Can You Infect Me Now? Malware Propagation in Mobile Phone Networks Authors: Presented by: Michael Annichiarico.

Slides:



Advertisements
Similar presentations
Thank you to IT Training at Indiana University Computer Malware.
Advertisements

Chapter 1 We’ve Got Problems…. Four Horsemen  … of the electronic apocalypse  Spam --- unsolicited bulk o Over 70% of traffic  Bugs ---
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
Modeling Malware Spreading Dynamics Michele Garetto (Politecnico di Torino – Italy) Weibo Gong (University of Massachusetts – Amherst – MA) Don Towsley.
SOCELLBOT: A New Botnet Design to Infect Smartphones via Online Social Networking th IEEE Canadian Conference on Electrical and Computer Engineering(CCECE)
A Preliminary Investigation of Worm Infections in a Bluetooth Environment PAPER REVIEW ANISH DUTTA RAGAVENDRAN SRINIVASAN SABAREESWAR.
DDOS Defense by Offense OFFENSE Presented by: Anup Goyal Aojan Su.
MOSQUITO BREEDING ATTACK: Spread of bots using Peer To Peer INSTRUCTOR: Dr.Cliff Zou PRESENTED BY : BHARAT SOUNDARARAJAN & AMIT SHRIVATSAVA.
1 Capacity planning exercise M.Sc. Mika Husso
Universität Rostock1 A P2P network traffic and access control protocol Herwig Unger Albert – Einstein-Str. 23, Rostock, Germany Phone:
Introduction to Security Computer Networks Computer Networks Term B10.
Michael Walfish, Mythili Vutukuru, Hari Balakrishanan, David Karger, Scott Shankar DDos Defense by Offense.
Simulation Where real stuff starts. ToC 1.What, transience, stationarity 2.How, discrete event, recurrence 3.Accuracy of output 4.Monte Carlo 5.Random.
1 November 2 nd, 2007WORM’07 Can You Infect Me Now? Chris Fleizach 1, Michael Liljenstam 3, Per Johansson 2, Geoffrey M. Voelker 1 and András Méhes
A Performance Analysis of Fixed and Dynamic Channel Allocation Schemes in Cellular Networks Author Muhammad Emran Co-authors Syed Asad Hussain, Saqib Hussain.
DDoS Defense by Offense Presented by: Matthew C.H. Ma Damon Chan.
Adaptive Self-Configuring Sensor Network Topologies ns-2 simulation & performance analysis Zhenghua Fu Ben Greenstein Petros Zerfos.
Department of Computer Engineering Koc University, Istanbul, Turkey
Cellular System Capacity Maximum number of users a cellular system can support in any cell. Can be defined for any system. Typically assumes symmetric.
Networks Evolving? Justin Champion C208 Ext:3723
How to Own the Internet in your spare time Ashish Gupta Network Security April 2004.
Internet Quarantine: Requirements for Containing Self-Propagating Code David Moore et. al. University of California, San Diego.
DDoS Attack and Its Defense1 CSE 5473: Network Security Prof. Dong Xuan.
1 Worm Modeling and Defense Cliff C. Zou, Don Towsley, Weibo Gong Univ. Massachusetts, Amherst.
How an SMS-Based Malware Infection Will Get Throttled by the Wireless Link Roger Piqueras Jover (w. Ilona Murynets) AT&T Security Research Center June.
Unit 2 - Hardware Computer Security.
Discovery of Emergent Malicious Campaigns in Cellular Networks Nathaniel Boggs, Wei Wang, Suhas Mathur, Baris Coskun, Carol Pincock © 2013 AT&T Intellectual.
Network Security Introduction Some of these slides have been modified from slides of Michael I. Shamos COPYRIGHT © 2003 MICHAEL I. SHAMOS.
Chapter Nine Copyright © 2006 McGraw-Hill/Irwin Sampling: Theory, Designs and Issues in Marketing Research.
1 Mobility Aware Server Selection for Mobile Streaming Multimedia CDN Muhammad Mukarram Bin Tariq, Ravi Jain, Toshiro Kawahara {tariq, jain,
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
The Distributive ebXML Grid By David Lyon GTD Technologies Pty Limited Sydney, Australia.
1 How to 0wn the Internet in Your Spare Time Authors: Stuart Staniford, Vern Paxson, Nicholas Weaver Publication: Usenix Security Symposium, 2002 Presenter:
 Two types of malware propagating through social networks, Cross Site Scripting (XSS) and Koobface worm.  How these two types of malware are propagated.
A novel approach of gateway selection and placement in cellular Wi-Fi system Presented By Rajesh Prasad.
1 Figure 4-16: Malicious Software (Malware) Malware: Malicious software Essentially an automated attack robot capable of doing much damage Usually target-of-opportunity.
Mitigating Attacks on Open Functionality in SMS-Capable Cellular Networks Patrick Traynor, William Enck, Patrick McDaniel, and Thomas La Porta | MobiCom.
Preserving Caller Anonymity in Voice-over-IP Networks Mudhakar Srivatsa, Ling Liu and Arun Iyengar Presenter: Bo Wu.
Modeling Worms: Two papers at Infocom 2003 Worms Programs that self propagate across the internet by exploiting the security flaws in widely used services.
MASNET GroupXiuzhen ChengFeb 8, 2006 Terms and Concepts Behind Wireless Communications.
Mapping Internet Sensors with Probe Response Attacks Authors: John Bethencourt, Jason Franklin, Mary Vernon Published At: Usenix Security Symposium, 2005.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
1 Modeling, Early Detection, and Mitigation of Internet Worm Attacks Cliff C. Zou Assistant professor School of Computer Science University of Central.
Interconnect simulation. Different levels for Evaluating an architecture Numerical models – Mathematic formulations to obtain performance characteristics.
Understanding the network level behavior of spammers Published by :Anirudh Ramachandran, Nick Feamster Published in :ACMSIGCOMM 2006 Presented by: Bharat.
Topic 5: Basic Security.
DETECTING TARGETED ATTACKS USING SHADOW HONEYPOTS AUTHORS: K. G. Anagnostakisy, S. Sidiroglouz, P. Akritidis, K. Xinidis, E. Markatos, A. D. Keromytisz.
Virtual Classes Provides an Innovative App for Education that Stimulates Engagement and Sharing Content and Experiences in Office 365 MICROSOFT OFFICE.
Search Worms, ACM Workshop on Recurring Malcode (WORM) 2006 N Provos, J McClain, K Wang Dhruv Sharma
Malicious Software.
A Case Study on Computer Worms Balaji Badam. Computer worms A self-propagating program on a network Types of Worms  Target Discovery  Carrier  Activation.
1 Modeling, Early Detection, and Mitigation of Internet Worm Attacks Cliff C. Zou Assistant professor School of Computer Science University of Central.
1 Modeling and Measuring Botnets David Dagon, Wenke Lee Georgia Institute of Technology Cliff C. Zou Univ. of Central Florida Funded by NSF CyberTrust.
Network Dynamics and Simulation Science Laboratory Structural Analysis of Electrical Networks Jiangzhuo Chen Joint work with Karla Atkins, V. S. Anil Kumar,
LA-MAC: A Load Adaptive MAC Protocol for MANETs IEEE Global Telecommunications Conference(GLOBECOM )2009. Presented by Qiang YE Smart Grid Subgroup Meeting.
E-Safety Parent Talk Helping to keep your children safe online.
INTERNET SIMULATOR Jelena Mirkovic USC Information Sciences Institute
Android and IOS Permissions Why are they here and what do they want from me?
EDGE TECHNOLOGY AN EVOLUTION IN MOBILE TECHNOLOGY PRESENTED BY KIRAN KUMAR.
Epidemic Profiles and Defense of Scale-Free Networks L. Briesemeister, P. Lincoln, P. Porras Presented by Meltem Yıldırım CmpE
Botnets A collection of compromised machines
Internet Quarantine: Requirements for Containing Self-Propagating Code
Impact of Neighbor Selection on Performance and Resilience of Structured P2P Networks Sushma Maramreddy.
CHAPTER 3 Architectures for Distributed Systems
Introduction to Computers
Botnets A collection of compromised machines
Internet Worm propagation
Providing Secure Storage on the Internet
Chapter-5 Traffic Engineering.
Introduction to Internet Worm
Presentation transcript:

Can You Infect Me Now? Malware Propagation in Mobile Phone Networks Authors: Presented by: Michael Annichiarico

Mobile Malware Like normal malware, but on mobile phones  (smart phones and dumb ones too)‏ Why worry about mobile malware?  “combination of vulnerable platforms (symbian), unsuspecting users, and explosive growth in potential victims will inevitably attract propagating malware”

What Makes This Paper Different? Previous malware propagation research:  Proximity Propagation Bluetooth, etc This research:  Focuses on propagation via the telecommunications network

Why Moble Malware? (from the bad guy's perspective)‏ Smart phones are a lot like PCs:  market share per OS (72% symbian)‏  software vulnerabilities exist Exploited smart phones could provide an attacker with means to:  steal private data / users' identities  spam  make free calls  execute (D)DoS

Main Paper Goal(s)‏ Simulate the effects of mobile malware propagation via the telecommunications network  Simulated both VoIP malware and MMS malware Draw some conclusions for defending

Simulator Event Driven, Custom Code. (so they could better adapt for their needs)‏ 1 second step size, stepping 12 hours Infection beginning at a single phone Telecom Network  UMTS Topology  Boston Metro Area

Network: UMTS UMTS is the 3G successor to GSM  (2.5G/GPRS, 2.75G/EDGE)‏  Network side is very similar to GSM, air interface side changed to support higher data rates. Signaling and control are negligible (ignored in the model)‏

Topology: Boston Metro Area 100sq miles, divided into 1sq mile cells Mobile Station Distribution  from US Census data  scaled by 78% (by cell phone penetration)‏ Mobility is not modeled  Authors speculate the bottleneck will be in the network, not at the air interface

Simplified UTMS Network

Simulation Construction Assume normal MMS usage is based on a charge per message MMS Server Capacity  Server handles 100 msg/sec, although higher rates were simulated with “a qualitatively similar result” Authors explanation: MMS server will not be dimensioned to handle users behaving like an aggressive worm (i.e., sending large numbers of messages as quickly as possible). Bottom-up design of the UMTS Network

Simplified UTMS Network

Modeled UTMS Network

Simulation Parameters 1 single server serving 100 msg/sec 49 servers serving 10k users each 49 servers 9616 Node B's 2Mbps 100Mbps 1Gbps links between SGSNs

Simulation Notes “The granularity of our Node B placement was a limiting factor of our initial population data. A finer granularity would, no doubt, offer a more detailed and accurate picture of malware propagation.”

Spreading via Phone books/Contact Lists No published studies of address book characteristics found, so:  contacts (upper limit from empirical data on phone book maximums)‏  Phone book/contact degree distributions based on statistical analysis

Phonebook/contact degree distributions (for contact list size)‏ Power-Law: from yahoo groups, and other authors' research. Log-Normal: from social networking websites' statistics. Erlang Dist: from authors' experiment (but very small sample size of 73)‏

Node Attachment... you dont call everybody in your address book Probabilistically randomly assign address book size based on distribution, then...  70% - “The probability that two users were friends was proportional to the inverse of the number of people between them.”(from LiveJournal.com study)‏  30% uniformly randomly assigned

Attack Vector: VoIP Assumes vulnerable service on the mobile phone which does not require user interaction Assume all phones are vulnerable.  (Authors note that in reality a fraction would be vulnerable, and they state a qualitatively similar result)‏

Simulated Propagation of VoIP Malware  “...constrained bandwidth should also be considered; but doing so requires estimating typical traffic characteristics, and we lacked meaningful data on which to base such estimates.” --- ?????

Techniques for Faster Propagation of VoIP Malware (and Simulation Results)‏ Divide and distribute (transfer) contacts from address book Congestion backoff (wait) 10s

Attack Vector: MMS Handled by central MMS server Requires user interaction  only a percentage “F” act on message Can be done while phone is off  So there is a wait time to answer messages. Mixture of two Gaussian distributions centered at 20s & 45m

Simulated Propagation of MMS Malware

Techniques for Faster Propagation of MMS Malware Congestion backoff (10s)‏  Not very much advantage, due to MMS central server constraint. Divide and distribute contacts from address book  Same as above Global contact book method  Infected half the population in 12 hrs. (what F value?)‏

Faster MMS Malware Propagation

Defending Against Mobile Malware Propagation in Telecom. Networks (This section is way too small in the paper, would have liked to see more on this.)‏ Rate Limiting  ACCELLERATES infection! (same as congestion avoidance)‏ Blacklisting Containment  large number still get infected more slowly (no details given on %).  removing phones leads to a less congested network for those infected but non-blacklisted phones Content Filtering  “Seems promising due to centralized topology.” "Investigating whether it's practical remains future work." (and they didnt provide any information on how promising or why)‏

Questions?