Euro mGov Securing Mobile Services

28
Securing Mobile Services Miguel Ponce de Leon, John Ronan, Jimmy McGibney Telecommunications Software & Systems Group Waterford Institute of Technology Ireland [email protected] Security for the pervasive computing world

description

Presentation of the Paper "Securing mobile services", at the 1st Euro Conference on Mobile Government (Euro mGov 2005), Brighton, England, July 2005.

Transcript of Euro mGov Securing Mobile Services

Page 1: Euro mGov Securing Mobile Services

Securing Mobile Services

Miguel Ponce de Leon, John Ronan, Jimmy McGibney

Telecommunications Software & Systems GroupWaterford Institute of Technology

Ireland

[email protected]

Security for the pervasive computing world

Page 2: Euro mGov Securing Mobile Services

Contents

> Threats to Mobile Networks & Services

> SEINIT approach

> Building a “smart” wireless access point> Embedded intrusion detection & honeypot

Page 3: Euro mGov Securing Mobile Services

Security – a difficult problem

• Internet access is easy and cheap (and fairly anonymous)

• Lack of policy and implementation of policy

• Complexity & Scale of systems

• Technology weaknesses– Tendency to develop first & add security afterwards

• Domination by small number of OSs & apps– Find a Windows bug and you have millions of sitting targets

– Rapid dissemination of exploits among attackers

• Lack of education of users

• User mobility

• Hard to verify security– "If it is provably secure, it is probably not“, L.R. Knudsen

Page 4: Euro mGov Securing Mobile Services

m-Government Security

• Very strong requirements for:– Privacy– Anonymity (in some cases)– Authentication– Integrity– Availability (critical infrastructures…)

• As well as:– Usability– Ubiquity– Low cost (for citizens)– Verification & audit– Diverse & “lowest common denominator” technology on user side

Page 5: Euro mGov Securing Mobile Services

General threats & vulnerabilities

• OS vulnerabilities

• Application vulnerabilities

• Protocol weaknesses

• Sniffing on network

• Keystroke logging

• Password cracking

• Malware – viruses, worms, Trojan horses

• Social Engineering

• Non-technological– Loss of key personnel, loss of power, lightning, fire, flood, software

bugs, vendor bankruptcy, labour unrest, …

Page 6: Euro mGov Securing Mobile Services

• Eavesdropping by a third party– Electromagnetic spectrum is available to all

– Often weak or no encryption

• Bogus user– Poor user authentication with WiFi; SIM cloning; stolen phones

• Bogus network– Base station or access point presenting itself as network to the user,

for example to collect user data

• Denial of service– Deliberate jamming of wireless signal

– Or unintentionally – network congestion, large congregations of users (e.g. at sports event), large downloads hogging bandwidth, etc.

Specific Threats to Mobile Services

Page 7: Euro mGov Securing Mobile Services
Page 8: Euro mGov Securing Mobile Services

• See www.worldwidewardrive.org

• Results:– 228,537 access points found– 82,755 (35%) with default SSID– 140,890 (60%) with open system authentication (no key needed)– 62,859 (28%) with both – i.e. no security

Worldwide War Drive 2004

Page 9: Euro mGov Securing Mobile Services

Some tips for wireless LAN security

• Treat wireless as untrusted– Similar to public Internet– Firewall, etc, between WLAN and rest of network

• Use higher-layer security– e.g. VPN from station to Internet

• Check for unauthorised access points

• Audit authorised access points– Make difficult to access from outside– Use directional antenna to “point” radio signal

• Protect stations using personal firewalls and intrusion detection

Page 10: Euro mGov Securing Mobile Services

SEINIT Project

• Security Expert Initiative

• European Union 6th Framework IST Programme

• Objective: “Provide a trusted and dependable security framework, ubiquitous, working across multiple devices, heterogeneous networks, organisation independent and centred around an end-user”

Security for the pervasive computing world

Page 11: Euro mGov Securing Mobile Services

SEINIT: conceptual approach

• Virtualisation of security

• mGovernment => Government “virtually” anywhere

• How to secure virtual entities?– services, etc, that are user centred

– devices and network almost irrelevant

} Classical security just looks at these layers

Page 12: Euro mGov Securing Mobile Services

SEINIT: conceptual approach

Space / Geography

Inst

anti

atio

n

Time

UMTS Internet Wi-FiBluetoothBluetoothIn

terf

ace

Inte

rfac

e

Inte

rfac

e

VirtualVirtual

LogicalLogical Logical

Page 13: Euro mGov Securing Mobile Services

SEINIT: conceptual approach

• Infosphere– Digital space linked more to individual or organisation than to

devices or infrastructure– Not necessarily under control of user– Virtual

• Security Domain– Controlled by individual

or organisation – Logical

Infospheres

SecurityDomains

Alice’spersonaldata

CybercafeAlice’soffice

Alice’sBank

Alice’s ISPAlice’sTelecomoperator

Software company– e.g. Microsoft

Page 14: Euro mGov Securing Mobile Services

SEINIT: conceptual approach

• “Ambience” discovery– To secure mobile, virtual world, context is everything– Threat level may depend on:

• Location

• Environment (neighbours, etc)

• Real-time threats

– IDS & Honeypots provide part of this

Page 15: Euro mGov Securing Mobile Services

Embedding IDS and Dynamic Honeypot capabilities on a

WLAN Access Point

SEINIT work in progress

Page 16: Euro mGov Securing Mobile Services

• Monitors activity on host or network & raises alerts

• Rules-based detection (most common)– Based on known attacks

• Statistical anomaly detection– Tends to produce too many false alarms

Intrusion Detection System (IDS)

Page 17: Euro mGov Securing Mobile Services

• Definition– “A resource whose value lies in being probed, attacked or

compromised”

• System or component with no real-world value, set up to lure attackers

• By definition, all activity on a honeypot is highly suspect– Can catch new attacks– Few false alarms

Honeypot

Page 18: Euro mGov Securing Mobile Services

– Common components• Data collection• Analysis and decision algorithm• Action module

– Main differences• Honeypot must be used to be

effective• IDS operate continuously on

the data flow

– They are complementary:• IDS can provide information even if the honeypot is not the

target of attacks.• When used the honeypot provides more accurate and valuable

information.

Combining IDS and Honeypots

Page 19: Euro mGov Securing Mobile Services

Collaboration and “reputation”

Page 20: Euro mGov Securing Mobile Services

– A network of collaborative access points

– Exchange security information through a common vehicle

– Compute a “level of trust” for each host

Collaboration and “reputation”

Page 21: Euro mGov Securing Mobile Services

Sensors Alert Analysis Action engine Collaboration Data control

Architecture5 main components

Page 22: Euro mGov Securing Mobile Services

Sensors Collect the data needed to

detect malicious activity and provide low-level alerts for aggregation and correlation.

Architecture5 main components

Page 23: Euro mGov Securing Mobile Services

Architecture5 main components

Alert Analysis Engine Performs a high degree of

correlation of various alerts (from sensors and other APs) in order to manage a level of trust for each host.

Page 24: Euro mGov Securing Mobile Services

Architecture5 main components

Action Engine Manages various actions from

sending an alert to triggering a new rule in a firewall. Plugins framework to manage various actions.

Page 25: Euro mGov Securing Mobile Services

Architecture5 main components

Collaboration Engine Responsible for collaboration

with other APs, including AP authentication, etc.

Page 26: Euro mGov Securing Mobile Services

Architecture5 main components

Data Control Protects AP against threats

(DoS, intrusion, IDS evasion, …).

Page 27: Euro mGov Securing Mobile Services

– CqureAP• a 802.11 wireless AP

that runs on linux

– Prelude-IDS• Our core framework:

an hybrid IDS

– Snort• Used as a nids and a

wireless sensor

– Honeyd• Used to provide various

honeypot services

ImplementationUse available components

Page 28: Euro mGov Securing Mobile Services

SEINIT: other activities

• Trials of– Mobile IPv6

• Concept of return routeability

– IPv6 address autoconfiguration• To provide privacy (avoid having static IP address derived from

MAC)

– Cryptographically Generated Addresses (CGA)• Secure association of IPv6 address with a public key

– Extensible Authentication Protocol (EAP)• Flexible authentication framework running on top of link layer

– Protocol for Carrying Authentication and Network Access (PANA)• Link layer agnostic transport for EAP authentication info

– DNSsec• Secure DNS