Yan Chen, Hai Zhou Northwestern Lab for Internet and Security Technology (LIST) Dept. of Electrical Engineering and Computer Science Northwestern University.

Slides:



Advertisements
Similar presentations
Mobile IP How Mobile IP Works? Agenda What problems does Mobile IP solve? Mobile IP: protocol overview Scope Requirements Design goals.
Advertisements

Security Issues In Mobile IP
IEEE INFOCOM 2004 MultiNet: Connecting to Multiple IEEE Networks Using a Single Wireless Card.
IPv6 Mobility Support Henrik Petander
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Network Research Lab. Sejong University, Korea Jae-Kwon Seo, Kyung-Geun Lee Sejong University, Korea.
Mobile IP: enable mobility for IP-based networks CS457 presentation Xiangchuan Chen Nov 6, 2001.
1 Mobile IP Myungchul Kim Tel:
Authentication In Mobile Internet Protocol version 6 Liu Ping Supervisor: professor Jorma Jormakka.
Ad-Hoc Networking Course Instructor: Carlos Pomalaza-Ráez A Paper Presentation of ”Multihop Sensor Network Design for Wide-Band Communications” Proceedings.
NISNet Winter School Finse Internet & Web Security Case Study 2: Mobile IPv6 security Dieter Gollmann Hamburg University of Technology
1 Yan Chen Northwestern Lab for Internet and Security Technology (LIST) Dept. of Computer Science Northwestern University
Yan Chen Northwestern Lab for Internet and Security Technology (LIST) Dept. of Electrical Engineering and Computer Science Northwestern University
1 Yan Chen Northwestern University Lab for Internet and Security Technology (LIST) in Northwestern.
Yan Chen, Hai Zhou Northwestern Lab for Internet and Security Technology (LIST) Dept. of Electrical Engineering and Computer Science Northwestern University.
MOBILITY SUPPORT IN IPv6
Yan Chen, Hai Zhou Northwestern Lab for Internet and Security Technology (LIST) Dept. of Electrical Engineering and Computer Science Northwestern University.
A Study of Mobile IP Kunal Ganguly Wichita State University CS843 – Distributed Computing.
CS 672 Paper Presentation Presented By Saif Iqbal “CarNet: A Scalable Ad Hoc Wireless Network System” Robert Morris, John Jannotti, Frans Kaashoek, Jinyang.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
A DoS Resilient Flow-level Intrusion Detection Approach for High-speed Networks Yan Gao, Zhichun Li, Yan Chen Lab for Internet and Security Technology.
1 Yan Chen Northwestern Lab for Internet and Security Technology (LIST) Dept. of Computer Science Northwestern University
Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms Zhichun Li 1, Lanjia Wang 2, Yan Chen 1 and Judy Fu 3 1 Lab.
Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms Zhichun Li 1, Lanjia Wang 2, Yan Chen 1 and Judy Fu 3 1 Lab.
Mobile IP Performance Issues in Practice. Introduction What is Mobile IP? –Mobile IP is a technology that allows a "mobile node" (MN) to change its point.
Mobile IP: Introduction Reference: “Mobile networking through Mobile IP”; Perkins, C.E.; IEEE Internet Computing, Volume: 2 Issue: 1, Jan.- Feb. 1998;
2002 년 2 학기이동인터넷프로토콜 1 Mobile IP:Overview 년 2 학기이동인터넷프로토콜 2 Mobile IP overview Is Mobile IP an official standard? What problems does Mobile IP solve?
1 CIS 6930: Mobile Computing Mobile IP Sumi Helal Credit: majority of slides borrowed from one of Dave Johnson’s talks, 3.
Vulnerabilities Prasad Narayana, Yao Zhao, Yan Chen, Judy Fu (Motorola Labs) Lab for Internet & Security Tech, Northwestern Univ.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Yan Chen Lab for Internet and Security Technology (LIST) Dept. of Electrical Engineering and Computer Science Northwestern University
Introducing Reliability and Load Balancing in Home Link of Mobile IPv6 based Networks Jahanzeb Faizan, Mohamed Khalil, and Hesham El-Rewini Parallel, Distributed,
1 Network-based Intrusion Detection, Prevention and Forensics System Yan Chen Department of Electrical Engineering and Computer Science Northwestern University.
National Institute Of Science & Technology Mobile IP Jiten Mishra (EC ) [1] MOBILE IP Under the guidance of Mr. N. Srinivasu By Jiten Mishra EC
Fault-Tolerant Design for Mobile IPv6 Networks Jenn-Wei Lin and Ming-Feng Yang Graduate Institute of Applied Science and Engineering Fu Jen Catholic University.
1 Sideseadmed (IRT0040) loeng 5/2010 Avo
Inter-Mobility Support in Controlled 6LoWPAN Networks Zinonos, Z. and Vassiliou, V., GLOBECOM Workshops, 2010 IEEE.
Yan Chen, Hai Zhou Northwestern Lab for Internet and Security Technology (LIST) Dept. of Electrical Engineering and Computer Science Northwestern University.
Yan Chen Lab for Internet and Security Technology (LIST) Dept. of Electrical Engineering and Computer Science Northwestern University
Mobile IP Outline Intro to mobile IP Operation Problems with mobility.
1 Mobility Support in IPv6 (MIPv6) Chun-Chuan Yang Dept. Computer Science & Info. Eng. National Chi Nan University.
Secure Wired Local Area Network( LAN ) By Sentuya Francis Derrick ID Module code:CT3P50N BSc Computer Networking London Metropolitan University.
Vulnerability Analysis and Intrusion Mitigation Systems for WiMAX Networks Yan Chen, Hai Zhou Northwestern Lab for Internet and Security Technology (LIST)
Introduction to Mobile IPv6
Santhosh Rajathayalan ( ) Senthil Kumar Sevugan ( )
Mobile IPv6 and Firewalls: Problem Statement Speaker: Jong-Ru Lin
Ασύρματες και Κινητές Επικοινωνίες Ενότητα # 10: Mobile Network Layer: Mobile IP Διδάσκων: Βασίλειος Σύρης Τμήμα: Πληροφορικής.
Selective Packet Inspection to Detect DoS Flooding Using Software Defined Networking Author : Tommy Chin Jr., Xenia Mountrouidou, Xiangyang Li and Kaiqi.
Mobile IPv6 for Windows XP (.NET Server) and Windows CE 4.0 Greg O’Shea, MSRC Joint with Lancaster University And Ericsson Research.
Yan Chen Dept. of Electrical Engineering and Computer Science Northwestern University Spring Review 2008 Award # : FA Intrusion Detection.
MIPv6Security: Dimension Of Danger Unauthorized creation (or deletion) of the Binding Cache Entry (BCE).
Network Mobility (NEMO) Advanced Internet 2004 Fall
Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms Zhichun Li 1, Lanjia Wang 2, Yan Chen 1 and Judy Fu 3 1 Lab.
IPv6 Security Issues Georgios Koutepas, NTUA IPv6 Technology and Advanced Services Oct.19, 2004.
Yan Chen Northwestern Lab for Internet and Security Technology (LIST) Dept. of Computer Science Northwestern University
Introduction Wireless devices offering IP connectivity
MOBILE IPv6 SECURITY ISSUES
Network-based Intrusion Detection, Prevention and Forensics System
Northwestern Lab for Internet and Security Technology (LIST) Yan Chen Department of Computer Science Northwestern University.
Prasad Narayana, Yao Zhao, Yan Chen, Judy Fu (Motorola Labs)
Net 431: ADVANCED COMPUTER NETWORKS
Network Virtualization
End-user Based Network Measurement and Diagnosis
Northwestern Lab for Internet and Security Technology (LIST)
Mobility Support in Wireless LAN
Mobile IP Outline Intro to mobile IP Operation Problems with mobility.
Lecture 4a Mobile IP 1.
Mobile IP Outline Intro to mobile IP Operation Problems with mobility.
Presentation transcript:

Yan Chen, Hai Zhou Northwestern Lab for Internet and Security Technology (LIST) Dept. of Electrical Engineering and Computer Science Northwestern University Automatic Vulnerability Analysis and Intrusion Mitigation Systems for WiMAX Networks Motorola Liaisons Greg W. Cox, Z. Judy Fu, Peter McCann, and Philip R. Roberts Motorola Labs

The Spread of Sapphire/Slammer Worms

Outline Threat Landscape and Motivation Our approach Accomplishment Achievement highlight: a Mobile IPv6 vulnerability

The Current Threat Landscape and Countermeasures of WiMAX Networks WiMAX: next wireless phenomenon –Predicted multi-billion dollar industry WiMAX faces both Internet attacks and wireless network attacks –E.g., 6 new viruses, including Cabir and Skulls, with 30 variants targeting mobile devices Goal of this project: secure WiMAX networks Big security risks for WiMAX networks –No formal analysis about WiMAX security vulnerabilities –No intrusion detection/mitigation product/research tailored towards WiMAX networks

Our Approach Vulnerability analysis of e specs and WiMAX standards –Systematical and automatic searching through formal methods. –First specify the specs and potential capabilities of attackers in a formal language TLA+ (the Temporal Logic of Actions) –Then model check for any possible attacks –The formal analysis can also help guide fixing of the flaws Adaptive Intrusion Detection and Mitigation for WiMAX Networks (WAIDM) –Could be differentiator for Motorola’s products

Accomplishments This Year Most achieved with close interaction with Motorola liaisons Automatic vulnerability analysis –Checked the initial ranging and authentication of WiMAX »Found a potential vulnerability for ranging (but needs to change MAC) »Published a joint paper with Judy Fu “Automatic Vulnerability Checking of IEEE WiMAX Protocols through TLA+”, in Proc. of the Second Workshop on Secure Network Protocols (NPSec), –Checking the mobile IPv6 »Find an easy attack to disable the route optimization !

Accomplishments This Year (II) Sketch-based online flow-level intrusion detection –Mature and ready to be deployed –Motorola liaisons are talking to various groups for commercialization »E.g., recently talked to Joshua Brickel, John Bruner, and Ephraim Borow in MSG. “Sketch can be used in our DoS attack solution for Verizon Wireless networks or may be used in SLA monitor.” Automatic polymorphic worm signature generation systems for high-speed networks –Fast, noise tolerant, and attack resilient –Resulted a joint paper submission with Judy Zhi Fu “Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms”, submitted to USENIX Security Symposium –Patent under review by the patent committee of Motorola

Automatic Length Based Worm Signature Generation Majority of worms exploit buffer overflow vulnerabilities Worm packets have a particular field longer than normal Length signature generation –Parse the traffic to different fields –Find abnormally long field –Apply a three-step algorithm to determine a length signature –Length based signature is hard to evade if the attacker has to overflow the buffer.

Length Based Signature Generator

Evaluation of Signature Quality Seven polymorphic worms based on real-world vulnerabilities and exploits from securityfocus.com Real traffic collected at two gigabit links of a campus edge routers in 2006 (40GB for evaluation) Another 123GB SPAM dataset

Accomplishments on Publications Four conference and one journal papers, and one tech report –Hop ID: A Virtual Coordinate based Routing for Sparse Mobile Ad Hoc Networks, to appear in IEEE Transaction on Mobile Computing. –A Suite of Schemes for User-level Network Diagnosis without Infrastructure, to appear in the Proc. of IEEE INFOCOM, 2007 (18%). –Internet Cache Pollution Attacks and Countermeasures, in Proc. of the 14th IEEE International Conference on Network Protocols (ICNP), Nov (14%). –Automatic Vulnerability Checking of IEEE WiMAX Protocols through TLA+, in Proc. of the Second Workshop on Secure Network Protocols (NPSec) (33%). –A DoS Resilient Flow-level Intrusion Detection Approach for High-speed Networks, in Proc. of IEEE International Conference on Distributed Computing Systems (ICDCS), 2006 (14%). –Abstraction Techniques for Model-Checking Parameterized Systems, EECS Tech. Report, 2007.

Students Involved PhD students: –Yan Gao, Zhichun Li, Yao Zhao (all in their 3rd years), –Nicos Liveris (4th year) MS students: –Prasad Narayana (graduating, will work for Motorola soon) –Sagar Vemuri (1st year) Undergraduate student: –Coh Yoshizaki

Outline Threat Landscape and Motivation Our approach Accomplishment Achievement highlight: a Mobile IPv6 vulnerability

Mobile IPv6 (RFC 3775) Provides mobility at IP Layer Enables IP-based communication to continue even when the host moves from one network to another Host movement is completely transparent to Layer 4 and above

Mobile IPv6 - Entities Mobile Node (MN) – Any IP host which is mobile Correspondent Node (CN) – Any IP host communicating with the MN Home Agent (HA) – A host/router in the Home network which: – Is always aware of MN’s current location –Forwards any packet destined to MN –Assists MN to optimize its route to CN

Mobile IPv6 - Process (Initially) MN is in home network and connected to CN MN moves to a foreign network : –Registers new address with HA by sending Binding Update (BU) and receiving Binding Ack (BA) –Performs Return Routability to optimize route to CN by sending HoTI, CoTI and receiving HoT, CoT –Registers with CN using BU and BA

Mobile IPv6 in Action Home Agent Correspondent Node Home Network Foreign Network Internet Mobile Node Mobile Node BU BA HoTI CoTI HoT CoT BU BA

Mobile IPv6 Vulnerability Nullifies the effect of Return Routability BA with status codes 136, 137 and 138 unprotected Man-in-the-middle attack –Sniffs BU to CN –Injects BA to MN with one of status codes above MN either retries RR or gives up route optimization and goes through HA

MIPv6 Attack In Action MNHAATCN H o T I H o T I C o T I C o T H o T H o T Start Return Routability Restart Return Routability Silently Discard Bind Ack Bind Update (Sniffed by AT along the way) Bind Ack Spoofed by AT Bind Ack

MIPv6 Vulnerability - Effects Performance degradation by forcing communication through sub-optimal routes Possible overloading of HA and Home Link Service disruption – Communication between two mobile entities can be disrupted if they were already using optimized route

Conclusions Vulnerability analysis of e specs (WiMAX) and mobile IP protocols Adaptive Intrusion Detection and Mitigation for WiMAX Networks (WAIDM) Thank You !

Existing WLAN Security Technology Insufficient for WiMAX Networks Cryptography and authentication cannot prevent attacks from penetrating WiMAX networks –Viruses, worms, DoS attacks, etc IDS development can potentially lead to critical gain in market share –All major WLAN vendors integrated IDS into products Limitations of existing IDSes (including WIDS) –Mostly host-based, and not scalable to high-speed networks –Mostly simple signature based, cannot deal with unknown attacks, polymorphic worms –Mostly ignore dynamics and mobility of wireless networks

Deployment of WAIDM Attached to a switch connecting BS as a black box Enable the early detection and mitigation of global scale attacks Could be differentiator for Motorola’s products Original configuration WAIDM deployed Inter net BS User s (a) (b) BS User s Switch/ BS controller Internet scan port WAIDM system BS Users BS Users Switch/ BS controller