automatic vulnerability analysis and intrusion mitigation systems for wimax networks

20
Yan Chen, Hai Zhou Northwestern Lab for Internet and Security Technology (LIST) Dept. of Electrical Engineering and Computer Science Northwestern University Automatic Vulnerability Analysis and Intrusion Mitigation Systems for WiMAX Networks Motorola Liaisons Gregory W. Cox, Z. Judy Fu, Philip R. Roberts Motorola Labs

Upload: tuan

Post on 24-Feb-2016

30 views

Category:

Documents


0 download

DESCRIPTION

Automatic Vulnerability Analysis and Intrusion Mitigation Systems for WiMAX Networks. Yan Chen, Hai Zhou Northwestern Lab for Internet and Security Technology (LIST) Dept. of Electrical Engineering and Computer Science Northwestern University http://list.cs.northwestern.edu. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Automatic Vulnerability Analysis and Intrusion Mitigation Systems for WiMAX Networks

Yan Chen, Hai ZhouNorthwestern Lab for Internet

and Security Technology (LIST)Dept. of Electrical Engineering

and Computer ScienceNorthwestern University

http://list.cs.northwestern.edu

Automatic Vulnerability Analysis and Intrusion Mitigation Systems for

WiMAX Networks Motorola Liaisons

Gregory W. Cox, Z. Judy Fu, Philip R. RobertsMotorola Labs

Page 2: Automatic Vulnerability Analysis and Intrusion Mitigation Systems for WiMAX Networks

The Spread of Sapphire/Slammer Worms

Page 3: Automatic Vulnerability Analysis and Intrusion Mitigation Systems for WiMAX Networks

Outline• Threat Landscape and Motivation• Our approach• Accomplishment• Ongoing Work

Page 4: Automatic Vulnerability Analysis and Intrusion Mitigation Systems for WiMAX Networks

The Current Threat Landscape and Countermeasures of WiMAX

Networks • WiMAX: next wireless phenomenon

– Predicted multi-billion dollar industry • WiMAX faces both Internet attacks and wireless

network attacks– E.g., 6 new viruses, including Cabir and Skulls, with 30

variants targeting mobile devices• Goal of this project: secure WiMAX networks• Big security risks for WiMAX networks

– No formal analysis about WiMAX security vulnerabilities

– No WiMAX intrusion detection/mitigation product/research

Page 5: Automatic Vulnerability Analysis and Intrusion Mitigation Systems for WiMAX Networks

Existing WLAN Security Technology Insufficient for

WiMAX Networks • Cryptography and authentication cannot prevent

attacks from penetrating WiMAX networks– Viruses, worms, DoS attacks, etc.

• 802.16 IDS development can potentially lead to critical gain in market share– All major WLAN vendors integrated IDS into products

• Limitations of existing IDSes (including WIDS)– Mostly host-based, and not scalable to high-speed

networks– Mostly simple signature based, cannot deal with

unknown attacks, polymorphic worms– Mostly ignore dynamics and mobility of wireless networks

Page 6: Automatic Vulnerability Analysis and Intrusion Mitigation Systems for WiMAX Networks

Our Approach

• Adaptive Intrusion Detection and Mitigation for WiMAX Networks (WAIDM) – Focus of the first year

• Vulnerability analysis of 802.16e specs and WiMAX standards– Systematical and automatic searching through formal

methods. – First specify the specs and potential capabilities of

attackers in a formal language TLA+ (the Temporal Logic of Actions)

– Then model check for any possible attacks– The formal analysis can also help guide fixing of the

flaws

Page 7: Automatic Vulnerability Analysis and Intrusion Mitigation Systems for WiMAX Networks

Deployment of WAIDM• Attached to a switch connecting BS as a black box• Enable the early detection and mitigation of global

scale attacks• Could be differentiator for Motorola’s 802.16 products

Original configuration WAIDM deployed

Internet

802.16BS

Users

(a)(b)

802.16BS

Users

Switch/BS controller

Internet

scan

po

rtW

AID

Msy

stem

802.16BS

Users

802.16BS

Users

Switch/BS controller

Page 8: Automatic Vulnerability Analysis and Intrusion Mitigation Systems for WiMAX Networks

Features of WAIDM • Scalability (ready for field testing)

– Online traffic recording » Reversible sketch for data streaming computation» Record millions of flows (GB traffic) in a few hundred KB» Infer the key characteristics (e.g., source IP) of culprit flows

for mitigation– Online sketch-based flow-level anomaly detection

» Adaptively learn the traffic pattern changes • Accuracy (initial design & evaluation completed)

Integrated approach for false positive reduction– Automatic Polymorphic Worm signature generation

(Hamsa)– Network element fault Diagnostics with Operational

Determinism (ODD)

Page 9: Automatic Vulnerability Analysis and Intrusion Mitigation Systems for WiMAX Networks

WAIDM Architecture

Reversiblesketch monitoring

Filtering

Sketch based statistical anomaly detection (SSAD)

Local sketch records

Sent out for aggregation

Remote aggregatedsketchrecords

Per-flow monitoring

Streaming packet data

Normal flows

Suspicious flows

Intrusion or anomaly alarms

Keys of suspicious flows

Keys of normal flows

Data path Control pathModules on the critical path

Signature-based detection

Polymorphic worm detection (Hamsa)

Part ISketch-basedmonitoring & detection

Part IIPer-flowmonitoring & detection

Modules on the non-critical path

Network fault diagnosis (ODD)

Page 10: Automatic Vulnerability Analysis and Intrusion Mitigation Systems for WiMAX Networks

Hamsa: First Network-based Zero-day Polymorphic Worm Signature Generation

System• Fast: in the order of seconds• Noise tolerant and attack resilient• Detect multiple worms in one protocol

ProtocolClassifier

UDP1434

HamsaSignatureGenerator

WormFlow

Classifier

TCP137. . .TCP

80TCP53

TCP25

NormalTraffic Pool

SuspiciousTraffic Pool

Signatures

NetworkTap

KnownWormFilter

Normal traffic reservoir

Real time

Policy driven

Page 11: Automatic Vulnerability Analysis and Intrusion Mitigation Systems for WiMAX Networks

Hamsa Signature Generator

• Evaluated with real Internet worms and traffic– Three pseudo polymorphic worm based on real exploits (Code-

Red II, Apache-Knacker and ATPhttpd).– Two polymorphic engine from Internet (CLET and TAPiON).

TokenExtractor Tokens

FilterPool sizetoo small?

NO

SuspiciousTraffic Pool

NormalTraffic Pool

YES

Quit

SignatureRefiner

SignatureTokenIdentification Core

Page 12: Automatic Vulnerability Analysis and Intrusion Mitigation Systems for WiMAX Networks

Results on Signature Quality

• Single worm with noise– Suspicious pool size: 100 and 200 samples– Noise ratio: 0%, 10%, 30%, 50%– Noise samples randomly picked from the normal pool– Always get above signature and accuracy

• Multiple worms with similar results

WormsTraining

FNTraining

FPEvaluation

FNEvaluation

FPBinary

evaluation FPSignature

Code-Red II 0 0 0 0 0{'.ida?': 1, '%u780': 1, ' HTTP/1.0\r\n': 1, 'GET /': 1, '%u': 2}

CLET 0 0.109% 0 0.06236% 0.268%{'0\x8b': 1, '\xff\xff\xff': 1,'t\x07\xeb': 1}

Page 13: Automatic Vulnerability Analysis and Intrusion Mitigation Systems for WiMAX Networks

Accomplishments• Motorola Interactions

– The first two components of WAIDM are ready for field test on Motorola WiMAX networks or testbed

– Product teams interested to use as differentiator (Networks security service director: Randall Martin)

– Close collaboration/interaction with Motorola Labs (Judy Fu, Phil Roberts, Steve Gilbert)

• Patents being filed through Motorola– Reverse Hashing for High-speed Network

Monitoring: Algorithms, Evaluation, and Applications.• Students involved

– Three Ph.D. students: Yan Gao, Zhichun Li, & Yao Zhao

– One M.S. student: Prasad Narayana

Page 14: Automatic Vulnerability Analysis and Intrusion Mitigation Systems for WiMAX Networks

Accomplishments on Publications• Five conference papers and two journal papers

– Towards Deterministic Overlay Diagnosis, to appear in Proc. of ACM SIGCOMM 2006 (10%).

– Reversible Sketches: Enabling Monitoring and Analysis over High-speed Data Streams, to appear in ACM/IEEE Transaction on Networking.

– A DoS Resilient Flow-level Intrusion Detection Approach for High-speed Networks, to appear in IEEE International Conference on Distributed Computing Systems (ICDCS), 2006 (14%).

– Hamsa: Fast Signature Generation for Zero-day Polymorphic Worms with Provable Attack Resilience, to appear in IEEE Symposium on Security and Privacy, 2006 (9%).

– Reverse Hashing for High-speed Network Monitoring: Algorithms, Evaluation, and Applications, Proc. of IEEE INFOCOM, 2006 (18%).

– IDGraphs: Intrusion Detection and Analysis Using Stream Compositing, to appear in IEEE Computer Graphics & Applications, special issue on Visualization for Cyber Security, 2006.

» An earlier version also in Proc. of the IEEE Workshop on Visualization for Computer Security (VizSEC), 2005

Page 15: Automatic Vulnerability Analysis and Intrusion Mitigation Systems for WiMAX Networks

Ongoing Work• 802.16 Vulnerability Analysis Through Formal

Methods (poster presentation this afternoon)– Many control messages are not (or cannot be)

authenticated or encrypted– Use formal verification methods to automatically

search for vulnerabilities in 802.16 specs– Completeness and correctness

• Semantics Aided Signature Generation for Zero-day Polymorphic Worms– Some stealthy worms may not have any content

invariant– Incorporate semantic information for more

accurate detection

Page 16: Automatic Vulnerability Analysis and Intrusion Mitigation Systems for WiMAX Networks

802.16 Vulnerability Analysis Through Formal Methods

• TLA: a logic designed for specifying and reasoning about concurrent systems. – TLA+: a complete spec language based on TLA

• First translate the natural language spec into a TLA+ spec, sys, and formulate security as prop

• Normal security as sys → prop can be checked automatically by model checker TLC

• A generic attacker will be specified as Attk• Vulnerability can be discovered by checking Attk sys → prop, also automatically by TLC

Page 17: Automatic Vulnerability Analysis and Intrusion Mitigation Systems for WiMAX Networks

Case Studies• First step, verify the initial ranging stages

– Specify the protocol in 19-page TLA+ language– Assume certain capabilities of attackers

» Eavesdrop and store messages» Corrupt messages on the channel by causing collisions» Replay old / Inject spoofed messages

– Prove that ranging protocol is in general secure except one DoS attack DL Subframe

Contention-based Initial Ranging slots

UL Subframe

Attacker fills all slots, making its requests collide with requests from other SS, thereby denying all new SS a chance to complete ranging

Page 18: Automatic Vulnerability Analysis and Intrusion Mitigation Systems for WiMAX Networks

Case Studies (II)• Verify the authentication protocol

– No real attacks found

• Future work– Consider other attack capabilities– Verify other protocols of 802.16

Operational

Op Wait

TEK invalid/Key Request

Key Reply

Timeout/Key Request

Rekey WaitTEK invalid/Key Request

Op Reauth Wait

Auth Pend

Page 19: Automatic Vulnerability Analysis and Intrusion Mitigation Systems for WiMAX Networks

Conclusions

• Adaptive Intrusion Detection and Mitigation for WiMAX Networks (WAIDM)

• Vulnerability analysis of 802.16e specs and WiMAX standards

Thank You !

Page 20: Automatic Vulnerability Analysis and Intrusion Mitigation Systems for WiMAX Networks

Formal Vulnerability Analysis Research

Challenges• Use abstraction to model infinite state

system in finite states for model checking (state explosion)– Random nonces -> constant– Different processing orders

• Model generic attackers with appropriate capabilities– Need to be general and realistic