Exploiting Open Functionality in SMS-Capable Cellular Networks Authors: William Enck, Patrick Traynor, Patrick McDaniel, and Thomas La Porta Publication:

Slides:



Advertisements
Similar presentations
Communication Topics Jason Hill –
Advertisements

GSM infrastructure MSC, BSC, BTS, VLR, HLR, GSGN, GSSN
Networks & Components Discuss the components required for successful communications Explain the purpose of communications software Identify various sending.
Exploiting Open Functionality in SMS-Capable Cellular Networks Chang-Jae Lee Some of the slides and figures were borrowed from the author’s slides.
Islamic University-Gaza Faculty of Engineering Electrical & Computer Engineering Department Global System for Mobile Communication GSM Group Alaa Al-ZatmaHosam.
On Cellular Botnets: Measuring the Impact of Malicious Devices on a Cellular Network Core Patrick Michael Lin, Machigar Ongtang, Vikhyath.
On Attack Causality in Internet- Connected Cellular Networks Presented by EunYoung Jeong.
Wireless, Mobile Networks – Mobility. Wireless, Mobile Networks6-2 Mobility: Vocabulary home network: permanent “home” of mobile (e.g., /24)
The Wireless Communication System Xihan Lu. Wireless Communication Cellular phone system Cordless telephone system Bluetooth Infrared communication Microwave.
1G PERSONAL COMMUNICATION SYSTEMS: AMPS (PART III) Ian F. Akyildiz Broadband & Wireless Networking Laboratory School of Electrical and Computer Engineering.
SMS WATCHDOG: PROFILING SOCIAL BEHAVIORS OF SMS USERS FOR ANOMALY DETECTION Authors: Guanhua Yan, Stephan Eidenbenz, Emannuele Galli Presented by: Ishtiaq.
First and Second Generation
GSM Security Overview (Part 1)
NCHU AI LAB Implications of Unlicensed Mobile Access for GSM security From : Proceeding of the First International Conference on Security and Privacy for.
Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on.
3/26/081 Exploiting Open Functionality in SMS- Capable Networks William Enck, Patrick Traynor, Patrick McDaniel, and Thomas La Porta Systems and Internet.
SHORT MESSAGE SERVICE(SMS)
MOBILE PHONE ARCHITECTURE & TECHNOLOGY. HISTORY  The idea of the first cellular network was brainstormed in 1947  Disadvantages  All the analogue system.
 The GSM network is divided into two systems. each of these systems are comprised of a number of functional units which are individual components of the.
Niranjan Balasubramanian Aruna Balasubramanian Arun Venkataramani University of Massachusetts Amherst Energy Consumption in Mobile Phones: A Measurement.
Evolution from GMS to UMTS
Data Communications and Networking
85/06/15 Mahdi Niamanesh 1 Messaging Future Mahdi Niamanesh Sharif Univ. of Technology 85/08/10.
LEVERAGING UICC WITH OPEN MOBILE API FOR SECURE APPLICATIONS AND SERVICES Ran Zhou 1 9/3/2015.
How an SMS-Based Malware Infection Will Get Throttled by the Wireless Link Roger Piqueras Jover (w. Ilona Murynets) AT&T Security Research Center June.
VoIP security : Not an Afterthought. OVERVIEW What is VoIP? Difference between PSTN and VoIP. Why VoIP? VoIP Security threats Security concerns Design.
정보보호 및 알고리즘 조호성. Contents 정보보호 및 알고리즘 2.
CELLULAR ARCHITECTURE FOR SMS- TXT BASED MOBILE MARKETING Course Faculty: Mrs Yasmin Malik Venue: IBA City Campus, Karachi Course Start Date: Spring 2012.
Mobile Technologies Introduction Basics of GSM Value Added Services SMS Short Codes Asterisk * LBS.
CDMA Network Structure and Components Lance Westberg.
GSM Network Structure Lance Westberg.
Network: Location Management Y. Richard Yang 3/21/2011.
CELLULAR DATA NETWORKS Mr. Husnain Sherazi Lecture 5.
GSM TOWARDS LTE NETWORKS Lecture # 2. CELLULAR GENERATIONS First Generation Wireless : Analog Second Generation Wireless (2G): Digital Second Generation.
Mitigating Attacks on Open Functionality in SMS-Capable Cellular Networks Patrick Traynor, William Enck, Patrick McDaniel, and Thomas La Porta | MobiCom.
BY N.SUDHEER KUMAR E.C.E BY N.SUDHEER KUMAR E.C.E.
TELE202 Lecture 5 Packet switching in WAN 1 Lecturer Dr Z. Huang Overview ¥Last Lectures »C programming »Source: ¥This Lecture »Packet switching in Wide.
Switching breaks up large collision domains into smaller ones Collision domain is a network segment with two or more devices sharing the same Introduction.
Cellular Mobile Communication Systems Lecture 8
Energy Consumption in Mobile Phones: A Measurement Study and Implications for Network Applications REF:Balasubramanian, Niranjan, Aruna Balasubramanian,
Lemonade Requirements for Server to Client Notifications draft-ietf-lemonade-server-to-client-notifications-00.txt S. H. Maes C. Wilson Lemonade Intermediate.
#1EETS 8316/NTU TC 745, Fall 2003 ENGINEERINGSMU Southern Methodist University Fall 2003 EETS 8316/NTU CC745-N Wireless Networks Lecture 2: Switching Network.
Computer Networks with Internet Technology William Stallings
Lecture 5 Intersystem Operation. Basic AMPS Gives air interface between tower and mobile phone Does not provide capability to deliver roaming between.
Mobile Telephone System And GSM Security. The Mobile Telephone System First-Generation Mobile Phones First-Generation Mobile Phones Analog Voice Analog.
GSM TOWARDS LTE NETWORKS
Introduction to the GSM– -Wireless communication system Definition -handoff -Call setup -Cell shape -GSM Applications.
GSM Network Architecture
Lecture # 03 Switching Course Instructor: Engr. Sana Ziafat.
Session 2.
Focus On Bluetooth Security Presented by Kanij Fatema Sharme.
1 IEX8175 RF Electronics Avo Ots telekommunikatsiooni õppetool, TTÜ raadio- ja sidetehnika inst.
Accommodating mobility with direct routing
Patrick Traynor, Michael Lin, Machigar Ongtang, Vikhyath Rao, Trent Jaeger, Patrick McDaniel, and Thomas La Porta 2/29/2012.
Communication Methods
Computer Communication & Networks Lecture # 03 Circuit Switching, Packet Switching Nadeem Majeed Choudhary
Cellular Networks 1. Overview 1G Analog Cellular 2G TDMA - GSM 2G CDMA - IS G 3G 4G and Beyond Cellular Engineering Issues 2.
GPRS General Packet Radio Service Shay Toder – Ori Matalon The Department of Communication System Engineering Ben-Gurion University June 19, 2002.
DWAN ALSTON SMS TECHNOLOGY WHAT IS SMS????? SMS stands for Short Message Service. It is a technology that enables the sending and receiving of messages.
1 Lecture 19 EEE 441 Wireless And Mobile Communications.
Cellular Wireless Networks. Cellular Network Organization Multiple low power transmitters —100w or less Area divided into cells —Each with own antenna.
1 Wireless Networks Lecture 17 GPRS: General Packet Radio Service (Part I) Dr. Ghalib A. Shah.
Global System for Mobile Communications
Communication Topics Jason Hill –
Mitigating Attacks on Open Functionality in SMS-Capable Cellular Networks Ashvin Bodhale CS 388.
CS1: Wireless Communication and Mobile Programming
Global system for Mobile Communications
GPRS Architecture Ayan Ganguly Bishakha Roy Akash Dutta.
Exploiting Open Functionality in SMS-Capable Cellular Networks
GSM Call Setup.
Presentation transcript:

Exploiting Open Functionality in SMS-Capable Cellular Networks Authors: William Enck, Patrick Traynor, Patrick McDaniel, and Thomas La Porta Publication: 12th ACM conference on Computer and communications security, November 2005 Presenter: Brad Mundt for CAP6133 Spring ‘08

Motivation SMS  Ingrained into modern culture  69 million messages per day in UK  10 cents per message  Popular with telecom Voice traffic is fixed revenue, unlike SMS Opened up the system- web, , IM…

Motivation… Internet-originated text messages Deny voice service to a city  Zombies  Hit lists Similar to traffic from Slammer worm  BoA ATMs, 911 services

Presentation Flow Cellular Network Overview Vulnerability Analysis  Research  Discovery Attack vectors and implements Scenario Other stuff

SMS/Cellular Network Sending  Mobile device or ESME External Short Messaging Entities (ESME) Delivering  Short Messaging Service Center (SMSC) SMS formatting Queued for forwarding Query Home Location Register (HLR) for directions

SMS/Cellular Network Delivering (Continued)  HLR Subscriber Info, call waiting, text messaging If user is busy, store SMS for later Otherwise give address for MSC  Mobile Switching Center

SMS/Cellular Network Delivering (Continued)  MSC Service, Authentication Location management for BS, no not that BS!  Base Stations Hand offs / gateway to PSTN  Public Switched Telephone Network Query Visitor Location Register (VLR)  Returns Info when device is away from HLR  Forwards to correct BS for delivery

SMS/Cellular Network

Vulnerability Analysis Bottlenecks  System is a composite of multiple Queuing Points  Injection rate versus delivery rate Targeting Queues  SMSC Finite number in queue, SMS age, policy Messages remain in SMSC buffer when device is full  Device 500 messages drained a battery

Plan Messages exceeding saturation levels are lost  Successful DoS needs Multiple subscribers Multiple interfaces Hit-lists and Zombies

Hit-list Creation Internet search for NPA/NXX DB  Target wireless numbers by domain owner name Web Scraping Worm  Device recently call lists  Computers that sync with device

Attack profile attributes GSM gray-box testing  900 SMS per hour on each dedicated channel  1 dedicated channel per 4 voice  2 dedicated channels per carrier Protocol sharing Number of dedicated channels per area Number of carriers per area

Cellular device channels Two Channels  Control Channel (CCH) Common CCH  BS uses for voice and SMS connections establishment  All connected mobiles are listening on this for signaling Dedicated CCH  Data  Traffic Channel (TCH) Voice

Attack Scenario 2500 numbers in hit list Average 50 message device buffer 8 dedicated channels, (D.C.) 1 message per phone every 10.4 sec 8.68 min to fill buffers

Targeted Attacks Fill the buffers, users loose messages Data loss on some devices from overflowing  Read messages overwritten when new ones arrive (Nokia 3560) Message delays due to overflowing  Campus alert messages- blocking? Deleting junk SMS, accidentally delete good ones Battery depletion

Tomorrows SPAM Phishing Viruses  Cabir and Skulls Both were bluetooth

SMS Spam

Summary Cellular networks are critical part of  Social and economic infrastructures Potential misuse from external services  DoS  InfoWar  Economic

Contributions Security impact of SMS on Cellular network Demonstrate ability to deny serivce to city sized area Techniques for targeting these systems How to avoid

Weaknesses Gray-box testing  Documentation  Experimentation without EULA violations Time of Day / Day of Week Payload size variations Estimations

How to Improve Traffic analysis for  Time of Day / Day of Week Vary payload size If White hats, work with the telecoms Validate for more facts

The End Thank you…