suite.
MIP Extensions: FMIP & HMIP
Network Research Lab. Sejong University, Korea Jae-Kwon Seo, Kyung-Geun Lee Sejong University, Korea.
Mobile IP: enable mobility for IP-based networks CS457 presentation Xiangchuan Chen Nov 6, 2001.
Mobile IPv6 趨勢介紹 1. Mobile IP and its Variants Mobile IPv4 (MIPv4) – MIPv4 – Low-Latency Handover for MIPv4 (FMIPv4) – Regional Registration for MIPv4.
Dynamic Tunnel Management Protocol for IPv4 Traversal of IPv6 Mobile Network Jaehoon Jeong Protocol Engineering Center, ETRI
Inter-Subnet Mobile IP Handoffs in b Wireless LANs Albert Hasson.
1 Mobile IP Myungchul Kim Tel:
NISNet Winter School Finse Internet & Web Security Case Study 2: Mobile IPv6 security Dieter Gollmann Hamburg University of Technology
William Stallings Data and Computer Communications 7 th Edition (Selected slides used for lectures at Bina Nusantara University) Internetworking.
Yan Chen Northwestern Lab for Internet and Security Technology (LIST) Dept. of Electrical Engineering and Computer Science Northwestern University
1 Yan Chen Northwestern University Lab for Internet and Security Technology (LIST) in Northwestern.
Mobile IP Overview: Standard IP Standard IP Evolution of Mobile IP Evolution of Mobile IP How it works How it works Problems Assoc. with it Problems Assoc.
Yan Chen, Hai Zhou Northwestern Lab for Internet and Security Technology (LIST) Dept. of Electrical Engineering and Computer Science Northwestern University.
MOBILITY SUPPORT IN IPv6
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Yan Chen, Hai Zhou Northwestern Lab for Internet and Security Technology (LIST) Dept. of Electrical Engineering and Computer Science Northwestern University.
Mobile IP.
BOTNETS & TARGETED MALWARE Fernando Uribe. INTRODUCTION  Fernando Uribe   IT trainer and Consultant for over 15 years specializing.
Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms Zhichun Li 1, Lanjia Wang 2, Yan Chen 1 and Judy Fu 3 1 Lab.
Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms Zhichun Li 1, Lanjia Wang 2, Yan Chen 1 and Judy Fu 3 1 Lab.
Mobile IP: Introduction Reference: “Mobile networking through Mobile IP”; Perkins, C.E.; IEEE Internet Computing, Volume: 2 Issue: 1, Jan.- Feb. 1998;
1 Chapter06 Mobile IP. 2 Outline What is the problem at the routing layer when Internet hosts move?! Can the problem be solved? What is the standard solution?
1 CIS 6930: Mobile Computing Mobile IP Sumi Helal Credit: majority of slides borrowed from one of Dave Johnson’s talks, 3.
Yan Chen Lab for Internet and Security Technology (LIST) Dept. of Electrical Engineering and Computer Science Northwestern University
Introducing Reliability and Load Balancing in Home Link of Mobile IPv6 based Networks Jahanzeb Faizan, Mohamed Khalil, and Hesham El-Rewini Parallel, Distributed,
1 Network-based Intrusion Detection, Prevention and Forensics System Yan Chen Department of Electrical Engineering and Computer Science Northwestern University.
Fault-Tolerant Design for Mobile IPv6 Networks Jenn-Wei Lin and Ming-Feng Yang Graduate Institute of Applied Science and Engineering Fu Jen Catholic University.
Honeypot and Intrusion Detection System
1 Sideseadmed (IRT0040) loeng 5/2010 Avo
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
MAANAS GODUGUNUR SHASHANK PARAB SAMPADA KARANDIKAR.
Yan Chen, Hai Zhou Northwestern Lab for Internet and Security Technology (LIST) Dept. of Electrical Engineering and Computer Science Northwestern University.
Universal, Ubiquitous, Unfettered Internet © ui.com Pte Ltd Mobile Internet Protocol under IPv6 Amlan Saha 3UI.COM Global IPv6 Summit,
1 Route Optimization for Large Scale Network Mobility Assisted by BGP Feriel Mimoune, Farid Nait-Abdesselam, Tarik Taleb and Kazuo Hashimoto GLOBECOM 2007.
1 Network-based Intrusion Detection, Prevention and Forensics System Yan Chen Department of Electrical Engineering and Computer Science Northwestern University.
Yan Chen Lab for Internet and Security Technology (LIST) Dept. of Electrical Engineering and Computer Science Northwestern University
Yan Chen, Hai Zhou Northwestern Lab for Internet and Security Technology (LIST) Dept. of Electrical Engineering and Computer Science Northwestern University.
1 Mobility Support in IPv6 (MIPv6) Chun-Chuan Yang Dept. Computer Science & Info. Eng. National Chi Nan University.
Vulnerability Analysis and Intrusion Mitigation Systems for WiMAX Networks Yan Chen, Hai Zhou Northwestern Lab for Internet and Security Technology (LIST)
Mobile IPv6 in 6NET: An Overview Chris Edwards, Lancaster University, UK.
Introduction to Mobile IPv6
Security Mechanisms for Delivering Ubiquitous Services in Next Generation Mobile Networks Haitham Cruickshank University of Surrey workshop on Ubiquitous.
Santhosh Rajathayalan ( ) Senthil Kumar Sevugan ( )
Attacking on IPv6 W.lilakiatsakun Ref: ipv6-attack-defense-33904http://
Mobile IP 순천향대학교 정보기술공학부 이 상 정 VoIP 특론 순천향대학교 정보기술공학부 이 상 정 2 References  Tutorial: Mobile IP
Mobile IPv6 and Firewalls: Problem Statement Speaker: Jong-Ru Lin
Ασύρματες και Κινητές Επικοινωνίες Ενότητα # 10: Mobile Network Layer: Mobile IP Διδάσκων: Βασίλειος Σύρης Τμήμα: Πληροφορικής.
Mobile IPv6 for Windows XP (.NET Server) and Windows CE 4.0 Greg O’Shea, MSRC Joint with Lancaster University And Ericsson Research.
Mobile IP Definition: Mobile IP is a standard communication protocol, defined to allow mobile device users to move from one IP network to another while.
Yan Chen Dept. of Electrical Engineering and Computer Science Northwestern University Spring Review 2008 Award # : FA Intrusion Detection.
MIPv6Security: Dimension Of Danger Unauthorized creation (or deletion) of the Binding Cache Entry (BCE).
Network Mobility (NEMO) Advanced Internet 2004 Fall
Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms Zhichun Li 1, Lanjia Wang 2, Yan Chen 1 and Judy Fu 3 1 Lab.
Mobile IP 순천향대학교 전산학과 문종식
Network Devices and Firewalls Lesson 14. It applies to our class…
1 IPv6 and Mobile IPv6 For Mobile Networks Hesham Soliman Director, Elevate Technologies Octorber 2012.
Mobile IP THE 12 TH MEETING. Mobile IP  Incorporation of mobile users in the network.  Cellular system (e.g., GSM) started with mobility in mind. 
Yan Chen Northwestern Lab for Internet and Security Technology (LIST) Dept. of Computer Science Northwestern University
Introduction Wireless devices offering IP connectivity
RFC 3775 IPv6 Mobility Support
Network-based Intrusion Detection, Prevention and Forensics System
Northwestern Lab for Internet and Security Technology (LIST) Yan Chen Department of Computer Science Northwestern University.
Net 431: ADVANCED COMPUTER NETWORKS
Network Virtualization
Lecture 4a Mobile IP 1.
Presentation transcript:

Yan Chen Lab for Internet and Security Technology (LIST) Dept. of Electrical Engineering and Computer Science Northwestern University Intrusion Detection and Forensics for Self-defending Wireless Networks

The Spread of Sapphire/Slammer Worms

The Current Threat Landscape of Wireless Networks Wireless networks, crucial for GIG, face both Internet attacks and their unique attacks –Viruses/worms: e.g., 6 new viruses, including Cabir and Skulls, with 30 variants targeting mobile devices –Botnets: underground army of the Internet, emerging for wireless networks Big security risks for wireless networks –Few formal analysis about wireless network protocol vulnerabilities –Existing (wireless) IDSes only focus on existing attacks »Ineffective for unknown attacks or polymorphic worms –Little work on attack forensics »E.g., how to identify the command-and-control (C&C) channel of botnets?

Self-Defending Wireless Networks Proactively search of vulnerability for wireless network protocols – Intelligent and thorough checking through combo of manual analysis + auto search with formal methods –First, manual analysis provide hints and right level of abstraction for auto search –Then specify the specs and potential capabilities of attackers in a formal language TLA+ (the Temporal Logic of Actions) –Then model check for any possible attacks Defend against emerging threat –Worm: network-based polymorphic worm signature generations –Botnet: IRC (Internet relay chat) based C&C detection and mitigation

Outline Threat landscape and motivation Our approach Accomplishment of this year –Vulnerability analysis of Mobile IPv6 protocols –Polymorphic worm signature generation Plan for the next year

Accomplishments This Year (I) Intelligent vulnerability analysis –Focused on outsider attacks, i.e., w/ unprotected msgs –Checked the complete spec of e before authentication »Found some vulnerability, e.g., for ranging (but needs to change MAC) –Checked the mobile IPv4/v6 »Find an easy attack to disable the route optimization of MIPv6 ! –Partnered with Motorola, very interested in the vulnerability found Automatic polymorphic worm signature generation systems for high-speed networks –Fast, noise tolerant w/ proved attack resilience –Talking with Cisco IPS group for tech transfer –Patent filed

Six conference, one journal papers and a book chap –Honeynet-based Botnet Scan Traffic Analysis, invited book chapter for Botnet Detection: Countering the Largest Security Threat –Detecting Stealthy Spreaders Using Online Outdegree Histograms, in the Proc. of the 15th IEEE International Workshop on Quality of Service (IWQoS), 2007 (26.6%). –Hamsa: Fast Signature Generation for Zero-day Polymorphic Worms with Provable Attack Resilience, to appear in IEEE Symposium on Security and Privacy, 2006 (9%). –Towards Scalable and Robust Distributed Intrusion Alert Fusion with Good Load Balancing, in Proc. of ACM SIGCOMM Workshop on Large- Scale Attack Defense 2006(33%). –Automatic Vulnerability Checking of IEEE WiMAX Protocols through TLA+, in Proc. of the Second Workshop on Secure Network Protocols (NPSec) (33%). –A DoS Resilient Flow-level Intrusion Detection Approach for High- speed Networks, to appear in IEEE International Conference on Distributed Computing Systems (ICDCS), 2006 (14%). –Reverse Hashing for High-speed Network Monitoring: Algorithms, Evaluation, and Applications, Proc. of IEEE INFOCOM, 2006 (18%). Full version to appear in ACM/IEEE Transaction on Networking. Accomplishments This Year (II)

Mobile IPv6 (RFC 3775) Provides mobility at IP Layer Enables IP-based communication to continue even when the host moves from one network to another Host movement is completely transparent to Layer 4 and above

Mobile IPv6 - Entities Mobile Node (MN) – Any IP host which is mobile Correspondent Node (CN) – Any IP host communicating with the MN Home Agent (HA) – A host/router in the Home network which: –Is always aware of MN’s current location –Forwards any packet destined to MN –Assists MN to optimize its route to CN

Mobile IPv6 - Process (Initially) MN is in home network and connected to CN MN moves to a foreign network : –Registers new address with HA by sending Binding Update (BU) and receiving Binding Ack (BA) –Performs Return Routability to optimize route to CN by sending HoTI, CoTI and receiving HoT, CoT –Registers with CN using BU and BA

Mobile IPv6 in Action Home Agent Correspondent Node Home Network Foreign Network Internet Mobile Node Mobile Node BU BA HoTI CoTI HoT CoT BU BA

Mobile IPv6 Vulnerability Nullifies the effect of Return Routability BA with status codes 136, 137 and 138 unprotected Man-in-the-middle attack –Sniffs BU to CN –Injects BA to MN with one of status codes above MN either retries RR or gives up route optimization and goes through HA

MIPv6 Attack In Action MNHAATCN H o T I H o T I C o T I C o T H o T H o T Start Return Routability Restart Return Routability Silently Discard Bind Ack Bind Update (Sniffed by AT along the way) Bind Ack Spoofed by AT Bind Ack Only need a wireless network sniffer and a spoofed wired machine (No MAC needs to be changed !) Bind ACK often skipped by CN

MIPv6 Vulnerability - Effects Performance degradation by forcing communication through sub-optimal routes Possible overloading of HA and Home Link DoS attack, when MN repeatedly tried to complete the return routability procedure Attack can be launched to a large number of machines in their foreign network –Small overhead for continuously sending spoofed Bind ACK to different machines

TLA Analysis and Experiments With the spec modeled in TLA, the TLC search gives two other similar attacks w/ the same vulnerability –Complete the search of vulnerabilities w/ unprotected messages Implemented and tested in our lab –Using Mobile IPv6 Implementation for Linux (MIPL) –Tunnel IPv6 through IPv4 with Generic Routing Encapsulation (GRE) by Cisco –When attack in action, MN repeatedly tried to complete the return routability procedure – DOS attack !

Outline Threat landscape and motivation Our approach Accomplishment of this year –Vulnerability analysis of Mobile IPv6 protocols –Polymorphic worm signature generation Plan for the next year

Deployment of SDWN Attached to a switch connecting BS as a black box Enable the early detection and mitigation of global scale attacks Significantly more challenging compared w/ host-based IDS/IPS –Huge data volume and lack of host-level information Original configuration SDWN deployed (a) (b) Router/ switch Inter net 802.1x BS User s 802.1x BS User s Switch/ BS controller Internet scan port SDWN system 802.1x BS Users 802.1x BS Users Hone ynet SDWN system Gateway

Automatic Length Based Worm Signature Generation Majority of worms exploit buffer overflow vulnerabilities Worm packets have a particular field longer than normal Length signature generation –Parse the traffic to different fields –Find abnormally long field –Apply a three-step algorithm to determine a length signature –Length based signature is hard to evade if the attacker has to overflow the buffer.

Length Based Signature Generator

Evaluation of Signature Quality Seven polymorphic worms based on real-world vulnerabilities and exploits from securityfocus.com Real traffic collected at two gigabit links of a campus edge routers in 2006 (40GB for evaluation) Another 123GB SPAM dataset

Outline Threat landscape and motivation Our approach Accomplishment Achievement highlight: a Mobile IPv6 vulnerability Plan for the next year –Insider attack analysis –Complete the polymorphic worm signature generation –Intrusion forensics for botnet command and control channel detection

Insider Attack Analysis Not hard to become a subscriber Can five subscribers bring down an entire wireless network (e.g., WiMAX) ? Check vulnerability after authentication Plan to analyze various layers of WiMAX networks –IEEE e: MAC layer –Mobile IP v4/6: network layer –EAP layer

802.16e SS Init Flowchart

Work Done

Future work

Proactively secure the wireless networks Search of network protocol vulnerabili- ties Automatically detect and filter unknown and/or polymorphic worms Intrusion forensics and mitigation for botnet-based attacks Intelligent and complete vulnerability search through the combo of manual analysis & verification via formal methods Network-based automatic signature generation for polymorphic worms Botnet command-and-control channel detection and mitigation Intrusion Detection and Forensics for Self-defending Wireless Networks Yan Chen, Northwestern University Tel. (847) , Objective Scientific/Technical Approach Accomplishments Successfully check for outsider attack vulnerabilities of MIP v4/6 and e (WiMAX) protocols Network-based automatic signature generations Challenges State space explosion for vulnerability search w/ formal methods Large amount of traffic to monitor on high-speed links Switch/ BS controller Internet scan port SDWN system 802.1x BS Users 802.1x BS Users Hone ynet SDWN system Gateway

Conclusions Vulnerability analysis of wireless network protocols: e and mobile IP specs Network-based polymorphic worm signature generation for self-defending wireless networks Thank You !