vulnerability of radar protocol and … · othe radar system is extremely important and each ......

34
VULNERABILITY OF RADAR PROTOCOL AND PROPOSED MITIGATION Authors

Upload: nguyenbao

Post on 29-Apr-2018

215 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: VULNERABILITY OF RADAR PROTOCOL AND … · oThe radar system is extremely important and each ... oIn this presentation we are going to show you the ... It changes the transmitter

VULNERABILITY OF RADAR PROTOCOL AND PROPOSED MITIGATION

Authors

Page 2: VULNERABILITY OF RADAR PROTOCOL AND … · oThe radar system is extremely important and each ... oIn this presentation we are going to show you the ... It changes the transmitter

ABOUT US

oWe are an investigation group from Córdoba, Argentina. oEduardo Casanovas is an Electronic Engineer, TelecommunicationsSpecialist, Cryptography and Teleinformatic-Security Specialist, Master in Telecommunications- Engineering- Science. Also, he is a graduate teacher in IUA.oTomás Buchaillot and Facundo Baigorria are System Analysts and University Technician in Programming. They are finishing their Software Engineer degree.oEduardo is actually the thesis project’s tutor for Tomas and Facundo. This paper is based on our thesis project.

Page 3: VULNERABILITY OF RADAR PROTOCOL AND … · oThe radar system is extremely important and each ... oIn this presentation we are going to show you the ... It changes the transmitter

THE PROBLEM

oThe radar system is extremely important and eachgovernment MUST ensure the safety of passengers and the efficency of the system.oNowadays, the data traffic between the radars and theoperation center of the airports IS NOT SAFE.oIn this presentation we are going to show you theproblem in this data protocol –ASTERIX- , a simulation of an attack and a proposed mitigation.

Simplificationof the radar

system

NOT SAFE

Page 4: VULNERABILITY OF RADAR PROTOCOL AND … · oThe radar system is extremely important and each ... oIn this presentation we are going to show you the ... It changes the transmitter

o All Purpose STructured Eurocontrol SuRveillance Information Exchange.

oStandard protocol designed to exchange data between radar sensors and the control centers through means of a message structure.

oHas been developed bit by bit to provide and optimize surveillance information exchange inside and between countries which makes the aerial traffic control centers (ATC) ASTERIX’s main users.

ASTERIX

Page 5: VULNERABILITY OF RADAR PROTOCOL AND … · oThe radar system is extremely important and each ... oIn this presentation we are going to show you the ... It changes the transmitter

ASTERIX

oData Categories

oData Item

oData Field

oUser Application Profile

oData Block

oRegisters

- Structure

Page 6: VULNERABILITY OF RADAR PROTOCOL AND … · oThe radar system is extremely important and each ... oIn this presentation we are going to show you the ... It changes the transmitter

- StructureASTERIX

Page 7: VULNERABILITY OF RADAR PROTOCOL AND … · oThe radar system is extremely important and each ... oIn this presentation we are going to show you the ... It changes the transmitter

- FSPECASTERIX

Page 8: VULNERABILITY OF RADAR PROTOCOL AND … · oThe radar system is extremely important and each ... oIn this presentation we are going to show you the ... It changes the transmitter

- Category 048ASTERIX

Page 9: VULNERABILITY OF RADAR PROTOCOL AND … · oThe radar system is extremely important and each ... oIn this presentation we are going to show you the ... It changes the transmitter

- Category 048ASTERIX

Page 10: VULNERABILITY OF RADAR PROTOCOL AND … · oThe radar system is extremely important and each ... oIn this presentation we are going to show you the ... It changes the transmitter

o Gives the attacker the possibility to read, insert, drop and modify the packets.

o ARP Poisoning technique.

Host A Host B

M an i n t he M iddle

Page 11: VULNERABILITY OF RADAR PROTOCOL AND … · oThe radar system is extremely important and each ... oIn this presentation we are going to show you the ... It changes the transmitter

oSince all the ASTERIX data travels unencrypted, we just need to get into an airport network the make the attack.

That is scary.

oWe developed a software which captures all the packets between two nodes (Radar and Operation Center) and

manipulates them. In order to do that, the software creates a virtual interface in which all the packages go trough.

oThis software receives three options: BLOCK, ADD and MOD. With these options, we can delete the aircraft’s

information , modify the route of the airplanes or even add new airplanes in the system. In other words, we own all

the radar traffic.

- Applied to ASTERIXM an i n t he M iddle

Page 12: VULNERABILITY OF RADAR PROTOCOL AND … · oThe radar system is extremely important and each ... oIn this presentation we are going to show you the ... It changes the transmitter

NETWORK SIMULATION

AirplaneAirplane

RadarRadar

RouterRouter

OperationCenter

OperationCenter

In order to recreate a real airplane data, we use FlightGear, an open sourceflight simulator.

To simulate the radar, we developed a software called AGIUA. This software takes the data of the airplane and creates the ASTERIX packets

In this section, we developed ourown firewall using iptables rules.

For the simulation of the operationcenter, we created a software thatdecodes each ASTERIX package and represents them in a graphic radar.

Page 13: VULNERABILITY OF RADAR PROTOCOL AND … · oThe radar system is extremely important and each ... oIn this presentation we are going to show you the ... It changes the transmitter

FLIGHTGEAR

It is a multiplatform open-sourced flight simulator.

We use this software with the purpose of obtaining real-time aircraft data.

Page 14: VULNERABILITY OF RADAR PROTOCOL AND … · oThe radar system is extremely important and each ... oIn this presentation we are going to show you the ... It changes the transmitter

FLIGHTGEAR

FlightGear has a system which can obtain realtime aircraft data through a XML file.

Doing so, we set the necessary data and we sendthem to a specific AGIUA port.

- XML File

Page 15: VULNERABILITY OF RADAR PROTOCOL AND … · oThe radar system is extremely important and each ... oIn this presentation we are going to show you the ... It changes the transmitter

AGIUA – Radar Simulator

AGIUA (Asterix Generator IUA) takes the data from a specific port and creates with it ASTERIX packets and sends them trough the network.

As for now, AGIUA can only create category 48, 32, 1 and 2 packets.

Page 16: VULNERABILITY OF RADAR PROTOCOL AND … · oThe radar system is extremely important and each ... oIn this presentation we are going to show you the ... It changes the transmitter

Operation Center Simulator

This software receives the ASTERIX packets and puts them in a queue. After that, the software creates threads that decode these packets and send them to

a graphical interface. This GUI, has 2 radars: a radar in which we can see the normal route of the planes and a hacked radar in which we see the attacks.

Page 17: VULNERABILITY OF RADAR PROTOCOL AND … · oThe radar system is extremely important and each ... oIn this presentation we are going to show you the ... It changes the transmitter

ATTACK SIMULATION

AirplaneAirplane

RadarRadar

RouterRouter

OperationCenter

OperationCenter

Simulated NetworkSimulated Network

MITMAST

Page 18: VULNERABILITY OF RADAR PROTOCOL AND … · oThe radar system is extremely important and each ... oIn this presentation we are going to show you the ... It changes the transmitter

MITMAST

MITMAST (Man In The Middle ASTerix) is a software which makes the ARP Poisoning attack and modifies the ASTERIX blocks of the packages depending on the given option.

We have 3 options:

MOD

With this option, we can change the route of a determined aircraft. We just need the Aircraft Address and the final coordinates of the plane.

BLOCK

With this option we can delete all the packets of a particular aircraft that has been sent in the network. We just need the Aircraft Address, which is an element contained in each ASTERIX packet.

ADD

With this option we can add a “X” number of ghost planes. We just need the Aircraft Address which we want to “copy” and a “X” number of fake planes.

Page 19: VULNERABILITY OF RADAR PROTOCOL AND … · oThe radar system is extremely important and each ... oIn this presentation we are going to show you the ... It changes the transmitter

- Sniff CommandM i t M

Page 20: VULNERABILITY OF RADAR PROTOCOL AND … · oThe radar system is extremely important and each ... oIn this presentation we are going to show you the ... It changes the transmitter

- BLOCK CommandM i t M

Page 21: VULNERABILITY OF RADAR PROTOCOL AND … · oThe radar system is extremely important and each ... oIn this presentation we are going to show you the ... It changes the transmitter

- ADD CommandM i t M

Page 22: VULNERABILITY OF RADAR PROTOCOL AND … · oThe radar system is extremely important and each ... oIn this presentation we are going to show you the ... It changes the transmitter

- MOD CommandM i t M

Page 23: VULNERABILITY OF RADAR PROTOCOL AND … · oThe radar system is extremely important and each ... oIn this presentation we are going to show you the ... It changes the transmitter

- AttackM i t M

F l i gh tGea rRad a rCentro de OperacionesMan in the Middle

Page 24: VULNERABILITY OF RADAR PROTOCOL AND … · oThe radar system is extremely important and each ... oIn this presentation we are going to show you the ... It changes the transmitter

- AttackM i t M

1. FlightGear generates data in the XML file format.

2. It sends the data to theRadar’s VM

3. It receive data, decodes itand generates ASTERIX packets.

4. It sends the data to the CO (OperationCenter)

5. It performs the MitM attackIt changes the transmitter and receiver MAC address in orderto forcé the packets to go through it.

Page 25: VULNERABILITY OF RADAR PROTOCOL AND … · oThe radar system is extremely important and each ... oIn this presentation we are going to show you the ... It changes the transmitter

- AttackM i t M

6. It executes any of theavailable commands

It executes the ARP poisoning.-192.168.1.200: Radar’s VM IP address.-192.168.1.201: CO’s VM IP address.

Page 26: VULNERABILITY OF RADAR PROTOCOL AND … · oThe radar system is extremely important and each ... oIn this presentation we are going to show you the ... It changes the transmitter

-Sniff DemonstrationM i t M

Page 27: VULNERABILITY OF RADAR PROTOCOL AND … · oThe radar system is extremely important and each ... oIn this presentation we are going to show you the ... It changes the transmitter

-BLOCK DemonstrationM i t M

Page 28: VULNERABILITY OF RADAR PROTOCOL AND … · oThe radar system is extremely important and each ... oIn this presentation we are going to show you the ... It changes the transmitter

-ADD DemonstrationM i t M

Page 29: VULNERABILITY OF RADAR PROTOCOL AND … · oThe radar system is extremely important and each ... oIn this presentation we are going to show you the ... It changes the transmitter

-MOD DemonstrationM i t M

Page 30: VULNERABILITY OF RADAR PROTOCOL AND … · oThe radar system is extremely important and each ... oIn this presentation we are going to show you the ... It changes the transmitter

MITIGATION

ASTERIX does not have any security mechanism of its own. This leads us to cover the followingaspects.

Replay AttackThe attacker is able to sniff the network data traffic and also save it and try to inject itin another moment.Possible mitigation:Encrypt each packet timestamp.

Packets ModificationThe attacker is able to perform an MiTM, which allows it to modify the packets.Possible mitigation:• Validation of the packets integrity using hash functions.• Validation of the packets integrity using HMAC functions.

Packets SwapThe attacker is able to perform a MiTM, which allows it swap packets.Possible mitigation:• Encryption of the most critical data fields, for instance the aircraft ID, the aircraft address and its

position. • The most recent encryption techniques suggest the use of AEAD algorythms (Authenticated

Encryption with Associated Data) because of their confidentiality, integrity and authentication.

Page 31: VULNERABILITY OF RADAR PROTOCOL AND … · oThe radar system is extremely important and each ... oIn this presentation we are going to show you the ... It changes the transmitter

PerformanceAnd Efficiency-

o It is very important that any of the security measures used does not impair thesystem’s performance.

o Based on our tests we can demonstrate that with the latest processing power we canachieve the incorporation of these security measures without impairing the normal flowof sent and recieved packages from the operation center

MITIGATION

Page 32: VULNERABILITY OF RADAR PROTOCOL AND … · oThe radar system is extremely important and each ... oIn this presentation we are going to show you the ... It changes the transmitter

o ASTERIX protocol is vulnerable.

o An attack like the one shown before can bring huge monetary or lives lost in anycountry.

o With an encryptation mechanisim this problem can be solved.

CONCLUSION

Page 33: VULNERABILITY OF RADAR PROTOCOL AND … · oThe radar system is extremely important and each ... oIn this presentation we are going to show you the ... It changes the transmitter

Q&A

Questions Time

Page 34: VULNERABILITY OF RADAR PROTOCOL AND … · oThe radar system is extremely important and each ... oIn this presentation we are going to show you the ... It changes the transmitter

ITU Kaleidoscope 2015 Barcelona, Spain

Casanovas – Baigorria – Buchaillot

Thank you!Have a good flight home!