mobile data charging
play

MOBILE DATA CHARGING: NEW ATTACKS NEW ATTACKS AND COUNTERMEASURES - PowerPoint PPT Presentation

MOBILE DATA CHARGING: NEW ATTACKS NEW ATTACKS AND COUNTERMEASURES AND COUNTERMEASURES Chunyi Peng Chunyi Peng , Chi-Yu Li, Guan-Hua Tu, Songwu Lu, Lixia Zhang University of California, Los Angeles ACM CCS12 ACM CCS'12 C Peng (UCLA)


  1. MOBILE DATA CHARGING: NEW ATTACKS NEW ATTACKS AND COUNTERMEASURES AND COUNTERMEASURES Chunyi Peng Chunyi Peng , Chi-Yu Li, Guan-Hua Tu, Songwu Lu, Lixia Zhang University of California, Los Angeles ACM CCS’12

  2. ACM CCS'12 C Peng (UCLA) Mobile Data Access Mobile Data Access 2  1.2 billion global users Cellular Network Cellular Network Core N t Network k Internet

  3. ACM CCS'12 C Peng (UCLA) Mobile Data Charging Mobile Data Charging 3 Cellular Network Internet Metered charging Bill based on actual data usage, e.g., $20/month for 300MB (AT&T) Security: Security: Can any attack make the users pay MORE/LESS? Can any attack make the users pay MORE/LESS?

  4. ACM CCS'12 C Peng (UCLA) How Charging Works & Be Secured How Charging Works & Be Secured 4 C ll l Cellular Network N t k Authentication #1: Accounting @ core gateway only Gateway Gateway … #2 B th UL/DL #2: Both UL/DL per connection charged ti h d Internet Accounting Policy NAT #3 P li #3: Policy defined by operators d fi d b t Bill

  5. ACM CCS'12 C Peng (UCLA) Two Security Issues Two Security Issues 5 Authentication NAT NAT Bill #1: Can the attacker bypass the security mechanism to exploit charging architecture loophole to make the g g Stealth-spam-attack Stealth spam attack users pay MORE ? #2: Can the attacker exploit charging policy to pay LESS ? Toll-Free-Data-Access-Attack

  6. ACM CCS'12 C Peng (UCLA) Threat Models Threat Models 6  Cellular network is not compromised  Charging subsystem works as designed  Security mechanism works as designed  Attacker’s capability  Only use installed apps @ mobile, or O l i t ll d @ bil  Deploy malicious servers outside cellular networks

  7. ACM CCS'12 C Peng (UCLA) Outline Outline 7  Stealth-spam-attack (pay MORE) S l h k ( O )  Vulnerability  Attack design & implementation & damage  Countermeasures & insight  Toll-free-data-access-attack (pay LESS)  Vulnerability  Attack design & implementation & damage  Countermeasures & insight i i h  Summary  Summary

  8. Stealth-Spam-Attack 8

  9. ACM CCS'12 C Peng (UCLA) Security Against Spamming Security Against Spamming 9 Authentication Can security mechanism (e.g., Outgoing-Spam Outgoing-Spam NAT/Firewalls) block incoming spam? Incoming-Spam g p Outgoing-Spam due to •Private IP addr. is not accessible malwares@mobile or spoofing. •Access allowed only when initiated Access allowed only when initiated NAT NAT by the mobile Simple, not addressed here. Bill Bill

  10. ACM CCS'12 C Peng (UCLA) Vulnerability Vulnerability Authentication Different from conventional spamming, ① Init a data service i d i ① e.g., Email/SMS spam Unawareness (stealthy) L Long-lived (lasting hours or longer) li d (l ti h l ) ② Incoming Spam ② Incoming traffic Spam from the attacker ✔ Data Services (charged) ✗ ✗ ① trap the victim to open data access (normal) ② Incoming Spam time Actual charging time window g g E attacker E-attacker (attacked) (attacked) 10 10 NAT Bill

  11. ACM CCS'12 C Peng (UCLA) Stealth-Spam-Attack Stealth Spam Attack 11  Step1- Trap: init data access  Example-1: click a malicious web link p  Example-2: login Skype once / stay online  Step2- Spam: keep spamming  No matter what status @mobile

  12. ACM CCS'12 C Peng (UCLA) Web-based Attack Web based Attack 12  Implementation  Phone: click a malicious web link  Attacker (server): send spam data at constant rate (disable TCP congest control and tear-down) ( g )  Result: charging keeps going  Result: charging keeps going  Even after the phone tears down TCP  TCP FIN, timeout  Even when many “TCP RESET” sent from the mobile

  13. ACM CCS'12 C Peng (UCLA) Damage vs Spamming Rate Damage vs. Spamming Rate 13 Ch Charging volume vs. spamming rate i l i Operator-I Operator-II In proportion to spamming rate when rate is low Charging blocked when rate is high (> 1Mbps) Ch i bl k d h i hi h ( 1Mb ) The charged volume could be > the received one [Mobicom’12]

  14. ACM CCS'12 C Peng (UCLA) Damage vs Duration Damage vs. Duration 14 Spamming rate = 150Kbps No observed sign to end when the attack lasts 2 No observed sign to end when the attack lasts 2 hours if the rate is low ( spamming> 120MB )

  15. ACM CCS'12 C Peng (UCLA) Skype-based Attack Skype based Attack 15  Implementation I l t ti  Phone: do nothing (stay online once in Skype)  Attacker: Skype call the victim and hang up  Attacker: Skype call the victim and hang up  Attacker (server): send spam data at constant rate  Exploit Skype “loophole”  allows data access from the host who attempts to call  allows data access from the host who attempts to call the victim before the attempt is accepted  Demo

  16. ACM CCS'12 C Peng (UCLA) Demo: for a specific victim Demo: for a specific victim 16  Result: charging keeps going  Even after Skype logout  Even after Skype logout  Even when there is no any skype call session  Even when many “ ICMP unreachable ” sent from E h “ ICMP h bl ” t f the mobile

  17. ACM CCS'12 C Peng (UCLA) Damage vs Spamming Rate Damage vs. Spamming Rate 17 Ch Charging volume vs. spamming rate i l i Operator-I Operator-II No bounds on spamming rate compared with TCP-based attack

  18. ACM CCS'12 C Peng (UCLA) Damage vs Duration Damage vs. Duration 18 Spamming rate = 50Kbps No observed sign to end when the attack No observed sign to end when the attack lasts 24 hours ( spamming > 500MB )

  19. ACM CCS'12 C Peng (UCLA) Root Cause Root Cause 19 Current system: IP forwarding can push Secure only the initialization packets to the victim (not ① Init a data service i d i ① controlled by the victim) #1: Initial authentication ≠ authentication all along #1: Initial authentication ≠ authentication all along ② Incoming Spam ② I i S Current system: Different views @ mobile: ① trap the victim to open data access ① trap the victim to open data access K Keep charging if data comes h i if d t d t data conn. ends or never starts d t t Local view @ core gateway or exception happens E-attacker E attacker Lack of feedback/control Lack of feedback/control NAT #2: Data flow termination @ the phone ≠ h ≠ charging termination @ the operator i i i @ h Bill

  20. ACM CCS'12 C Peng (UCLA) Countermeasures Countermeasures 20  Spamming inevitable due to IP push model i i i bl d h d l  Remedy: stop early when spamming happens  Detection of unwanted traffic @mobile/operator  Detection of unwanted traffic @mobile/operator  Feedback (esp. from the mobile to the operator)  At least allow users to stop data charging (no service)  At least allow users to stop data charging (no service)  Exploit/design mechanisms in cellular networks: implicit- block, explicit-allow, explicit-stop p p p  Precaution, e.g., set a volume limit , g ,  Application: be aware of spamming attack

  21. Toll-Free-Data-Access-Attack 21

  22. ACM CCS'12 C Peng (UCLA) Vulnerability Vulnerability 22 Both operators provide free DNS service #1: free fake DNS loophole #1: free fake DNS loophole Real data over 53 Real data over 53 DNS packets DNS packets OP-I: Free via port 53 DNS flow ID: ( srcIP, destIP, srcPort, Policy : Policy : OP II: Free via UDP+Port 53 OP-II: Free via UDP+Port 53 destPort, protocol ) d tP t t l ) Free DNS Service OP-I: Packets via port 53 are free #2: no volume-check loophole OP II P OP-II: Packets via UDP+Port 53 free k t i UDP+P t 53 f Bill (DNS) Bill (DNS) = 0 0 Any enforcement for packets over p port 53? Bill (ANY- on-DNS ) = 0 Bill (ANY on-DNS ) 0 OP-I: no observed limits , except 29KB for one request packet OP-II: no observed limits

  23. ACM CCS'12 C Peng (UCLA) Toll-Free-Data-Access-Attack Toll Free Data Access Attack 23  Proxy outside cellular network P t id ll l t k  Tunneling over 53 between the mobile and external network  similar to calling 800-hotline  Implementation  Implementation  HTTP-proxy on port 53 (only for web, OP-I)  Sock-proxy on port 53 (for more apps, OP-I)  Sock proxy on port 53 (for more apps, OP I)  DNS-tunneling on UDP-53 (all apps, OP-I, II)  Results  Free data access > 200MB, no sign of limits  Demo if interested D if i t t d

  24. ACM CCS'12 C Peng (UCLA) Countermeasures Countermeasures 24  Simplest fix: stop free DNS service  OP-II stopped it since this July pp y  Other suggestions O h i  Authenticate DNS service  Only allow using authenticated DNS resolvers  DNS message integrity check g g y  Provide free DNS quota

  25. ACM CCS'12 C Peng (UCLA) Beyond DNS Beyond DNS 25  Existing DNS tunneling tools: iodine etc, i i li l i di  Designed for data access when Internet access is blocked differentiated-charging policy differentiated-charging policy e.g., free access to one website/ via some APN, or cheaper VoIP than Web Incentive to pay less (A (Attackers or even normal users) ) Bill Gap bt Gap btw policy and its enforcement polic and its enforcement Bullet-proof design & practice

Recommend


More recommend