DOC - TSYS School of Computer Science

advertisement
Warnings of Botnets: Overwhelming Multiple HLR’s
Cole Keever
Columbus State University
School of Computer Science
Columbus State University
Columbus, GA
Abstract— The degradation of cellular networks, with the ability
of a botnet to accomplish large scale malicious attacks, has
become a rising concern in the realm of mobile networking. In
this manuscript we examine the techniques used in the paper, On
Cellular Botnets: Measuring the Impact of Malicious Devices on a
Cellular Network Core, to demonstrate the impact of an attack on
a cellular network and the capability of a botnet to degrade a
large portion of the network under threat. Through recent
studies and careful comparison we present new ideas and
problems associated with the use of malicious software agents on
a targeted network. In contrast to the work presented by the
paper, we discuss an alternative approach that is deemed more
viable in regards to the future and the real world. We conclude
this manuscript with the idea that protection against the network
starts at the user level. For this reason, the individual mobile
device will serve as the first line of defense by preventing the
execution of a large number of network service requests.
I.
INTRODUCTION
Individuals and groups writing malicious software seem to
prevail in their ability to overcome network security measures.
People increasingly rely on mobile devices to perform activities
over a cellular network. The author suggests that these cellular
networks are less likely to withstand the maliciousness that the
core infrastructure of the internet has sustained over the years.
The emerging threat that botnets introduce to a network may be
characterized by their ability to degrade a network core.
Traditionally, there has been little motive for the creation of
these botnets in a cellular network. Malware writers are more
focused on crimes that involve identity theft. However, the
recent popularity of new technology such as smartphones and
iPhones have motivated cybercriminals to turn to mobile
networking. As more personal information is stored on devices
over a cellular network the greater the incentive to create
malicious attacks on the network. Even though there are many
forms of attacks on a cellular network, this paper focuses on the
overloading of the network core. The author explains that these
attacks may be accomplished through the execution of network
service request. Specifically, the attacks involve the use of
selected service request types on the main database for a
mobile network. This database, known as the Home Location
Register (HLR), contains important information about the
mobile subscriber. The author suggests that the HLR is the core
of the attack and is presented as so throughout the course of the
paper.
The author proves the significance of his experiment;
explaining that experimental results show that botnets as small
as 11,750 phones can cause a reduction of throughput of more
than 90% to area-code sized regions supported by most
currently deployed systems [1]. These results justify the
author’s concerns regarding the vulnerability of the mobile
network. The paper is in fact relevant to the issues that
surround mobile security today. For instance, researchers
recently wrote an application for Android’s smartphone that
builds a mobile botnet. The application, which poses as a
whether application, gathers information on the users that
download it [2]. The researchers involved in the weather app
experiment estimated that nearly 8,000 iPhones and Android
smartphones were infected; over 65% of the estimated 11,750
needed to bring down an HLR. Even though the author’s
experiment was reduced to an area-code sized region; this
research strengthens the possibility to achieve the minimum
botnet size used to significantly reduce the throughput on a
single HLR.
While the paper offers a convincing warning message; it is
obvious that author’s approach is only applicable to a single
HLR consisting of a large number of malicious devices. For
this reason, the approach is limited to future popularity and
expansion of highly-capable devices such as the iPhone and
smartphone. For instance, the author states while such numbers
may appear large, they typically represent less than 2% and
15% of phones assigned to a single HLR. However, the botnet
only contains devices that have advanced features such as
Bluetooth or web connectivity. Therefore, the malware may
only spread through these types of phones. We should neglect
the total number of phones assigned to a single HLR and focus
on the number of highly-capable devices assigned to the HLR.
Even though paper highlights a potential problem, the
author never presents a definite solution to the problem. The
author explains that this is not the intent of the paper when
he/she states that the work in this paper should be viewed as a
warning of the increasingly sophisticated attacks possible in
telecommunications infrastructure. Even so, the paper offers
some suggestions that may lessen the likely of an attack such as
Database replication, filtering, and shedding. While these
techniques are serve as excellent methods for attack mitigation;
the real threat to the network core exists in the in the network
of bots that send the Denial of Service request. This could be
controlled by advanced security mechanisms that reside on
phones. It may be cheaper for manufacturers and service
providers to demand antiviral alternatives rather than change
the network architecture.
Although the author offers a unique approach to a potential
problem; a real world experiment might include the use of an
unpublished phone application to demonstrate the spread of
malcode. In this case, one might also consider the effects of
such an attack on a larger scale. This approach would analyze
the growth rate of the unpublished application and the ability of
multiple HLR’s to handle an aggressively high volume of
denial of service requests.
The remainder of the paper is structured as follows: In
Section 2 we discuss related work, recent and past research that
supports the significance of the paper. Section 3 presents our
proposed solution to the problem. Section 4 concludes the
paper.
II.
RELATED WORK
As the author states, denial of service attacks have been
studied in a wide variety of systems. Targets including DNS
roots [3, 4], software vendors [6, 7], news services [8], search
engines [9] and online casinos [10] have all been
overwhelmed by malicious traffic. Such attacks have even
impacted resources and processes in the physical world, and
caused significant outages in areas such as banking,
emergency and even postal services [11, 12]. The research
community has responded with significant attempts to both
categorize [13] and mitigate [14, 15, 16, 18, 19, 22, 21, 17,
20] such problems. Unfortunately, such attacks are only
beginning to be understood in the context of cellular networks.
In contrast to past research, the use of these attacks to overload
mobile network HLR’s have never been demonstrated and
explored via experimentation. In the past researchers have
focused entirely on the wireless domain.
Also, the use of a botnet to attack a mobile network has
been studied before. As more personal information is stored on
mobile devices the more incentive there is for an attacker to
harvest data [28]. However, the ability to use these attacks for
the purpose of overloading a cellular network is a new
approach to understanding the vulnerabilities of a cellular
network. The only work that demonstrates the ability of a
botnet to overwhelm an HLR was proposed by Trayner [1].
Our approach adds to the current idea by attempting to
simulate an attack on multiple HLR’s.
III.
SOLUTION
The manuscript takes a hybrid approach to
demonstrate an attack on the core of a cellular network. We
combine the efforts made by Traynor [1] and the experimental
results performed by Fleizach [5] as a way to strengthen the
theory that an attack on the core of a network is possible on a
nationwide level. Testing performed by Traynor [1] provides
evidence that a cellular botnet is capable of delivering an
attack that would overwhelm a single HLR. While the
Fleizach [5] offers the best means of spreading the malcode
capable of delivering such an attack. Traynor admits that the
attack is more likely implemented on a nation-wide scale.
Therefore, we must predict the propagation of malware to a
large portion of mobile a mobile community. Traynor states
that less than 2% and 15% of phones assigned to a single HLR
is capable of overloading the HLR. However, a local attack on
an HLR suggests using self propagating malware such as
Bluetooth. Previous studies have indicated that Bluetooth is
not the best means of spreading malware on a nation-wide
scale. The authors of Can you infect me now?: malware
propagation in mobile phone networks state:
Most previous work on mobile phone malware
propagation has focused on Bluetooth worms, such as Cabir
[23] and CommWarrior [24], in which infected devices
discover and infect victim devices based on physical
proximity. Su et al. [25] went to various locations and
measured Bluetooth usage and duration of contact, finding
that half of the phones encountered were in suf_ciently long
contact for malware to transfer itself. Kostakos et al. [23]
deployed Bluetooth monitoring equipment in downtown Bath,
England, and found that only 8% of their users had
discoverable Bluetooth devices, greatly limiting infection
possibilities. Mickens and Noble [26] modified traditional
analytic models to create a probabilistic queuing technique
that accounted for movement and traffic patterns over various
time durations. Zheng et al. [27] focused on modeling
population distribution density, Bluetooth radius, and node
velocity. Their results point to a variety of quarantine methods
that could greatly reduce the virulence potential. In contrast to
proximity-based contact worms, malware propagating through
the communication network has the potential to spread more
quickly, infect more devices, and cause more substantial
disruption of the network infrastructure.
From this information we look toward a better means
of creating a botnet large enough to deliver such an attack.
Even though Bluetooth propagation is an insufficient way to
develop the botnet; there is other self-propagating malware
that may be more suited for this approach. For instance, prior
experimentation suggests that VoIP service is the optimum
way to spread self-propagating malware [5]. Also, user
interaction propagating malware such as Multimedia
Messaging Service is suggested as well. Using this technique,
two users do not need their phones powered on at the same
time. In this approach we will use this data, along with
statistical data of current users on multiple networks, to
determine if the means of propagation will support a botnet
large enough to deploy an attack on the cellular network core.
To simulate the attack we would use the most recent
version of Telcom One benchmarking suite. We would take
into consideration operational protocols, industry standards,
and statistical results from the current network population. In
contrast to the Trayner’s approach we would simulate the
network’s reaction to the attack on multiple HLR’s. These
changes would provide more realistic data. Next, the attack
would be simulated using statistical data and predictability.
We would consider the optimum time to time issue an attack
on the network and the best suited meta-command to attack an
HLR.
There is no permanent solution to the vulnerabilities
of a cellular network. Even so, the author suggests several
defenses that could mitigate the attacks performed by a botnet
on the core of a cellular network. Initially, the author proposes
database replication. However, the paper explains to us that
the effectiveness of database replication is based on the
assumption that an additional HLR can handle the additional
load. Next, the author describes filtering and shedding as an
additional
approach.
The
paper
suggests
that
insert_call_forwarding, the request used in the experiment due
to its effectiveness in attacking an HLR; is not critical to the
basic functioning of the network, such filters could be
aggressively tuned without much worry of the impact of false
positives. Thus, the network would handle the increasing
volume of insert_call_forwarding requests. However, the
paper warns that heightened traffic conditions may be
mistaken as an attack. Although the author’s suggestions are
valid, they do not offer a real solution to the problem. It is our
solution, in this manuscript, that the device will serve as the
first line of defense by preventing the execution of a large
number of network service requests.
IV.
CONCLUSION
The rapid growth and development of cellular networks
creates a new playing field for both cybercriminals and
network security researchers. The use of a botnet to attack a
cellular network core should be considered in developmental
techniques used to prevent wide spread outages. More
importantly, the impact of our proposal will serve as support to
the possibilities of a carefully deployed botnet attack against
the cellular network core. Also, though statistical analysis of
the population and experimental results, we will define a
vulnerable network state. The results of this data may be used
as benchmarking for further advancements in network security.
Even so, a great portion of the data will be built on
assumptions. This means that a real network may deviate from
the results. Our research does not identify a propagation
technique that would achieve 100% success in developing a
large botnet. We predict that a successful attack on the core of
a network must propagate through many different means.
Although researchers have suggested many ideas for
preventing such an attack; most of these suggestions fail to
completely resolve this issue without causing an inconvenience
to subscribers. For this reason we propose attacking the
propagation of malware rather than the execution of an attack.
This work demonstrates that an attempt to overwhelm an HLR
is solely dependent on a large botnet. Therefore, if we attenuate
the potential size of a botnet we decrease the chance that the
attack will succeed. We recommend that security platforms
become standard on all mobile devices. The second alternative
is Rate Limiting; in which the network limits the user m phone
calls every n minute(s) [5]. This may satisfy subscribers
enough during the event of an attack.
ACKNOWLEDGMENT
We would like to thank Dr. Mohamed Chouchane and the
Columbus State Computer Science Department. Any opinions,
conclusions, or recommendations are those of the authors and
do not reflect the views of the Columbus State Computer
Science Department.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
[18]
[19]
[20]
[21]
Patrick Traynor, Michael Lin, Machigar Ongtang, Vikhyath Rao, Trent
Jaeger, Patrick Drew McDaniel, and Thomas F. La Porta. On cellular
botnets: measuring the impact of malicious devices on a cellular network
core. In Ehab Al-Shaer, Somesh Jha, and Angelos D. Keromytis, editors,
ACM Conference on Computer and Communications Security, pages
223–234. ACM, 2009.
Higgins, Kelly Jackson. “Smartphone Weather App Bulids A Mobile
Botnet”.DarkReading.March5,2010.
http://www.darkreading.com/insiderthreat/security/client/showArticle.jht
ml?articleID=223200001
R. Farrow. DNS Root Servers: Protecting the Internet. Network
Magazine, 2003.
RIPE Network Coordination Centre. RIPE NCC DNS Monitoring
Services.
http://dnsmon.ripe.net/dnsservmon/domain/plot?domain=root&day=5&
month=2&year=2007&hour=16&period= 48h&plot%2F=SHOW, 2007.
C. Fleizach, M. Liljenstam, P. Johansson, G.M. Voelker, and A. Mehes.
Can you infect me now?: malware propagation in mobile phone
networks.
Proceedings of the 2007 ACM workshop on Recurring malcode.
C. Haney. NAI is latest DoS victim. http://security.itworld.com/
4339/NWW116617_02-05-2001/page_1.html, February 5 2001.
D. Ilett. Symantec website under DDoS attack. http://software.
silicon.com/malware/0,3800003100,39150478,00.htm,
2005.
P. Roberts. Al-Jazeera Sites Hit With Denial-of-Service Attacks.
PCWorld Magazine, March 26 2003.
M. Richtel. Yahoo Attributes a Lengthy Service Failure to an Attack.
The New York Times, February 8 2000.
S. Berinato. Online Extortion – How a Bookmaker and a Whiz Kid Took
On an Extortionist and Won. CSO Online, May 2005.
D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N.
Weaver. Inside the Slammer Worm. IEEE Security and Privacy, 1(4),
July 2003.
S. Byers, A. Rubin, and D. Kormann. Defending Against an Internetbased Attack on the Physical World. ACM Transactions on Internet
Technology (TOIT), 4(3):239–254, August 2004.
J. Mirkovic and P. Reiher. A Taxonomy of DDoS Attacks and DDoS
Defense Mechanisms. ACM SIGCOMM Computer Communication
Review, 34(2):39–53, 2004
S. Savage, D. Wetherall, A. Karlin, and T. Anderson. Practical network
support for IP traceback. In Proceedings of ACM SIGCOMM, pages
295–306,October 2000.
J. Ioannidis and S. Bellovin. Implementing Pushback: Router-Based
Defense Against DDoS Attacks. In Proceedings of Network and
Distributed System Security Symposium (NDSS), February 2002.
A. Juels and J. G. Brainard. Client Puzzles: A Cryptographic
Countermeasure Against Connection Depletion Attacks. In Proceedings
of Network and Distributed System Security Symposium (NDSS), 1999.
A. Keromytis, V. Misra, and D. Rubenstein. SOS: Secure Overlay
Services. In Proceedings of ACM SIGCOMM, 2002.
L. von Ahn, M. Blum, N. Hopper, and J. Langford. CAPTCHA: Using
hard AI problems for security. In Proceedings of Eurocrypt, pages 294–
311, 2003.
L. von Ahn, M. Blum, and J. Langford. Telling humans and computers
apart automatically. Communications of the ACM, 47(2):56–60, 2004.
J. Wang, X. Liu, and A. A. Chien. Empirical Study of Tolerating
Denial-of-Service Attacks with a Proxy Network. In Proceedings of the
USENIX Security Symposium, 2005.
A. Stavrou, D. L. Cook, W. G. Morein, A. D. Keromytis, V. Misra, and
D. Rubenstein. WebSOS: An Overlay-based System For Protecting Web
[22]
[23]
[24]
[25]
[26]
[27]
Servers From Denial of Service Attacks. Journal of Computer Networks,
48(5), 2005.
A. Stavrou, A. Keromytis, J. Nieh, V. Misra, and D. Rubenstein.
MOVE: An End-to-End Solution To Network Denial of Service. In
Proceedings of Network and Distributed System Security Symposium
(NDSS), 2005.
F-SECURE. F-Secure Virus Information Pages: Cabir.
http://www.f-secure.com/v-descs/cabir.shtml.
KOSTAKOS, V. Experiences with urban deployment of
Bluetooth (given at UCSD), Mar. 2007.
http://www.cs.bath.ac.uk/~vk/files/pres_ucsd.pdf.
MICKENS, J. W., AND NOBLE, B. D. Modeling epidemic
spreading in mobile environments. In Proc. of ACM WiSe'05
(Nov. 2005).
SU, J., CHAN, K. K. W., MIKLAS, A. G., PO, K.,
AKHAVAN, A., SAROIU, S., DE LARA, E., AND GOEL, A.
A preliminary investigation of worm infections in a
Bluetooth environment. In Proc. of ACM WORM'06 (Nov.2006).
ZHENG, H., LI, D., AND GAO, Z. An epidemic model of
mobile phone virus. In Proc. of Internat'l SPCA'06 (Jan.2006).
[28] J. Oberheide, F. Jahanian. When mobile is harder than fixed (and vice
versa): demystifying security challenges in mobile environments.
Proceedings of the Eleventh Workshop on Mobile Computing Systems &
Applications table of contents, 2010.
Download