On Cellular Botnets: Measuring the Impact of Malicious Devices on a Cellular Network Core Patrick Michael Lin, Machigar Ongtang, Vikhyath.

Slides:



Advertisements
Similar presentations
GSM infrastructure MSC, BSC, BTS, VLR, HLR, GSGN, GSSN
Advertisements

Mobile Cellular Networks Evolution –1st generation, 1980s analogue voice –2nd generation 1990s digital Voice, fax data 95% coverage of UK by 1991 –3rd.
Exploiting Open Functionality in SMS-Capable Cellular Networks Chang-Jae Lee Some of the slides and figures were borrowed from the author’s slides.
Islamic University-Gaza Faculty of Engineering Electrical & Computer Engineering Department Global System for Mobile Communication GSM Group Alaa Al-ZatmaHosam.
UMA (Unlicensed Mobile Access) El Ayoubi Ahmed Hjiaj Karim.
Location Based Service Aloizio P. Silva Researcher at Federal University Of Minas Gerais, Brazil Copyright © 2003 Aloizio Silva, All rights reserved. School.
GSM Network. GSM-Introduction Architecture Technical Specifications Frame Structure Channels Security Characteristics and features Applications Contents.
On Attack Causality in Internet- Connected Cellular Networks Presented by EunYoung Jeong.
Wireless, Mobile Networks – Mobility. Wireless, Mobile Networks6-2 Mobility: Vocabulary home network: permanent “home” of mobile (e.g., /24)
GSM standard (continued)
Mobility Management in Mobile Wireless Systems Lecture 9.
GSM Security Overview (Part 1)
Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on.
Exploiting Open Functionality in SMS-Capable Cellular Networks Authors: William Enck, Patrick Traynor, Patrick McDaniel, and Thomas La Porta Publication:
Cellular Mobile Communication Systems Lecture 7
Mobile Handset Cellular Network Basics + GSM. Cellular Network Basics There are many types of cellular services; before delving into details, focus on.
MOBILE PHONE ARCHITECTURE & TECHNOLOGY. HISTORY  The idea of the first cellular network was brainstormed in 1947  Disadvantages  All the analogue system.
Cellular IP: Proxy Service Reference: “Incorporating proxy services into wide area cellular IP networks”; Zhimei Jiang; Li Fung Chang; Kim, B.J.J.; Leung,
 The GSM network is divided into two systems. each of these systems are comprised of a number of functional units which are individual components of the.
Evolution from GMS to UMTS
SEMINAR ON “ GPRS “ GPRS- General Packet Radio Service provides a direct link into the Internet from a GSM phone Downloaded From Projectsbhangar.com.
How an SMS-Based Malware Infection Will Get Throttled by the Wireless Link Roger Piqueras Jover (w. Ilona Murynets) AT&T Security Research Center June.
정보보호 및 알고리즘 조호성. Contents 정보보호 및 알고리즘 2.
GSM: The European Standard for Mobile Telephony Presented by Rattan Muradia Requirement for course CSI 5171 Presented by Rattan Muradia Requirement for.
جلسه دهم شبکه های کامپیوتری به نــــــــــــام خدا.
Mobile Technologies Introduction Basics of GSM Value Added Services SMS Short Codes Asterisk * LBS.
CDMA Network Structure and Components Lance Westberg.
GSM Network Structure Lance Westberg.
Network: Location Management Y. Richard Yang 3/21/2011.
CELLULAR DATA NETWORKS Mr. Husnain Sherazi Lecture 5.
Mitigating Attacks on Open Functionality in SMS-Capable Cellular Networks Patrick Traynor, William Enck, Patrick McDaniel, and Thomas La Porta | MobiCom.
Network components of the Switching Subsystem The switching Subsystem comprises the following subsystems. MSC (Mobile Switching Centre) HLR (Home location.
Cellular Mobile Communication Systems Lecture 8
Location Management. The trends in telecom are proceeding with a strong tendency towards increasing need of mobility in access links within the network.
Mobile Computing Cellular Concepts. Cellular Networks Wireless Transmission Cellular Concept Frequency Reuse Channel Allocation Call Setup Cell Handoffs.
#1EETS 8316/NTU TC 745, Fall 2003 ENGINEERINGSMU Southern Methodist University Fall 2003 EETS 8316/NTU CC745-N Wireless Networks Lecture 2: Switching Network.
Mobile Communication The Mobile Station (MS) is the user equipment in GSM. The MS is what the user can see of the GSM system, the cellular phone itself.
PLMN Network Intelligence 2 © Manzur Ashraf. Switching.
Introduction to the GSM– -Wireless communication system Definition -handoff -Call setup -Cell shape -GSM Applications.
GSM Mobile Computing IT644.
GSM Network Architecture
GSM System Survey Channel Concepts Syed Amir Abbas.
Communication Protocol Engineering Lab. Hyoung Joo. Nam. 1 GSM System Overview Wireless and Mobile Network Architecture Nam Hyoung-Joo
Contents Introduction What are Location-based services Working of Location-based services Location Tracking Technologies Power profiling a mobile phone.
GPRS 1. Before GPRS: HSCSD  HSCSD or High Speed Circuit Switched Data was the first upgrade to be standardized by ETSI to bring high speed data to GSM.
Accommodating mobility with direct routing
Computer Networks with Internet Technology William Stallings
Fair and Efficient multihop Scheduling Algorithm for IEEE BWA Systems Daehyon Kim and Aura Ganz International Conference on Broadband Networks 2005.
 GPRS What’s in this slide?  Introduction to GPRS.  History  GPRS Service.  GPRS Speeds.  GPRS Mobile Devices.  Services of GPRS.  GPRS in practice.
Patrick Traynor, Michael Lin, Machigar Ongtang, Vikhyath Rao, Trent Jaeger, Patrick McDaniel, and Thomas La Porta 2/29/2012.
Cellular Networks 1. Overview 1G Analog Cellular 2G TDMA - GSM 2G CDMA - IS G 3G 4G and Beyond Cellular Engineering Issues 2.
GPRS General Packet Radio Service Shay Toder – Ori Matalon The Department of Communication System Engineering Ben-Gurion University June 19, 2002.
DWAN ALSTON SMS TECHNOLOGY WHAT IS SMS????? SMS stands for Short Message Service. It is a technology that enables the sending and receiving of messages.
1 Lecture 19 EEE 441 Wireless And Mobile Communications.
1 Wireless Networks Lecture 17 GPRS: General Packet Radio Service (Part I) Dr. Ghalib A. Shah.
9 Transmission and Switching Mohamed Ashour, German University in Cairo Mohamed Ashour Lecture Fall 2011 AC = authentication center BSS = base station.
Threat, Analysis and Mitigation
Overview of the GSM for Cellular System
Cellular Networks Wireless Transmission Cellular Concept
Global System for Mobile Communications
GSM SECURITY AND ENCRYPTION
Mitigating Attacks on Open Functionality in SMS-Capable Cellular Networks Ashvin Bodhale CS 388.
Name:Shivalila A H,Shima
Subject Name: GSM Subject Code: 10EC843
Global system for Mobile Communications
GPRS Architecture Ayan Ganguly Bishakha Roy Akash Dutta.
Exploiting Open Functionality in SMS-Capable Cellular Networks
Dept. of Business Administration
Security in Wide Area Networks
Cellular Telephone Networks
Presentation transcript:

On Cellular Botnets: Measuring the Impact of Malicious Devices on a Cellular Network Core Patrick Michael Lin, Machigar Ongtang, Vikhyath Rao, Trent Jaeger, Patrick McDaniel and Thomas La ACM CCS 2009

.... We have background knowledge !

Background Knowledge Core Network in GSM Reference:

Background Knowledge (cont.) Glossary ▫MSC: Mobile Switching Center  Act as telephony switch and deliver circuit-switched traffic in a GSM network  Handoff (handover) / Roaming  Update information with HLR

Background Knowledge (cont.) ▫HLR: Home Location Register  Users are assigned to specific HLR’s based on their phone number  The central repository of user profile data ▫VLR: Visitor Location Register  Each MSC has a VLR  VLRs save all information of the cellphones in this Location Area

Outline Introduction Overview of Cellular Systems Attack Overview Charactering HLR Performance Profiling Network Behavior Attack Characterization Avoiding Wireless Bottlenecks Attack Mitigation Conclusion

Introduction Denial of Service attacks on HLR Botnets as small as phones can cause a reduction of throughput of more than 90% Contributions: ▫Attack Characterization and Quantification ▫Reduce Adversary’s Workload ▫Provide Intelligent Control Mechanisms

Overview of Cellular Systems Mobile Phone Architecture ▫Application Processor  Support normal OS functionality ▫Baseband Processor  Establish telephony and data links  Invoke network supported services When a process needs to use the network, the Application Processor passes an AT command to the Baseband Processor

Overview of Cellular Systems(cont.) Mobile OS ▫Windows Mobile, Android, Mobile OS X… ▫Just begin to implement basic security mechanisms  Memory protection and separation of privilege 10% of cellular users downloaded games at least once a month in 2007

Attack Overview Attacker Legitimate User

Attack Overview (cont.) Different from DoS on the Internet ▫Mobile devices cannot transmit entirely arbitrary requests to HLR ▫Such requests must be made in a manner such that unnecessary traffic or side effects are not generated

Characterizing HLR Performance Telecom One (TM1) Benchmarking Suite ▫MQTh: Maximum Qualified Throughput Setting: ▫HLR:  Xeon 2.3 GHz * GB RAM  Linux  MySQL or SolidDB v6.0

Characterizing HLR Performance Normal HLR Behavior ▫The number of subscribers per HLR  Reality: ~ five million ▫The rate and type of service requests

Characterizing HLR Performance MQTh vs Numbers of subscribers

Characterizing HLR Performance MySQL ▫Only caching data and indexes are stored in memory SolidDB ▫All in memory

Characterizing HLR Performance Different commands on MySQL

Characterizing HLR Performance Different commands vs Number of subscribers

Profiling Network Behavior Setting: ▫Nokia 9500 with Symbian S80 ▫Motorola A1200 with Linux kernel ▫Live cellular network ▫AT command + 2 sec delay  Repeat 200 times during low traffic hours  Some phones caused extended delays as immediate execution

Profiling Network Behavior (cont.) GPRS Attach: update_location

Profiling Network Behavior (cont.) Avg: 2.5 sec // Peak: 3 sec

Profiling Network Behavior (cont.) Comparsion: GPRS Detach

Profiling Network Behavior (cont.) GPRS Attach ▫Turnaround time:  3 sec response time + 2 sec command delay  0.2 commands per second  But.. Only one in five commands reach the HLR  0.2/5 = 0.04 commands per second

Profiling Network Behavior (cont.) Call Waiting: update_subscriber_data

Profiling Network Behavior (cont.) Avg: 2.5 sec

Profiling Network Behavior (cont.) Call Waiting ▫Turnaround time:  2.5 sec + 2 sec  0.22 commands per second  Better than update_location

Profiling Network Behavior (cont.) Insert/Delete Call Forwarding ▫ insert_call_forwarding / delete_call_forwarding

Profiling Network Behavior (cont.) Avg: 2.7 sec (insert) / 2.5 sec (delete)

Profiling Network Behavior (cont.) Insert Call Forwarding ▫0.21 commands per second ▫Extra database read Delete Call Forwarding ▫0.19 commands per second ▫Only can be sent if call forwarding is enabled Choose insert_call_forwarding

Attack Characterization The effect of an attack on HLR with 1 million users (MySQL)

Attack Characterization With SolidDB

Attack Characterization MySQL: ▫Normal condition: infected mobile phones  1.2% ▫High traffic: infected mobile phones  2.4% SolidDB: ▫ infected mobile phones  14.1%

Avoiding Wireless Bottlenecks Random Access Channel (RACH) Capacity ▫TDMATDMA  Timeslot: ms  A frame: 8 timeslots = ms ▫Slotted ALOHA protocolSlotted ALOHA protocol

Avoiding Wireless Bottlenecks Max throughput S ▫S is maximized at 37% when G=1 ▫G is the number of transmission attempts per timeslot

Avoiding Wireless Bottlenecks The offered load, G, also known as ρ, is defined as: ▫λ is the arrival rate in commands per second ▫1/μ is the channel hold time (4.615 ms) ▫ρ = 1/ * 0.37 = 80 transmission per sec

Avoiding Wireless Bottlenecks The attack would need to be distributed over α base stations:

Avoiding Wireless Bottlenecks Standalone Dedicated Control Channels (SDDCH) ▫Sectors in GSM allocate 8 or 12 SDCCHs ▫We hold SDCCH for 2.7 sec ( insert_call_forwarding )

Command and Control Internet Coordination ▫3G Local Wireless Coordination ▫Bluetooth / WiFi Indirect Local Coordination ▫Via RACH

Attack Mitigation HLR Replication? Filtering Call gapping

Conclusion Small botnets composed entirely of mobile phones pose significant threats to the availability of these network C & C channel is more challenging in this environment