정보보호 및 알고리즘 2007601028 조호성. Contents 정보보호 및 알고리즘 2.

Slides:



Advertisements
Similar presentations
CSE 413: Computer Networks
Advertisements

MIGRATION OF GSM TO GPRS
The role of network capabilities Xiaowei Yang UC Irvine NSF FIND PI meeting, June
Switching Technology presented by Hussain Ahmad BA-Abdullah. Fawaz abdullah AL-Amri. prof : Adel Ali.
1 General Packet Radio Service (GPRS) Adapted from a presentation by Miao Lu Nancy Samaan SITE, Ottawa.
Computer Security and Penetration Testing
KAIS T Message-In-a-Bottle: User-Friendly and Secure Key Deployment for Sensor Nodes Cynthia Kuo, Mark Luk, Rohit Negi, Adrian Perrig(CMU), Sensys
General Packet Radio Service An Overview Ashish Bansal.
General Packet Radio Services(GPRS). GPRS GSM GPRS GSM-Drawbacks Circuit switching is used. Complete traffic channel is allocated to user for complete.
On Cellular Botnets: Measuring the Impact of Malicious Devices on a Cellular Network Core Patrick Michael Lin, Machigar Ongtang, Vikhyath.
On Attack Causality in Internet- Connected Cellular Networks Presented by EunYoung Jeong.
Telefónica Móviles España GPRS (General Packet Radio Service)
Mobile Communication MMS / GPRS. What is GPRS ? General Packet Radio Service (GPRS) is a new bearer service for GSM that greatly improves and simplifies.
Mobile Communication Division
Module 3.4: Switching Circuit Switching Packet Switching K. Salah.
Handoff in Hybrid Mobile Data Networks Vijay Dadlani.
Security Issues In Sensor Networks By Priya Palanivelu.
System Architecture for Billing of Multi- Player Games in a Wireless Environment using GSM/UMTS and WLAN Services Femi Adeyemo 11/21/02.
General Packet Radio System (GPRS) Overview. Introduction General Packet Radio Service (GRPS) today “Packet overlay” network on top of the existing GSM.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
SSH : The Secure Shell By Rachana Maheswari CS265 Spring 2003.
1 Two-Stage Dynamic Uplink Channel and Slot Assignment for GPRS Author: Ying-Dar Lin, Yu-Ching Hsu, Mei-Yan Chiang Reporter: Chen-Nien Tsai.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
GPRS Muhammad Al-khaldi Sultan Al-Khaldi
Exploiting Open Functionality in SMS-Capable Cellular Networks Authors: William Enck, Patrick Traynor, Patrick McDaniel, and Thomas La Porta Publication:
Cellular IP: Proxy Service Reference: “Incorporating proxy services into wide area cellular IP networks”; Zhimei Jiang; Li Fung Chang; Kim, B.J.J.; Leung,
General Packet Radio Service (GPRS) A new Dimension to Wireless Communication.
MODULE IV SWITCHED WAN.
OSI Model Routing Connection-oriented/Connectionless Network Services.
Communication Networks
Presentation on Osi & TCP/IP MODEL
1 Semester 2 Module 10 Intermediate TCP/IP Yuda college of business James Chen
Lectured By: Vivek Dimri Assistant Professor, CSE Dept. SET, Sharda University, Gr. Noida.
[Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. GPRS/UMTS Security Requirements Guto Motta
Presentation by Papua New Guinea Telecommunication & Radiocommunication Technical Authority (PANGTEL) For: PNG COMPUTER SOCIETY ANNUAL SEMINAR, 4th November.
1 The Internet and Networked Multimedia. 2 Layering  Internet protocols are designed to work in layers, with each layer building on the facilities provided.
Mitigating Attacks on Open Functionality in SMS-Capable Cellular Networks Patrick Traynor, William Enck, Patrick McDaniel, and Thomas La Porta | MobiCom.
Sami Al-wakeel 1 Data Transmission and Computer Networks The Switching Networks.
Switching breaks up large collision domains into smaller ones Collision domain is a network segment with two or more devices sharing the same Introduction.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Chapter 4 Application Level Security in Cellular Networks.
Computer Networks with Internet Technology William Stallings
MOBILE IP GROUP NAME: CLUSTER SEMINAR PRESENTED BY : SEMINAR PRESENTED BY : SANTOSH THOMAS SANTOSH THOMAS STUDENT NO: STUDENT NO:
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
1 Kyung Hee University Chapter 4 Introduction to Network Layer.
1 © NOKIA Functionality and Testing of Policy Control in IP Multimedia Subsystem Skander Chaichee HUT/Nokia Networks Supervisor: Professor Raimo.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
General Packet Radio Service (GPRS)
COE 543 Wireless Networks Term Project GPRS Capacity Evaluation Presented By Yaser Al-Jarbou May 2004.
GPRS Part II Wireless and Mobile Network Architecture
DNS Security 1. Fundamental Problems of Network Security Internet was designed without security in mind –Initial design focused more on how to make it.
Ασύρματα Δίκτυα και Κινητές Επικοινωνίες Ενότητα # 8: Σύστημα 2.5 Γενιάς GPRS Διδάσκων: Βασίλειος Σύρης Τμήμα: Πληροφορικής.
1 Switching and Forwarding Sections Connecting More Than Two Hosts Multi-access link: Ethernet, wireless –Single physical link, shared by multiple.
Patrick Traynor, Michael Lin, Machigar Ongtang, Vikhyath Rao, Trent Jaeger, Patrick McDaniel, and Thomas La Porta 2/29/2012.
1 Roaming Honeypots for Mitigating Service-Level Denial-of-Service Attacks Written by: Sherif M. Khattab Chatree Sangpachatanarukz Daniel Mossé Rami Melhem.
Data Communication Networks Lec 13 and 14. Network Core- Packet Switching.
Supporting Nodes SGSN(serving GPRS supporting Node) Functions- 1]Packet switching 2]Routing and transfer 3]Mobility Management 4]Logical Link management.
Denail of Service(Dos) Attacks & Distributed Denial of Service(DDos) Attacks Chun-Chung Chen.
Comparison of Network Attacks COSC 356 Kyler Rhoades.
Data and Computer Communications Ninth Edition by William Stallings Chapter 10 – Circuit Switching and Packet Switching Data and Computer Communications,
Security Issues With Mobile IP
Chapter 4 Introduction to Network Layer
GPRS.
Error and Control Messages in the Internet Protocol
Muhammad Taqi Raza, Fatima Muhammad Anwar and Songwu Lu
GPRS GPRS stands for General Packet Radio System. GPRS provides packet radio access for mobile Global System for Mobile Communications (GSM) and time-division.
Chapter 4 Introduction to Network Layer
Master in progettista di servizi radiomobili Web Based Overview
GPRS Architecture Ayan Ganguly Bishakha Roy Akash Dutta.
Presentation transcript:

정보보호 및 알고리즘 조호성

Contents 정보보호 및 알고리즘 2

Paper Information Title On Attack Causality in Internet-Connected Cellular Network Authors P. Traynor, P. McDaniel and T. Porta The Pennsylvania Univ. Published USENIX Security 2007 – Network Security 3

Contribution Contribution of this paper New Vulnerability Analysis Identify and develop a realistic characterization of two new vulnerabilities in cellular data networks Implications of Combined Design Philosophies on Security Vulnerabilities are deeply rooted in opposing architectural assumptions. 4

New Vulnerability Analysis The Main Idea Present two new denial of service(DoS) vulnerabilities in cellular data services By delayed teardown mechanism By frequent connection reestablishmet 5

New Vulnerability Analysis Network Architecture A series of attachment and authentication procedures A device owner wants to use data service Locating a device 6

New Vulnerability Analysis Locating a device A series of attachment and authentication procedures 1.Power up and GPRS-attach message GPRS(General Packet Radio Services) 7 1

New Vulnerability Analysis A series of attachment and authentication procedures 2. Forward the message to SGSN SGSN(Serving GPRS Support Node)-authenticate user HLR(Home Location Resister)-keep track of user info. 8 2

New Vulnerability Analysis A series of attachment and authentication procedures 3. Establish PDP(Packet Data Protocol) PDP context is a data structure in SGSN and GGSN GGSN(Gateway GPRS Support Node) 9 3

New Vulnerability Analysis A series of attachment and authentication procedures 4. Request and receive the data A requested packet arrives at the GGSN GGSN matchs data and SGSN, then SGSN deliver data to the device 10 4

New Vulnerability Analysis 3 States of devices IDLE, unregistered and unreachable STANDBY, listen the“waken up”message from network READY, monitors the air interface for incoming packets 11

New Vulnerability Analysis Establishment of Air interface PPCH(Packet Paging Channel) PRACH(Packet Random Access Channel) PAGCH(Packet Access Grant Channel) PACCH(Packet Associated Control Channel) PDTCH(Packet Data Channel) 12 Paging Establish the data transfer channel

New Vulnerability Analysis Exploiting Teardown Mechanisms The process of locating, paging and establishing a connection between network and an end device is expensive So, after finishing data transmission, the device remains a READY state and secure the channel around 5 seconds Sending 32 messages to each sector can exhaust logical resources and temporarily prevent users from receiving traffic If above task can be repeated before 5 sec. expired, DoS attack becomes sustailable 13

New Vulnerability Analysis Exploiting Setup Procedures If connections to an end host must repeatedly be reestablished, the interarrival time between successive packets becomes exceedingly large Those time is also around 5 sec for each connection establishment 14

New Vulnerability Analysis Modeling Attacks on Teardown Mechanisms The blocking rates of legitimate traffic By an attack on the delayed teardown mechanisms 15

New Vulnerability Analysis Modeling Attacks on Connection Setup Blocking caused when immediate resource reclamation 16

Combined Design Philosophies Difference Between Cellular and traditional network Connection establishment are so different A comparison of the cost of delivering In the cellular data case, a significant amount of delay is added because of connection establishment procedure In the tranditional setting, simply forward the packet 17

Conclusion Introduce two DoS attack vulnerabilities Exploiting Teardown Mechanisms Exploiting Setup Procedures Explain the reason of vulnerabilities The problems are presented in this and others are artifacts of a larger architectural mismatch Packet-switched traffic vs. circuit-switched system 18