Yan Chen, Hai Zhou PowerPoint PPT Presentation

presentation player overlay
About This Presentation
Transcript and Presenter's Notes

Title: Yan Chen, Hai Zhou


1
Automatic Vulnerability Analysis and Intrusion
Mitigation Systems for WiMAX Networks
  • Yan Chen, Hai Zhou
  • Northwestern Lab for Internet and Security
    Technology (LIST)
  • Dept. of Electrical Engineering and Computer
    Science
  • Northwestern University
  • http//list.cs.northwestern.edu

Motorola Liaisons Gregory W. Cox, Z. Judy Fu,
Philip R. Roberts Motorola Labs
2
The Spread of Sapphire/Slammer Worms
3
Outline
  • Threat Landscape and Motivation
  • Our approach
  • Accomplishment
  • Ongoing Work

4
The Current Threat Landscape and Countermeasures
of WiMAX Networks
  • WiMAX next wireless phenomenon
  • Predicted multi-billion dollar industry
  • WiMAX faces both Internet attacks and wireless
    network attacks
  • E.g., 6 new viruses, including Cabir and Skulls,
    with 30 variants targeting mobile devices
  • Goal of this project secure WiMAX networks
  • Big security risks for WiMAX networks
  • No formal analysis about WiMAX security
    vulnerabilities
  • No WiMAX intrusion detection/mitigation
    product/research

5
Existing WLAN Security Technology Insufficient
for WiMAX Networks
  • Cryptography and authentication cannot prevent
    attacks from penetrating WiMAX networks
  • Viruses, worms, DoS attacks, etc.
  • 802.16 IDS development can potentially lead to
    critical gain in market share
  • All major WLAN vendors integrated IDS into
    products
  • Limitations of existing IDSes (including WIDS)
  • Mostly host-based, and not scalable to high-speed
    networks
  • Mostly simple signature based, cannot deal with
    unknown attacks, polymorphic worms
  • Mostly ignore dynamics and mobility of wireless
    networks

6
Our Approach
  • Adaptive Intrusion Detection and Mitigation for
    WiMAX Networks (WAIDM)
  • Focus of the first year
  • Vulnerability analysis of 802.16e specs and WiMAX
    standards
  • Systematical and automatic searching through
    formal methods.
  • First specify the specs and potential
    capabilities of attackers in a formal language
    TLA (the Temporal Logic of Actions)
  • Then model check for any possible attacks
  • The formal analysis can also help guide fixing of
    the flaws

7
Deployment of WAIDM
  • Attached to a switch connecting BS as a black box
  • Enable the early detection and mitigation of
    global scale attacks
  • Could be differentiator for Motorolas 802.16
    products

Users
Internet
Users
WAIDM
system
Internet
802.16
scan
802.16 BS
port
BS
Switch/
Switch/
BS controller
BS controller
802.16
802.16 BS
BS
Users
Users
(a)
(b)
WAIDM deployed
Original configuration
8
Features of WAIDM
  • Scalability (ready for field testing)
  • Online traffic recording
  • Reversible sketch for data streaming computation
  • Record millions of flows (GB traffic) in a few
    hundred KB
  • Infer the key characteristics (e.g., source IP)
    of culprit flows for mitigation
  • Online sketch-based flow-level anomaly detection
  • Adaptively learn the traffic pattern changes
  • Accuracy (initial design evaluation completed)
  • Integrated approach for false positive reduction
  • Automatic Polymorphic Worm signature generation
    (Hamsa)
  • Network element fault Diagnostics with
    Operational Determinism (ODD)

9
WAIDM Architecture
Remote aggregated sketch records
Sent out for aggregation
Reversible sketch monitoring
Part I Sketch-based monitoring detection
Normal flows
Sketch based statistical anomaly detection (SSAD)
Local sketch records
Streaming packet data
Keys of suspicious flows
Filtering
Keys of normal flows
Polymorphic worm detection (Hamsa)
Signature-based detection
Per-flow monitoring
Suspicious flows
Part II Per-flow monitoring detection
Network fault diagnosis (ODD)
Intrusion or anomaly alarms
Modules on the critical path
Modules on the non-critical path
Data path
Control path
10
Hamsa First Network-based Zero-day Polymorphic
Worm Signature Generation System
  • Fast in the order of seconds
  • Noise tolerant and attack resilient
  • Detect multiple worms in one protocol

11
Hamsa Signature Generator
  • Evaluated with real Internet worms and traffic
  • Three pseudo polymorphic worm based on real
    exploits (Code-Red II, Apache-Knacker and
    ATPhttpd).
  • Two polymorphic engine from Internet (CLET and
    TAPiON).

12
Results on Signature Quality
Worms TrainingFN TrainingFP EvaluationFN EvaluationFN EvaluationFP Binaryevaluation FP
Worms Signature Signature Signature Signature Signature Signature
Code-Red II 0 0 0 0 0 0
Code-Red II '.ida?' 1, 'u780' 1, ' HTTP/1.0\r\n' 1, 'GET /' 1, 'u' 2 '.ida?' 1, 'u780' 1, ' HTTP/1.0\r\n' 1, 'GET /' 1, 'u' 2 '.ida?' 1, 'u780' 1, ' HTTP/1.0\r\n' 1, 'GET /' 1, 'u' 2 '.ida?' 1, 'u780' 1, ' HTTP/1.0\r\n' 1, 'GET /' 1, 'u' 2 '.ida?' 1, 'u780' 1, ' HTTP/1.0\r\n' 1, 'GET /' 1, 'u' 2 '.ida?' 1, 'u780' 1, ' HTTP/1.0\r\n' 1, 'GET /' 1, 'u' 2
CLET 0 0.109 0 0.06236 0.06236 0.268
CLET '0\x8b' 1, '\xff\xff\xff' 1,'t\x07\xeb' 1 '0\x8b' 1, '\xff\xff\xff' 1,'t\x07\xeb' 1 '0\x8b' 1, '\xff\xff\xff' 1,'t\x07\xeb' 1 '0\x8b' 1, '\xff\xff\xff' 1,'t\x07\xeb' 1 '0\x8b' 1, '\xff\xff\xff' 1,'t\x07\xeb' 1 '0\x8b' 1, '\xff\xff\xff' 1,'t\x07\xeb' 1
  • Single worm with noise
  • Suspicious pool size 100 and 200 samples
  • Noise ratio 0, 10, 30, 50
  • Noise samples randomly picked from the normal
    pool
  • Always get above signature and accuracy
  • Multiple worms with similar results

13
Accomplishments
  • Motorola Interactions
  • The first two components of WAIDM are ready for
    field test on Motorola WiMAX networks or testbed
  • Product teams interested to use as differentiator
    (Networks security service director Randall
    Martin)
  • Close collaboration/interaction with Motorola
    Labs (Judy Fu, Phil Roberts, Steve Gilbert)
  • Patents being filed through Motorola
  • Reverse Hashing for High-speed Network
    Monitoring Algorithms, Evaluation, and
    Applications.
  • Students involved
  • Three Ph.D. students Yan Gao, Zhichun Li, Yao
    Zhao
  • One M.S. student Prasad Narayana

14
Accomplishments on Publications
  • Five conference papers and two journal papers
  • Towards Deterministic Overlay Diagnosis, to
    appear in Proc. of ACM SIGCOMM 2006 (10).
  • Reversible Sketches Enabling Monitoring and
    Analysis over High-speed Data Streams, to appear
    in ACM/IEEE Transaction on Networking.
  • A DoS Resilient Flow-level Intrusion Detection
    Approach for High-speed Networks, to appear in
    IEEE International Conference on Distributed
    Computing Systems (ICDCS), 2006 (14).
  • Hamsa Fast Signature Generation for Zero-day
    Polymorphic Worms with Provable Attack
    Resilience, to appear in IEEE Symposium on
    Security and Privacy, 2006 (9).
  • Reverse Hashing for High-speed Network
    Monitoring Algorithms, Evaluation, and
    Applications, Proc. of IEEE INFOCOM, 2006 (18).
  • IDGraphs Intrusion Detection and Analysis Using
    Stream Compositing, to appear in IEEE Computer
    Graphics Applications, special issue on
    Visualization for Cyber Security, 2006.
  • An earlier version also in Proc. of the IEEE
    Workshop on Visualization for Computer Security
    (VizSEC), 2005

15
Ongoing Work
  • 802.16 Vulnerability Analysis Through Formal
    Methods (poster presentation this afternoon)
  • Many control messages are not (or cannot be)
    authenticated or encrypted
  • Use formal verification methods to automatically
    search for vulnerabilities in 802.16 specs
  • Completeness and correctness
  • Semantics Aided Signature Generation for Zero-day
    Polymorphic Worms
  • Some stealthy worms may not have any content
    invariant
  • Incorporate semantic information for more
    accurate detection

16
802.16 Vulnerability Analysis Through Formal
Methods
  • TLA a logic designed for specifying and
    reasoning about concurrent systems.
  • TLA a complete spec language based on TLA
  • First translate the natural language spec into a
    TLA spec, sys, and formulate security as prop
  • Normal security as sys ? prop can be checked
    automatically by model checker TLC
  • A generic attacker will be specified as Attk
  • Vulnerability can be discovered by checking
  • Attk sys ? prop, also automatically by TLC

17
Case Studies
  • First step, verify the initial ranging stages
  • Specify the protocol in 19-page TLA language
  • Assume certain capabilities of attackers
  • Eavesdrop and store messages
  • Corrupt messages on the channel by causing
    collisions
  • Replay old / Inject spoofed messages
  • Prove that ranging protocol is in general secure
    except one DoS attack

UL Subframe
DL Subframe
Contention-based Initial Ranging slots

Attacker fills all slots, making its requests
collide with requests from other SS, thereby
denying all new SS a chance to complete ranging
18
Case Studies (II)
  • Verify the authentication protocol
  • No real attacks found
  • Future work
  • Consider other attack capabilities
  • Verify other protocols of 802.16

19
Conclusions
  • Adaptive Intrusion Detection and Mitigation for
    WiMAX Networks (WAIDM)
  • Vulnerability analysis of 802.16e specs and WiMAX
    standards

Thank You !
20
Formal Vulnerability Analysis Research Challenges
  • Use abstraction to model infinite state system in
    finite states for model checking (state
    explosion)
  • Random nonces -gt constant
  • Different processing orders
  • Model generic attackers with appropriate
    capabilities
  • Need to be general and realistic
Write a Comment
User Comments (0)
About PowerShow.com