skip to main content
research-article

An untold story of middleboxes in cellular networks

Published:15 August 2011Publication History
Skip Abstract Section

Abstract

The use of cellular data networks is increasingly popular as network coverage becomes more ubiquitous and many diverse user-contributed mobile applications become available. The growing cellular traffic demand means that cellular network carriers are facing greater challenges to provide users with good network performance and energy efficiency, while protecting networks from potential attacks. To better utilize their limited network resources while securing the network and protecting client devices the carriers have already deployed various network policies that influence traffic behavior. Today, these policies are mostly opaque, though they directly impact application designs and may even introduce network vulnerabilities.

We present NetPiculet, the first tool that unveils carriers' NAT and firewall policies by conducting intelligent measurement. By running NetPiculet on the major U.S. cellular providers as well as deploying it as a smartphone application in the wild covering more than 100 cellular ISPs, we identified the key NAT and firewall policies which have direct implications on performance, energy, and security. For example, NAT boxes and firewalls set timeouts for idle TCP connections, which sometimes cause significant energy waste on mobile devices. Although most carriers today deploy sophisticated firewalls, they are still vulnerable to various attacks such as battery draining and denial of service. These findings can inform developers in optimizing the interaction between mobile applications and cellular networks and also guide carriers in improving their network configurations.

Skip Supplemental Material Section

Supplemental Material

sigcomm_11_3.mp4

mp4

182.7 MB

References

  1. Allot: Video streaming dominated mobile data traffic in first half 2010. http://www.indiatelecomtracker.com/archives/2669.Google ScholarGoogle Scholar
  2. Apple Push Notification Service. http://en.wikipedia.org/wiki/Apple_Push_Notification_Service.Google ScholarGoogle Scholar
  3. Building Push Applications for Android. http://dl.google.com/googleio/2010/android-push-applications-android.pdf.Google ScholarGoogle Scholar
  4. Cisco Mobile Exchange. http://docstore.mik.ua/univercd/cc/td/doc/product/wireless/moblwrls/cmx/mmg_sg/cmxdesc.htm.Google ScholarGoogle Scholar
  5. Fring. http://www.fring.com.Google ScholarGoogle Scholar
  6. Tango. http://tango.me.Google ScholarGoogle Scholar
  7. tcp(7) - Linux man page. http://linux.die.net/man/7/tcp.Google ScholarGoogle Scholar
  8. WindRider: A Mobile Network Neutrality Monitoring System. http://www.cs.northwestern.edu/~ict992/mobile.htm.Google ScholarGoogle Scholar
  9. Cisco GGSN Release. http://www.cisco.com/en/US/prod/collateral/iosswrel/ps8802/ps6947/ps5413/prod_bulletin0900aecd802e0859.html, 2005.Google ScholarGoogle Scholar
  10. TCP Out-of-Order Packet Support for Cisco IOS Firewall and Cisco IOS IPS. http://www.cisco.com/en/US/docs/ios/12_4t/12_4t11/ht_ooop.html, 2006.Google ScholarGoogle Scholar
  11. Interworking between the Public Land Mobile Network (PLMN) supporting packet based services and Packet Data Networks (PDN). 3GPP TS 29.061 V6.15.0, 2008.Google ScholarGoogle Scholar
  12. Improving TCP's Robustness to Blind In-Window Attacks. http://tools.ietf.org/html/rfc5961, 2010.Google ScholarGoogle Scholar
  13. M. Allman. On the Performance of Middleboxes. In Proc. ACM SIGCOMM IMC, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. R. Beverly, A. Berger, Y. Hyun, and k claffy. Understanding the Efficacy of Deployed Internet Source Address Validation Filtering. In Proc. ACM SIGCOMM IMC, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. A. Biggadike, D. Ferullo, G. Wilson, and A. Perrig. NATBLASTER: Establishing TCP Connections Between Hosts Behind NATs. In Proc. of ACM SIGCOMM ASIA Workshop, 2005.Google ScholarGoogle Scholar
  16. Z. Cao, Z. Wang, and E. Zegura. Performance of HashingnBased Schemes for Internet Load Balancing. In INFOCOM, 2000.Google ScholarGoogle Scholar
  17. M. Casado and M. J. Freedman. Peering through the shroud: The effect of edge opacity on IP-based client identification. In Proc. Symposium on Networked Systems Design and Implementation, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. J. L. Eppinger. TCP Connections for P2P Apps: A Software Approach to Solving the NAT Problem. http://reports-archive.adm.cs.cmu.edu/anon/isri2005/Carnegie Mellon University-ISRI-05-104.pdf.Google ScholarGoogle Scholar
  19. H. Falaki, R. Mahajan, S. Kandula, D. Lymberopoulos, R. Govindan, and D. Estrin. Diversity in Smartphone Usage. In Proc. ACM MOBISYS, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. B. Ford, P. Srisuresh, and D. Kegel. Peer-to-Peer Communication Across Network Address Translators. In Proc. of the USENIX Annual Technical Conference, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. S. Guha and P. Francis. Characterization and Measurement of TCP Traversal through NATs and Firewalls. In Proc. ACM SIGCOMM IMC, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. S. Guha, Y. Takeda, and P. Francis. NUTSS: A SIP-based Approach to UDP and TCP Network Connectivity. In Proc. of SIGCOMM'04 Workshop, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. J. Huang, Q. Xu, B. Tiwana, Z. M. Mao, M. Zhang, and P. Bahl. Anatomizing Application Performance Differences on Smartphones. In Proc. ACM MOBISYS, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. V. Jacobson, R. Braden, and D. Borman. TCP Extensions for High Performance. http://tools.ietf.org/html/rfc1323, 1992. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. P. P. Lee, T. Bu, and T. Woo. On the Detection of Signaling DoS Attacks on 3G Wireless Networks. In Proc. IEEE INFOCOM, 2007.Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. P. P. C. Lee, T. Bu, and T. Woo. On the Detection of Signaling DoS Attacks on 3G Wireless Networks. In Proc. IEEE INFOCOM, 2007.Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. D. MacDonald and B. Lowekamp. NAT Behavior Discovery Using STUN. http://tools.ietf.org/html/draft-ietf-behave-nat-behavior-discovery-08.Google ScholarGoogle Scholar
  28. L. Makinen and J. K. Nurminen. Measurements on the Feasibility of TCP NAT Traversal in Cellular Networks. In Proc. of the 4th EURO-NGI Conference on Next Generation Internet Networks, 2008.Google ScholarGoogle ScholarCross RefCross Ref
  29. A. Medina, M. Allman, and S. Floyd. Measuring Interactions Between Transport Protocols and Middleboxes. In Proc. ACM SIGCOMM IMC, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. P. Porras, H. Saidi, and V. Yegneswaran. An Analysis of the iKee.B iPhone Botnet. In Proc. of International ICST Conference on Security and Privacy in Mobile Information and Communication Systems, 2010.Google ScholarGoogle ScholarCross RefCross Ref
  31. F. Qian, Z. Wang, A. Gerber, Z. M. Mao, S. Sen, and O. Spatscheck. Characterizing Radio Resource Allocation for 3G Networks. In Proc. ACM SIGCOMM IMC, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. R. Racic, D. Ma, and H. Chen. Exploiting mms vulnerabilities to stealthily exhaust mobile phone's battery. In Proc. of SecureComm, 2006.Google ScholarGoogle ScholarCross RefCross Ref
  33. P. Sarolahti and M. Kojo. Forward RTO-Recovery (F-RTO): An Algorithm for Detecting Spurious Retransmission Timeouts with TCP and the Stream Control Transmission Protocol (SCTP). http://tools.ietf.org/html/rfc4138, 2005.Google ScholarGoogle Scholar
  34. J. Serror. Impact of paging channel overloads or attacks on a cellular network. In Proceedings of the 5th ACM workshop on Wireless security, WiSe, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. U. Shankar and V. Paxson. Active Mapping: Resisting NIDS Evasion Without Altering Traffic. In Proc. IEEE Symposium on Security and Privacy, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. P. Traynor, P. McDaniel, and T. La Porta. On Attack Causality in Internet-connected Cellular Networks. In Proc. of 16th USENIX Security Symposium, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. An untold story of middleboxes in cellular networks

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image ACM SIGCOMM Computer Communication Review
      ACM SIGCOMM Computer Communication Review  Volume 41, Issue 4
      SIGCOMM '11
      August 2011
      480 pages
      ISSN:0146-4833
      DOI:10.1145/2043164
      Issue’s Table of Contents
      • cover image ACM Conferences
        SIGCOMM '11: Proceedings of the ACM SIGCOMM 2011 conference
        August 2011
        502 pages
        ISBN:9781450307970
        DOI:10.1145/2018436

      Copyright © 2011 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 15 August 2011

      Check for updates

      Qualifiers

      • research-article

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader