Sms
Sms
William Enck, Patrick Traynor, Patrick McDaniel, and Thomas La Porta Systems and Internet Infrastructure Security Laboratory Department of Computer Science and Engineering The Pennsylvania State University 2005
Agenda
Overview of research paper SMS/Cellular Network overview
Submitting a message Routing Delivery
3/26/08
Cellular Overview
Cellular networks are critical component to economic and social infrastructures Cellular networks deliver alphanumeric text messages via Short Messaging Service (SMS) Telecommunication companies offer connections between their networks and the internet
Open functionality creates negative consequences
3/26/08
Goal of Paper
To evaluate the security impact of SMS interface on the availability of the cellular phone network Demonstrate the ability to deny voice service to cities the size of Washington, D.C. and Manhattan Provide countermeasures that mitigate or eliminate DoS threats
3/26/08 5
Submitting a Message
All messages delivered to a server that handles SMS traffic known as the Short Messaging Service Center (SMSC)
Provider (Verizon, AT&T, etc.) MUST provide at least SMSC
Routing
Home Location Register (HLR)
Queried by the SMSC for message routing Permanent repository of user data
Subscriber information (call waiting, text messaging) Billing data Availability of targeted user
Routing
(cont.)
If SMSC receives a reply stating that the current user is unavailable, it stores the text message for later delivery
It is queued
Otherwise, HLR responds with address of Mobile Switching Center (MSC) providing service to user/device
3/26/08 9
Forwards text message on to the appropriate base station for transmission over the air interface
3/26/08
10
Routing Figure
3/26/08
11
Delivery
Air Interface
1) Control Channels (CCH)
A) Common CCH
Logical channels: 1) Paging Channel (PCH) 2) Random Access Channel (RACH) Used by base station (BS) to initiate the delivery of voice and SMS data All connected mobile devices are constantly listening to the Common CCH for voice and SMS signaling
B) Dedicated CCHs
(cont.)
3) Devices contacts BS over the Random Access Channel (RACH) and alerts the network of its availability to receive incoming call or text data 4) Response (from above) arrives at BS, the BS instructs targeted device to listen to a specific Standalone Dedicated Control Channel (SDCCH) SDCCH
Authentication Encryption
3/26/08
14
3/26/08
15
Delivery Discipline
Overall system response is a composite of multiple queuing points (SMSC & target device) Experiment:
AT&T, Verizon & Sprint Slowly inject messages while device is powered off (400 messages, 1 every 60 seconds) Turn device back on The range of sequence number indicated both buffer size and queue eviction policy
3/26/08 17
Verizon
Last 100 messages received (first 300 missing) Buffer of 100, FIFO eviction policy
Sprint
First 30 messages received Buffer of 30, LIFO eviction policy
3/26/08 18
3/26/08
19
Delivery Rate
(cont.)
Problem: when a message delivery time exceeds that of message submission, a system is subject to DoS attack Experiment:
Compare the time it takes for serially injected messages to be submitted and then delivered to the targeted mobile device via web interfaces PERL script serially inject messages approximately once per a second into each providers web interface (avg. send time: 0.71
seconds)
3/26/08 21
3/26/08
22
Interfaces - Analysis
3/26/08
23
Interfaces - Analysis
Lost messages and negatively acknowledged submit attempts were observed Believe it was a result of web interface limitations imposed by the service providers Goal: find the mechanism used to achieve rate limitation on these interfaces and the conditions necessary to activate them Experiment used delivery rate analysis
Verizon:
After 44 messages, negative acknowledgements resulted Blocked messages by subnet value
AT&T:
Blindly acknowledged all submissions, but stopped delivering after 50 messages sent to single phone Subnet value didnt matter Differentiated between its inputs
Conclusion:
SMSCs typically hold far more messages than the mobile devices To launch successfully DoS attack that exploits the limitations of the cellular air interface, an adversary must target multiple end devices (must have valid phone numbers)
3/26/08
24
Hit-List Creation
NPA/NXX Web Scraping Web Interface
3/26/08
25
Numbering system is very useful for an attacker as it reduces the size of the domain November 24th, 2004 => number portability went into affect
3/26/08
26
Hit-List Creation
Web Scraping
Technique commonly used by spammers to collect information on potential targets through the use of search engines and scripting tools Individual is able to gather mobile phone numbers
Example: Google search 865 unique numbers from the greater State College, PA region 7,308 from New York City 6,184 from Washington D.C.
Hit-List Creation
3/26/08
28
3/26/08
29
Session Saturation
Question: How many SMS messages are needed to induce saturation? Air interface overview needed to understand SMS saturation
3/26/08
30
3/26/08
31
User assigned to a given TCH is able to transmit voice data once per a frame
3/26/08 32
3/26/08
33
3/26/08
34
Results: Service time translates into the ability to handle up to 900 SMS sessions per hour on each SDCCH
3/26/08
36
3/26/08
37
FIND: Total number of messages per a second needed to saturate the SDCCH capacity C in Washington D.C.
3/26/08 38
FIND: Total number of messages per a second needed to saturate the SDCCH capacity C in Manhattan
3/26/08 40
Use a source transmission size of 1500 bytes described in the Delivery Discipline section to submit an SMS from the internet Table shows the bandwidth required to saturate the control channels and thus incapacitate legitimate voice and text messaging services
3/26/08
42
Hit-lists would prevent individual phones from reaching capacity and below possible service provider thresholds Is it possible?
3/26/08 43
Result:
An even distribution of messages would be 5.04 messages to each phone per an hour (1 message every 11.92 minutes)
3/26/08
44
Results:
An even distribution of messages would delivery a message every 10.4 seconds Attack would last 8.68 minutes before buffer was exhausted Previous bandwidth table shows these attacks are feasible from a standard high-speed internet connection
3/26/08 45
3/26/08
46
Dedicating a carrier on the air interface for data signaling and delivery eliminates an attackers ability to take down voice communications
Ineffective use of the spectrum Creates bottleneck on air interface
Until the offloading schemes are created, origin priority should be implemented
Internet originated messages => low priority Messages from outside network => low priority Messages from within network => high priority
Resource Provisioning
Temporary Solutions
Additional Mobile Switching Center (MSC) and Base Stations (BS)
Events such as the Olympics United States
Cellular-on-Wheels (COW) The increased number of handoff puts more strain on the network 3/26/08 48
Prevent hit-lists
Do NOT show successfulness of internet based submission
Web interfaces should limit the number of recipients to which a single SMS submission is sent
Verizon and Cingular allow 10 recipients per a submission Reduce the ability to automate submission
Force the computer to calculate some algorithm prior to submitting
3/26/08
49
Conclusion
Cellular networks are a critical part of the economic and social infrastructures Systems typically experience below 300 seconds of communication outages per year (five nines availability) The proliferation of external services on these networks introduces significant potential for misuse An adversary injecting messages from the internet can cause almost twice the yearly expected network downtime using hit-lists as few as 2,500 targets The service providers potential problems outlined in this paper must be addressed in order to preserve the usability of these critical services
3/26/08 50