Exploiting Open Functionality in SMS-Capable Cellular Networks 20123550 Chang-Jae Lee Some of the slides and figures were borrowed from the author’s slides.

Slides:



Advertisements
Similar presentations
U.S. Army Research Laboratory
Advertisements

EE:450 – Computer Networks
CprE 458/558: Real-Time Systems
By Taylor and Ed. Uses standard voice telephone lines Uses a modem to place a telephone call to another modem at a remote site Two major disadvantages.
PERFORMANCE One important issue in networking is the performance of the networkhow good is it? We discuss quality of service, an overall measurement.
M OBILE C OMMUNICATION S OLUTIONS FOR B USINESS. SMS Cellular Services (Pty) Ltd (SCS) was established in 1999 and is one of the leading WASPs in South.
Networks & Components Discuss the components required for successful communications Explain the purpose of communications software Identify various sending.
Ch. 10 Circuit Switching and Packet Switching
Tutorial 6 Mobile Communication Networks Mohamed Esam.
Scheduling in Wireless Systems. 2 CDMA2000: Overall Architecture Mobile Station.
This document have the main steps to calculate the GSM traffic.
CELLULAR COMMUNICATIONS GSM/GPRS/EDGE. Groupe Speciale Mobile/Global System for Mobile.
British Computer Society Presents Mobile Telecommunication By Nadine Mouali Technical Presentation Monday 17 June, 2002.
Traffic Shaping Why traffic shaping? Isochronous shaping
1.  Congestion Control Congestion Control  Factors that Cause Congestion Factors that Cause Congestion  Congestion Control vs Flow Control Congestion.
On Cellular Botnets: Measuring the Impact of Malicious Devices on a Cellular Network Core Patrick Michael Lin, Machigar Ongtang, Vikhyath.
David Waitt Kate Disney 2008 April Digitizing An Analog World.
On Attack Causality in Internet- Connected Cellular Networks Presented by EunYoung Jeong.
Mobility Management in Mobile Wireless Systems Lecture 9.
James 1:5 If any of you lacks wisdom, he should ask God, who gives generously to all without finding fault, and it will be given to him.
Senior Design Project 2004/2005 Web Enabled Calling Number Delivery Daniel St. Clair Barron Shurn Professor Soules 10/28/2004.
GSM Security Overview (Part 1)
Ch 23 1 Based on Data Communications and Networking, 4th Edition. by Behrouz A. Forouzan, McGraw-Hill Companies, Inc., 2007 Ameera Almasoud.
Internet Quarantine: Requirements for Containing Self-Propagating Code David Moore et. al. University of California, San Diego.
Exploiting Open Functionality in SMS-Capable Cellular Networks Authors: William Enck, Patrick Traynor, Patrick McDaniel, and Thomas La Porta Publication:
3/26/081 Exploiting Open Functionality in SMS- Capable Networks William Enck, Patrick Traynor, Patrick McDaniel, and Thomas La Porta Systems and Internet.
Chapter 3 part II Data and Signals
BOTNETS & TARGETED MALWARE Fernando Uribe. INTRODUCTION  Fernando Uribe   IT trainer and Consultant for over 15 years specializing.
0 Mining call data to increase the robustness of cellular networks to DoS attacks Hui Zang and Jean Bolot Sprint
How an SMS-Based Malware Infection Will Get Throttled by the Wireless Link Roger Piqueras Jover (w. Ilona Murynets) AT&T Security Research Center June.
Communication Networks
Chapter 4 Computer Networks – Part 1
New Technologies Wireless Communication Really Personal Computers Network Object-Oriented Processing The Changing Internet The Next Big Thing.
Data Comm. & Networks Instructor: Ibrahim Tariq Lecture 3.
Fall 2011 Patrick Johnson “The wireless telegraph is not difficult to understand. The ordinary telegraph is like a very long cat. You pull the.
GSM TOWARDS LTE NETWORKS Lecture # 6. CELL PLANNING.
Networks and Protocols CE Week 5b. WAN’s, Frame Relay, DSL, Cable.
POSTECH DP&NM Lab. Internet Traffic Monitoring and Analysis: Methods and Applications (1) 4. Active Monitoring Techniques.
Short Message Service
Mitigating Attacks on Open Functionality in SMS-Capable Cellular Networks Patrick Traynor, William Enck, Patrick McDaniel, and Thomas La Porta | MobiCom.
Mobile Communication The SMS implies of several additional elements in the network architecture There is also another Element called.
BY N.SUDHEER KUMAR E.C.E BY N.SUDHEER KUMAR E.C.E.
02 – Performance Basics 1CS Computer Networks.
Computer Networks with Internet Technology William Stallings
ﺑﺴﻢﺍﷲﺍﻠﺭﺣﻣﻥﺍﻠﺭﺣﻳﻡ. Group Members Nadia Malik01 Malik Fawad03.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Cellular warfare Karlis Podins Outline cellular phone networks known attacks threats introduced by smartphones mitigation.
Basics of Wireless Networks – Ch. 2 (pp 6-14)
Lecture # 03 Switching Course Instructor: Engr. Sana Ziafat.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Connecting Devices CORPORATE INSTITUTE OF SCIENCE & TECHNOLOGY, BHOPAL Department of Electronics and.
Focus On Bluetooth Security Presented by Kanij Fatema Sharme.
Doc.: IEEE /66r0 Submission March 2000 Nada Golmie, NISTSlide 1 IEEE P Working Group for Wireless Personal Area Networks WPAN Coexistence.
Support for Multimedia Traffic in Mobile, Distributed, Multiple-Hop Wireless Networks Steven Boyd S.U.R.E. Program 2003.
GSM System Survey Channel Concepts Syed Amir Abbas.
Telephone and Telecommunication. Telephone - a device for transmitting and receiving sound at a distance. Modern phones are performed through the transmission.
1 IEX8175 RF Electronics Avo Ots telekommunikatsiooni õppetool, TTÜ raadio- ja sidetehnika inst.
Computer Communication & Networks Lecture # 03 Circuit Switching, Packet Switching Nadeem Majeed Choudhary
Revision Unit 1 – The Online World Online Services Online Documents Online Communication Cloud Computing The Internet Internet Infrastructure Internet.
Lecture # 3: WAN Data Communication Network L.Rania Ahmed Tabeidi.
Modern Mobile Technologies By: Vincent Verner. Overview Mobile hardware Generation speed standards How mobile networks work Current mobile security measures.
DWAN ALSTON SMS TECHNOLOGY WHAT IS SMS????? SMS stands for Short Message Service. It is a technology that enables the sending and receiving of messages.
Mobile Computing - Unit II. UNIT - II Introduction:  The analog mobile systems were originally targeted for a relatively select group of users who mostly.
1 Wireless Networks Lecture 17 GPRS: General Packet Radio Service (Part I) Dr. Ghalib A. Shah.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Muhammad Waseem Iqbal Lecture # 20 Data Communication.
Lecture Multiple Access Techniques Dr. Ghalib A. Shah
Point-to-Point Network Switching
Mitigating Attacks on Open Functionality in SMS-Capable Cellular Networks Ashvin Bodhale CS 388.
Ali Umar FRCSI EMDM FCEM
Hubs Hubs are essentially physical-layer repeaters:
Exploiting Open Functionality in SMS-Capable Cellular Networks
Presentation transcript:

Exploiting Open Functionality in SMS-Capable Cellular Networks Chang-Jae Lee Some of the slides and figures were borrowed from the author’s slides

Intro  SMS(Short Message Service):  a short text message transmission(asynchronous)  Can be delivered via internet  Extremely popular  69 million in a day (UK)

More Terminologies  Cellular Network  Radio Network or infrastructure  Base Station  Cellular towers  Channel  A frequency cellphone comm. are Tx-ed  Sector  A cell region covered by fixed channels

SMS in Cellular Network

SMS in Cellolar Network(cont’d)

The “Air Interface”  Traffic Channel(TCh)  For voice traffic  Control Channel(CCh)  For signaling btw BS and phones  …and for SMS messages  CCh was not designed for SMS

The “Air Interface”(cont’d)  (Figures) Stand-alone Dedicated CCh

The “Air Interface”(cont’d)  Time Division MUXing of GSM  8 time slot/Ch  PCh, SDCCh: embedded in CCh  (2 * # of channels) of SDCCh

The “Air Interface”(cont’d)  Once SDC Channel is full with SMS, call setup is blocked  An adversary’s goal: fill the cell network with SMS traffic

Vulnerability Analysis  Profiling attributes  …by GSM Gray-box testing  About implementation specific specs  Example: How many SMS/hr per SDCCh?  How are SMS messages stored?

Vulnerability Analysis(cont’d)  Phone capacity  Slowly inject messages to target phone  Result  30~50 messages can be stored(old phones)  ~500 messages exhaust battery(high-end ones)

Vulnerability Analysis(cont’d)  Injection vs Delivery rate  Result: large imbalance between two  Many sites provides bulk SMS sending  ~1000s msgs/sec can be sent

Vulnerability Analysis(cont’d)  Interface regulation  Check limitations on Providers’ web interfaces  IP-based(AT&T, Verizon), session cookies(Sprint)  Spam filtering drops cannot be found  30~35 msgs/sec can be sent usually

Gray-box Test Summary  Some msgs injected would be lost  Msgs can be injected 100s times faster than can be delivered  Interfaces have some anti-triggers against mass injection  Conclusion: an attacked should be distributed & multi-targeted

Hit-List  Need a Hit-List for multi-targeted  How to get a Hit-List 1) Web scraping 2) Worms Get recent call list, etc 3) Search Internet for NPA/NXX DB

Hit-List(cont’d)  Web scraping  Google like …9999

Hit-List(cont’d)  NPA/NXX DB search  Prefix can be identified via target area

Hit-List(cont’d)  SMS sending sites also gives info.  Provider web interfaces checks if the destination number is valid

Area Capacity  Capacity can be calculated:  Manhattan case is here: C = (sectors/area)*(SDCCHs/sector)*(throughput/SDCCH)

Area Capacity(cont’d)  1 msg = 1500 bytes(max length)  165 msgs/sec = kb/sec  Cable modem: ~768 kb/sec  Can be kb/sec with multi-send interface

Attack Scenario  Hit-List with 2500 numbers  Average ~50 msgs for device buffer  8 dedicated channels  1 message in 10.4 sec (per phone)  About 8.7 min to fill buffers

Attack Scenario(cont’d)  Saturate queues  Messages exceeding saturation levels are lost  SMSC queue: ~500 msgs  Device: 30 ~ 50 msgs

Attack Aftermath  Messages are gone!  Also messages are delayed  Some devices lose even more data (when full, delete old read messages)  Battery depletion expected

Solution for the Attack  Separate queues for control & SMS  Limit rates  Next Generation Network

Conclusion  Cellular network is a critical resource in social or economic structures  External devices’ misuse can be fatal