Vulnerability Analysis and Intrusion Mitigation Systems for WiMAX Networks Yan Chen, Hai Zhou Northwestern Lab for Internet and Security Technology (LIST)

Slides:



Advertisements
Similar presentations
1 Introduction to Mobile IPv6 IIS5711: Mobile Computing Mobile Computing and Broadband Networking Laboratory CIS, NCTU.
Advertisements

Dynamic Tunnel Management Protocol for IPv4 Traversal of IPv6 Mobile Network Jaehoon Jeong Protocol Engineering Center, ETRI
IPv6 Multihoming Support in the Mobile Internet Presented by Paul Swenson CMSC 681, Fall 2007 Article by M. Bagnulo et. al. and published in the October.
1 Exception Triggered DoS Attacks on Wireless Networks Yao Zhao, Sagar Vemuri, Jiazhen Chen, Yan Chen, Hai Zhou Lab for Internet and Security Technology.
Inter-Subnet Mobile IP Handoffs in b Wireless LANs Albert Hasson.
Raphael Frank 20 October 2007 Authentication & Intrusion Prevention for Multi-Link Wireless Networks.
1 © NOKIA MitM.PPT/ 6/2/2015 / Kaisa Nyberg (NRC/MNW), N.Asokan (NRC/COM) The Insecurity of Tunnelled Authentication Protocols N. ASOKAN, VALTTERI NIEMI,
NISNet Winter School Finse Internet & Web Security Case Study 2: Mobile IPv6 security Dieter Gollmann Hamburg University of Technology
1 Yan Chen Northwestern Lab for Internet and Security Technology (LIST) Dept. of Computer Science Northwestern University
Yan Chen, Hai Zhou Northwestern Lab for Internet and Security Technology (LIST) Dept. of Electrical Engineering and Computer Science Northwestern University.
MOBILITY SUPPORT IN IPv6
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Yan Chen, Hai Zhou Northwestern Lab for Internet and Security Technology (LIST) Dept. of Electrical Engineering and Computer Science Northwestern University.
Semester 4 - Chapter 4 – PPP WAN connections are controlled by protocols In a LAN environment, in order to move data between any two nodes or routers two.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
IPv6 Mobility David Bush. Correspondent Node Operation DEF: Correspondent node is any node that is trying to communicate with a mobile node. This node.
IEEE Wireless Local Area Networks (WLAN’s).
WLAN Security:PEAP Sunanda Kandimalla. Intoduction The primary goals of any security setup for WLANs should include: 1. Access control and mutual authentication,
NCHU AI LAB Implications of Unlicensed Mobile Access for GSM security From : Proceeding of the First International Conference on Security and Privacy for.
WLAN security S Wireless Personal, Local, Metropolitan, and Wide Area Networks1 Contents WEP (Wired Equivalent Privacy) No key management Authentication.
 The Open Systems Interconnection model (OSI model) is a product of the Open Systems Interconnection effort at the International Organization for Standardization.
Cellular IP: Proxy Service Reference: “Incorporating proxy services into wide area cellular IP networks”; Zhimei Jiang; Li Fung Chang; Kim, B.J.J.; Leung,
Wireless Network Security. Wireless Security Overview concerns for wireless security are similar to those found in a wired environment concerns for wireless.
Wireless LAN Security Yen-Cheng Chen Department of Information Management National Chi Nan University
1 Computer Networks Course: CIS 3003 Fundamental of Information Technology.
Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms Zhichun Li 1, Lanjia Wang 2, Yan Chen 1 and Judy Fu 3 1 Lab.
Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms Zhichun Li 1, Lanjia Wang 2, Yan Chen 1 and Judy Fu 3 1 Lab.
Lecture 3a Mobile IP 1. Outline How to support Internet mobility? – by Mobile IP. Our discussion will be based on IPv4 (the current version). 2.
1 CIS 6930: Mobile Computing Mobile IP Sumi Helal Credit: majority of slides borrowed from one of Dave Johnson’s talks, 3.
Comparative studies on authentication and key exchange methods for wireless LAN Authors: Jun Lei, Xiaoming Fu, Dieter Hogrefe and Jianrong Tan Src:
Networks LANS,. FastPoll True Questions Answer A for True and B for False A wireless infrastructure network uses a centralized broadcasting device, such.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
1 Network-based Intrusion Detection, Prevention and Forensics System Yan Chen Department of Electrical Engineering and Computer Science Northwestern University.
UNIVERSITY OF PATRAS Department of Electrical & Computer Engineering Wireless Telecommunications Laboratory M. Tsagkaropoulos “Securing.
Yan Chen, Hai Zhou Northwestern Lab for Internet and Security Technology (LIST) Dept. of Electrical Engineering and Computer Science Northwestern University.
Shambhu Upadhyaya Security –Upper Layer Authentication Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 10)
KAIS T Wireless Network Security and Interworking Minho Shin, et al. Proceedings of the IEEE, Vol. 94, No. 2, Feb Hyeongseop Shim NS Lab, Div. of.
Yan Chen Lab for Internet and Security Technology (LIST) Dept. of Electrical Engineering and Computer Science Northwestern University
A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University.
Yan Chen Lab for Internet and Security Technology (LIST) Dept. of Electrical Engineering and Computer Science Northwestern University
Yan Chen, Hai Zhou Northwestern Lab for Internet and Security Technology (LIST) Dept. of Electrical Engineering and Computer Science Northwestern University.
11 SECURING NETWORK COMMUNICATION Chapter 9. Chapter 9: SECURING NETWORK COMMUNICATION2 OVERVIEW  List the major threats to network communications. 
Mobile IP Outline Intro to mobile IP Operation Problems with mobility.
Link-Layer Protection in i WLANs With Dummy Authentication Will Mooney, Robin Jha.
CNIT 124: Advanced Ethical Hacking Ch 7: Capturing Traffic.
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
Lecture 24 Wireless Network Security
Introduction to Mobile IPv6
Performance Validation of Mobile IP Wireless Networks Presented by Syed Shahzad Ali Advisor Dr. Ravi Pendse.
Mobile IPv6 and Firewalls: Problem Statement Speaker: Jong-Ru Lin
CPSC441 Computer Communications Aniket Mahanti Introduction 1-1.
Yan Chen Dept. of Electrical Engineering and Computer Science Northwestern University Spring Review 2008 Award # : FA Intrusion Detection.
MIPv6Security: Dimension Of Danger Unauthorized creation (or deletion) of the Binding Cache Entry (BCE).
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms Zhichun Li 1, Lanjia Wang 2, Yan Chen 1 and Judy Fu 3 1 Lab.
Mobile IP 순천향대학교 전산학과 문종식
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
KAIS T Comparative studies on authentication and key exchange methods for wireless LAN Jun Lei, Xiaoming Fu, Dieter Hogrefe, Jianrong Tan Computers.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
DIVYA K 1RN09IS016 RNSIT1. Cloud computing provides a framework for supporting end users easily through internet. One of the security issues is how to.
Mobile IP THE 12 TH MEETING. Mobile IP  Incorporation of mobile users in the network.  Cellular system (e.g., GSM) started with mobility in mind. 
Yan Chen Northwestern Lab for Internet and Security Technology (LIST) Dept. of Computer Science Northwestern University
Wireless Protocols WEP, WPA & WPA2.
Network-based Intrusion Detection, Prevention and Forensics System
Mobile IP Outline Homework #4 Solutions Intro to mobile IP Operation
Mobile IP Outline Intro to mobile IP Operation Problems with mobility.
Lecture 4a Mobile IP 1.
Presentation transcript:

Vulnerability Analysis and Intrusion Mitigation Systems for WiMAX Networks Yan Chen, Hai Zhou Northwestern Lab for Internet and Security Technology (LIST) Dept. of Electrical Engineering and Computer Science Northwestern University Motorola Liaisons Greg W. Cox, Z. Judy Fu, Phil Roberts, and Peter McCann Motorola Labs

The Current Threat Landscape and Countermeasures of WiMAX Networks WiMAX: next wireless phenomenon –Predicted multi-billion dollar industry WiMAX faces both Internet attacks and wireless network attacks –E.g., 6 new viruses, including Cabir and Skulls, with 30 variants targeting mobile devices Goal of this project: secure WiMAX networks Big security risks for WiMAX networks –No formal analysis about WiMAX security vulnerabilities –No intrusion detection/mitigation product/research tailored towards WiMAX networks

Security Challenges in WiMAX Networks In addition to sharing similar challenge of wired net –High speed traffic –Zero-day threats Wireless networks are more vulnerable –Open media Easy to sniff, spoof and inject packets –Open access Hotspots and potential large user population Attacking is more diverse –On media access (e.g., jamming), but easy to detect –On protocols (our focus)

Overall Approach and Achievement Adaptive Intrusion Detection and Mitigation for WiMAX Networks (WAIDM) Focus on the emerging threats: polymorphic zero-day worms and botnets –High-speed network monitoring and anomaly/intrusion detection –Polymorphic zero-day worm signature generation –Both designed, implemented and fully evaluated –All code are available for Motorola Vulnerability analysis and defense of WiMAX networks at various layers –IEEE e: MAC layer –Mobile IP v4/6: network layer –EAP layer (generalized to various wireless & cellular nets) –Finished for WiMAX, generalization ongoing

Overall Approach and Achievement II Twelve conference and two journal papers –Some more are under submission Two book chapters One patent filed

Outline Threat landscape and motivation Overall approach and achievement Accomplishment this year Error-message based DoS attacks of wireless networks and the defense

Accomplishments This Year Most achieved with close interaction with Motorola liaisons Automatic polymorphic worm signature generation systems for high-speed networks –Fast, noise tolerant w/ proved attack resilience –Resulted two joint papers with Motorola Labs “Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms”, published in to IEEE International Conference on Network Protocols (ICNP) 2007 (14% acceptance rate). –Patent filed through Motorola. “Method and Apparatus to Facilitate Generating Worm-Detection Signatures Using Data Packet Field Lengths”, U.S. Patent Application No. 11/985,760. Filed on Dec. 18, –A journal paper submitted to IEEE/ACM Trans. on Net.

Accomplishments on Publications Four conference, one journal papers and two book chapters –“Accurate and Efficient Traffic Monitoring Using Adaptive Non-linear Sampling Method", in the Proc. of IEEE INFOCOM, 2008 –“A Survey of Existing Botnet Defenses “, in the Proc. of IWSSE –“Honeynet-based Botnet Scan Traffic Analysis", invited book chapter for “Botnet Detection: Countering the Largest Security Threat”, Springer, –“Integrated Fault and Security Management”, invited book chapter for “Information Assurance: Dependability and Security in Networked Systems”, Morgan Kaufmann Publishers, –“Reversible Sketches: Enabling Monitoring and Analysis over High-speed Data Streams”, in ACM/IEEE Transaction on Networking, Volume 15, Issue 5, Oct –“Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms”, in the Proc. of the 15th IEEE International Conference on Network Protocols (ICNP), –“Detecting Stealthy Spreaders Using Online Outdegree Histograms”, in the Proc. Of IEEE International Workshop on Quality of Service, 2007.

Students Involved PhD students: –Zhichun Li, Yao Zhao (both in their 4th years) –Lanjia Wang (visiting PhD students) MS students: –Sagar Vemuri (2 nd year) –Jiazhen Chen (1st year)

10 Error-message Based DoS Attacks of Wireless Networks and the Defense

11 Vulnerability and Attack Methodology Processing error messages imprudently –Error messages are in clear text before authentication –Messages are trusted without integrity check Attacking requirements –Sniffing: easy for wireless networks –Spoofing before authenticated Easy for wireless LANs & doable for cellular networks Basic attack ideas Spoof and inject error messages or wrong messages that trigger error messages to clients and/or servers. Maybe a known problem but largely ignored

12 Outline Vulnerability and Attack Methodology Attack Case Studies –EAP protocols for wireless and cellular networks –Mobile IPv6 route optimization protocol (skipped) Countermeasures Conclusions

13 EAP Authentication on Wireless Networks EAP-FASTPEAPEAP-TTLS EAP Over LAN (EAPOL) Extensible Authentication Protocol (EAP) EAP Layer Data Link Layer WLAN EAP-TLS Authentication method layer TLS Authentication primitive GSM UMTS/ CDMA2000 EAP-AKAEAP-SIM Challenge/Response

14 TLS Authentication Procedure TLS Handshake Protocol Client and server negotiate a stateful connection using a handshake procedure.

15 DoS Attacks on TLS Authentication Sniff to get the client MAC address and IDs –Packet in clear text before authentication Send spoofed error messages –Before authentication is done, attacker spoofs an alert message of level ‘fatal‘, followed by a close notify alert. –Then the handshake protocol fails and needs to be tried again. Complete the DoS attack –The attacker repeats the previous steps to stop all the retries When this attack happens, WPA2,WPA or WEP are all in clear text.

16 DoS Attacks on TLS: Illustration Sending Error Alert message of level Fatal Can either attack client or server

17 DoS Attack on Challenge/Response over EAP-AKA Simple attack: Sending Error Rejection/ Notification message Client End Server End EAP-Request/Identity EAP-Response/Identity (NAI) AKA-Challenge (RAND, AUTN, MAC) AKA-Response (RES, MAC) EAP-Success AKA-Authentication-Reject AKA-Notification

18 DoS Attack Experiment on a WiFi Network with PEAP Protocols Hardware –Wifi cards with Atheros chipsets (e.g., Proxim Orinoco Gold wireless adapter) –MADWifi driver Code implementation –Libraries Sniffing: Libpcap library Spoofing: Lorcon library –Attacking code About 1200 lines of C++ code in Ubuntu linux

19 Field Test Results We conducted the EAP-TLS attack experiments at a Cafeteria. 7 mobile hosts and one Attacker We’ve successfully attacked all of them in one of the two channels

20 Attack Efficiency Evaluation For example, when attack happens at the second point –Just need to send 156 bytes of message to screw the whole 1049 bytes authentication messages. Attack Point 1 Ratio by # of Messages25.00% [1/4] Ratio by Bytes15.89% [78/491 ] Attack Point 2 Ratio by # of Messages28.57% [2/7] Ratio by Bytes14.87% [156/1049]

21 Scalability Evaluation by NS2 Simulations Vary the # of simultaneous sign-on clients up to 100 –All results are based on an average of 100 runs. Shows that the attacker is scalable: very few clients are able to authenticate successfully.

22 NS-2 Simulation Results II Even better results when sending error messages more aggressively by reducing the CWMin parameter of the attacker –The back-off time of attacker is reduced.

23 Outline Vulnerability and Attack Methodology Attack Case Studies –EAP protocols for wireless and cellular networks –Mobile IPv6 route optimization protocol (skipped) Countermeasures Conclusions

24 Countermeasures Enhance the robustness of the authentication protocol for wireless access –Delay decision making process by waiting for a short time for a success message (if any) to arrive; and –Give preference to success messages than the error ones. –Implemented and successfully thwart EAP-TLS attacks

25 Conclusions We have designed new methods to launch DoS attacks on security protocols using error messages. We found that any security protocol is vulnerable to such attacks as long as it supports a few error messages before the authentication step. We demonstrated the effect of these attacks on TLS and MIPv6 protocols. As far as we know, no authentication protocol currently is secure against such attacks. We suggest a few guidelines for the protocol designers and implementers to defend such attacks.

Backup Slides 26

27 EAP and TLS Authentication Extensible Authentication Protocol (EAP) is a PPP extension –Provides support for additional authentication methods within PPP. Transport Layer Security (TLS) –Mutual authentication –Integrity-protected cipher suite negotiation –Key exchange Challenge/Response authentication with pre-shared keys –Pre-shared key (Ki) in SIM and AuC –Auc challenges mobile station with RAND –Both sides derive keys based on Ki and RAND

28 Practical Experiment For the 33 different tries –All suffered an attack at Attack Point-1 –21% survive from the first attack but failed at the 2 nd Attack Point.

29 Simulate one TLS-Server, one TLS-Attacker and range the TLS-Clients between 1 to a maximum of 100. –The number of clients authenticate to the TLS server simultaneously. –It’s extremely rare case Base Station was set up to interface between the wired and wireless networks. The duplex-link between the BS and the TLS- Server was of 100MBps with a 10ms delay.

30 Case 2: Mobile IPv6 Routing-Optimization protocol

31 Mobile IPv6 Mobile IPv6 is a protocol which allows nodes to remain reachable while moving around in the IPv6 Internet. –Each mobile node is always identified by its home address, regardless of its current point of attachment to the Internet. –IPv6 packets addressed to a mobile node's home address are transparently routed to its care-of address. –The protocol enables IPv6 nodes to cache the binding of a mobile node's home address with its care-of address, and to then send any packets destined for the mobile node directly to it at this care-of address

32 Return Routability Procedure The procedure begins when the MN sends HoTI message to CN through HA and CoTI message directly to CN. Upon the receipt of the Binding Update, CN adds an entry for the MN in its Binding Cache and optionally sends Binding Acknowledgement. Once this happens, MN and CN will be capable of communicating over a direct route. –This way, the route between MN and CN is optimized.

33 Once Return Routability happens, MN and CN will be capable of communicating over a direct route The route between MN and CN is optimized. Return Routability Procedure

34 The Vulnerability Binding Error Vulnerability –Used to disable the Routing Optimization procedure. Binding Error message set Status to 2 (unrecognized MH Type value), Then the mobile node SHOULD cease the attempt to use route optimization. The Binding Error message is not protected. Bind Acknowledgement Vulnerability –The Bind Acknowledgement vulnerability affects the Return Routability procedure Binding Acknowledgement with status 136, 137 and 138 is used to indicate an error and not protected in any way Hence, it could be easily spoofed by an external entity

35 Bind Error Vulnerability The Vulnerability

36 Bind Acknowledgement Vulnerability The Vulnerability

37 Experiment Environment

38 Evaluation The MIPv6 Experiment is based on a LAN testbed. –Except the Mobile Node, all other components such as Home Agent and Correspondence Node are all connected via wired cable in the Northwestern network. We collected the data through 100 times experiment. Observed via the Wireshark running on the Mobile Node, for one successful attack, the time window is about 5ms in average and the Standard Deviation is 0.108ms for distribution The time consumed by computing the spoofed Error message is ms in average. The closer the attack to the Mobile Node, the higher probability we get for launching a successful Error Message attack.

39 PEAP Enhancement Original WPA supplicant v –Generate TLS ALERT on unexpected messages –Stop authentication on TLS ALERT Delayed response implementation –Drop unexpected message silently –Wait for 1 second when receiving TLS ALERT to allow multiple responses, and ignore TLS ALERT response if good responses are received. Verification – Redid the attack experiments and prove the effect of the countermeasures