|
article page | 1 | 2 |
that many identities may stress
the CPU and memory resources of the
intercept device itself. Lastly,
the call quality of legitimate callers
would certainly suffer, since the
media gateway controllers within
the ISP would be expected to stop
admitting new calls during the call
storm.
The publicly addressable components
of an LI system such as the reporting
portals also introduce new vulnerabilities
into an ISP’s infrastructure.
An attacker could initiate a buffer
overflow exploit against the Web
portal
|
|
Once
ISPs become compliant with CALEA
and ETSI in 2007, “cyber
mafias” could gain yet
another customer.
|
LI
Security Solution
Fortunately, solutions and
techniques that have been
developed to solve the general
problem of Internet security
can be applied to securing
LI infrastructure as well.
The pertinent requirements
of such a security solution
would call for visibility
across all the layers of
the OSI stack as well as
scalability to the high-speed
links found in carrier-class
|
|
|
|
in order to gain backdoor entry
into the ISP’s infrastructure. Exacerbating
this is the fact that the tools and resources for
achieving such exploits are quite easily available.
The attacker could begin with ICMP pings to determine
publicly accessible machines and continue with
port scans and OS fingerprinting techniques to
determine open services on a machine, and then
install malware known to exploit those services.
Once the attacker has gained backdoor entry into
the ISP’s infrastructure, he could eavesdrop
on all communications and parse all of the traffic.
He could determine if a subpoena has been initiated
against him, and thereby stay a step ahead of LEAs
in the intercept battle.
Why exactly would this be important
for carrier networks and ISPs? Well,
a lot of the DoS, DDoS, scan and worm
attacks seen to date on the Internet
have been launched by thrill-seeking
script kiddies, cyber extortionists looking
to make a quick buck, or by spammers
looking for un-patched, vulnerable machines
so that they could add them to their
bot armies. However, once ISPs become
compliant with CALEA and ETSI in 2007,
the scenario will very likely change
as “cyber mafias” could gain
yet another customer. In fact, criminals
or terrorists who, upon learning of impending
intercept warrants against them, could
be expected to approach cyber mafias
to prevent successful interception. The
results could be disastrous, with cyber
attacks launched as fast as warrants
are issued.
Unfortunately, ISPs and carriers will
bear the brunt of such a mafia nexus.
Imagine being an ISP that suddenly starts
fielding a huge number of phone calls
from disgruntled customers who couldn’t
check their e-mails, couldn’t access
their banking accounts and couldn’t
order lifesaving drugs online, all because
they were being DDoSed for opening up
a cyber warrant against a particular
target.
|
|
networks. It
is imperative to point out that,
since every network has different
traffic characteristics, an effective
carrier-class security solution must
adapt on the fly to subtleties in
traffic patterns to provide a high
detection rate while minimizing the
false-positive rate (defined as the
instances where legitimate traffic
is classified as malicious).
Once an attack is discovered,
it can be mitigated before it affects
the LI infrastructure or even the
ISP’s network, thereby protecting
the integrity of the intercept.
Common mitigation methodologies
such as Access Control Lists and
Blackholing or null-routing can
be used to drop all attack traffic
at the edge routers of the ISP,
before it affects the rest of the
network. However, in some cases,
it may be desirable to further
investigate the attack traffic,
which can be achieved via mitigation
solutions such as Sinkholing or
re-routing attack traffic to a
different part of the network where
it can be scrubbed and further
analyzed. This can serve as an
important tool for LEAs, who can
then inspect the attacks to look
for circumstantial evidence that
can further implicate a target
for interfering with investigation.
In summary, the deployment of a
Lawful Intercept solution without
a corresponding carrier-class security
solution can not only compromise
an ISP’s ability to comply
with a warrant from an LEA, it can
also increase the risk of attack
on core service and routing infrastructure. |
|
|
|