N. Funabiki, T. Nakanishi, H. Takahashi, K. Miki, J. Kawashima
{"title":"A Proposal of Anonymous IEEE802.1X Authentication Protocol for Wireless Networks","authors":"N. Funabiki, T. Nakanishi, H. Takahashi, K. Miki, J. Kawashima","doi":"10.1109/NPSEC.2006.320343","DOIUrl":"https://doi.org/10.1109/NPSEC.2006.320343","url":null,"abstract":"Recently, wireless network services are available at a variety of public spaces such as stations, airports, and hotels. In such services, the IEEE802.1X-based authentication protocol has been often used to permit only registered users in network connections. However, this protocol allows Internet service providers (ISPs) to collect the privacy information of users such as their access locations and network service use records. Besides, ISPs have to keep in secret the personal information of their users for authentication, although they only need the legitimacy of them. To solve these problems, this paper presents an anonymous authentication protocol based on IEEE802.1X. The group signature scheme is adopted to anonymously verify the legitimacy of users, whereas misbehaving users can be traced in case. We implement the proposed protocol by modifying open source softwares for IEEE802.1X and verify the effectiveness in terms of the processing time and the packet size.","PeriodicalId":206067,"journal":{"name":"2006 2nd IEEE Workshop on Secure Network Protocols","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130154063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Bremler-Barr, R. Halachmi-Bekel, J. Kangasharju
{"title":"Unregister Attacks in SIP","authors":"A. Bremler-Barr, R. Halachmi-Bekel, J. Kangasharju","doi":"10.1109/NPSEC.2006.320344","DOIUrl":"https://doi.org/10.1109/NPSEC.2006.320344","url":null,"abstract":"In this paper we present the unregister attack, a new kind of a denial of service attack on SIP servers. In this attack, the attacker sends a spoofed \"unregister\" message to a SIP server and cancels the registration of the victim at that server. This prevents the victim user from receiving any calls. We have tested common implementations of SIP servers and show that the unregister attack is easily performed on SIP servers which do not use authentication. Even on SIP servers with authentication, an attacker able to sniff the traffic between the client and server can still successfully attack common servers. We show that the root causes behind this vulnerability are either buggy implementations, or the SIP specification RFC which does not require sufficient security from the implementations. We present a solution, the SIP one-way hash function algorithm (SOFIA), motivated by the onetime password mechanism [6]. SOFIA prevents the unregister attack in all situations. The algorithm is easy to deploy since it requires only a minor modification, namely adding one header field into the SIP messages. Furthermore, the algorithm is fully backwards compatible and requires no additional configuration from the user or the server.","PeriodicalId":206067,"journal":{"name":"2006 2nd IEEE Workshop on Secure Network Protocols","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114782871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Firewall Policy Reconstruction by Active Probing: An Attacker's View","authors":"T. Samak, A. El-Atawy, E. Al-Shaer, Hong Li","doi":"10.1109/NPSEC.2006.320342","DOIUrl":"https://doi.org/10.1109/NPSEC.2006.320342","url":null,"abstract":"Having a firewall policy that is correct and complete is crucial to the safety of the computer network. An adversary will benefit a lot from knowing the policy or its semantics. In this paper we show how an attacker can reconstruct a firewall's policy by probing the firewall by sending tailored packets into a network and forming an idea of what the policy looks like. We present two approaches of compiling this information into a policy that can be arbitrary close to the original one used in the deployed firewall. The first approach is based on region growing from single firewall response to sample packets. The other approach uses split-and-merge in order to divide the space of the firewall's rules and analyzes each independently. Both techniques merge the results obtained into a more compact version of the policies reconstructed.","PeriodicalId":206067,"journal":{"name":"2006 2nd IEEE Workshop on Secure Network Protocols","volume":"434 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114049379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"PEUC-WiN: Privacy Enhancement by User Cooperation in Wireless Networks","authors":"Karim El Defrawy, Claudio Soriente","doi":"10.1109/NPSEC.2006.320345","DOIUrl":"https://doi.org/10.1109/NPSEC.2006.320345","url":null,"abstract":"Location awareness capabilities of today's wireless networks provide position tailored services but, at the same time, impose serious privacy implications for the wireless users. Interface identifiers allow an adversary to trace a user's movement and location over time in a wireless environment. This causes a significant privacy threat to users, since an adversary could learn a lot of information about them from their locations. Current proposed location privacy mechanisms suffer from a high rate of network disruption and degraded throughput. In this paper, we introduce a new scheme to improve the location privacy of wireless users while minimizing network disruption. The proposed scheme achieves its goals by exploiting the collaboration among users in the same coverage area of an access point in a wireless system.","PeriodicalId":206067,"journal":{"name":"2006 2nd IEEE Workshop on Secure Network Protocols","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129033753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Narayana, Ruiming Chen, Yao Zhao, Yan Chen, Z. Fu, Hai Zhou
{"title":"Automatic Vulnerability Checking of IEEE 802.16 WiMAX Protocols through TLA+","authors":"P. Narayana, Ruiming Chen, Yao Zhao, Yan Chen, Z. Fu, Hai Zhou","doi":"10.1109/NPSEC.2006.320346","DOIUrl":"https://doi.org/10.1109/NPSEC.2006.320346","url":null,"abstract":"Vulnerability analysis is indispensably the first step towards securing a network protocol, but currently remains mostly a best effort manual process with no completeness guarantee. Formal methods are proposed for vulnerability analysis and most existing work focus on security properties such as perfect forwarding secrecy and correctness of authentication. However, it remains unclear how to apply these methods to analyze more subtle vulnerabilities such as denial-of-service (DoS) attacks. To address this challenge, in this paper, we propose use of TLA+ to automatically check DoS vulnerability of network protocols with completeness guarantee. In particular, we develop new schemes to avoid state space explosion in property checking and to model attackers' capabilities for finding realistic attacks. As a case study, we successfully identify threats to IEEE 802.16 air interface protocols.","PeriodicalId":206067,"journal":{"name":"2006 2nd IEEE Workshop on Secure Network Protocols","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132017701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient Techniques for Detecting False Origin Advertisements in Inter-domain Routing","authors":"S. Y. Qiu, F. Monrose, A. Terzis, P. Mcdaniel","doi":"10.1109/NPSEC.2006.320341","DOIUrl":"https://doi.org/10.1109/NPSEC.2006.320341","url":null,"abstract":"The Border Gateway Protocol (BGP), and hence the Internet, remains critically vulnerable to a range of prefix forgery attacks. In this paper, we address these attacks by proposing a non-cryptographic, incrementally deployable mechanism to probabilistically detect forged BGP origin advertisements. Upon receiving an advertisement from a \"suspicious\" origin, the receiving domain intelligently probes other ASes about the received information. Any dissenting information indicates potential forgery or error, and is reported by the polled ASes to the true origin and processed appropriately. In this design, we exploit the fact that the highly connected AStopology makes it difficult to block the dissemination of information as it traverses the Internet. We evaluate the effectiveness of our probing mechanism via simulation on realistic Internet topologies. The experiments show that 98% of forgeries can be detected even when as few as 10% of the ASes participate in the protocol under a naive polling stratagem. Moreover, we show that judicious node selection can further improve detection rates while minimizing the number of probes.","PeriodicalId":206067,"journal":{"name":"2006 2nd IEEE Workshop on Secure Network Protocols","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125134473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reducing the Impact of DoS Attacks on Endpoint IP Security","authors":"J. Touch, Y.-H.E. Yang","doi":"10.1109/NPSEC.2006.320340","DOIUrl":"https://doi.org/10.1109/NPSEC.2006.320340","url":null,"abstract":"IP security is designed to protect hosts from attack, but can itself provide a way to overwhelm the resources of a host. One such denial of service (DoS) attack involves sending incorrectly signed packets to a host, which then consumes substantial CPU resources to reject unwanted traffic. This paper examines the impact of such attacks, and provides a preliminary exploration of ways to reduce their impact. Measurements of the impact of DoS attack traffic on times86-based hosts in FreeBSD indicate that a single DoS attacker can reduce throughput by half. This impact can be reduced to approximately 20% by layering low-effort nonce validation on IPsec's more CPU-intensive cryptographic algorithms, but the choice of algorithm does not have as large an effect. This work suggests that effective DoS resistance requires an hierarchical defense using both nonces and strong cryptography at the endpoints.","PeriodicalId":206067,"journal":{"name":"2006 2nd IEEE Workshop on Secure Network Protocols","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133691384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}