Abstract
Cable networks are complex systems that have evolved over years and in which new features like Internet access and Voice over IP (VoIP) have been integrated. We argue that threat models must evolve together with such systems and show that inadequate threat models can be used to explain known and unknown vulnerabilities in today’s cable networks. We do this by demonstating an attack on the DOCSIS provisioning standard in cable networks. By exploiting this weakness, an attacker can hijack VoIP accounts. We also show how to mitigate the attack.
Chapter PDF
Similar content being viewed by others
Keywords
- Medium Access Control
- Session Initiation Protocol
- Internet Service Provider
- Cable Network
- Medium Access Control Address
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Security on Data-over-Cable Systems: DOCSIS, BPI+ and Beyondm (November 2000), http://www.3com.com/other/pdfs/infra/corpinfo/en_US/50301102.pdf
Hacking the Cable Modem: What Cable Companies Don’t Want You to Know. No Starch Press, San Francisco (2006)
PacketCable 2.0: Security Technical Report. Technical Report PKT-TR-SEC-V05-080425, Cable Television Laboratories, Inc. (April 2008)
Alexander, S., Droms, R.: DHCP Options and BOOTP Vendor Extensions. RFC 2132 (1997)
Bundesnetzagentur. Tätigkeitsbericht 2008/2009 Telekommunikation (December 2009)
Cable Television Laboratories, Inc., Cable Modem to Customer Premise Equipment Interface. Technical Report CM-SP-CMCI-C01-081104 (November 2008)
Cable Television Laboratories Research Consortium. DOCSIS Website (2010), http://www.cablelabs.com/cablemodem/
Endler, D., Collier, M.: Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions, 1st edn. McGraw-Hill, Inc., New York (2007)
Johns, M.S.: DOCSIS Cable Device MIB Cable Device Management Information Base for DOCSIS compliant Cable Modems and Cable Modem Termination Systems. RFC 2669 (1999)
Latini, P.S.: Avoiding Piracy in DOCSIS Networks. Canitec Conference and Exhibition (April 2010)
McKelvey, J.: Combating security risks on the cable IP network. Cisco Systems, Inc., Whitepaper (June 2002)
Millet, M.: Theft of Service — Inevitable? CableFAX: The Magazine (December 2005)
Pahwa, P., Tiwari, G., Chhabra, R.: Spoofing Media Access Control (MAC) and its Counter Measures. International Journal of Advanced Engineering & Application (January 2010)
Raftus, D., Cardona, E.: Radio Frequency (RF) Interface Management Information Base for Data over Cable Service Interface Specifications (DOCSIS) 2.0 Compliant RF Interfaces. RFC 4546 (2006)
Shah, N., Kouvatsos, D., Martin, J., Moser, S.: A Tutorial on DOCSIS: Protocol and Performance Models. In: International Working Conference on Performance Modeling and Evaluation of Heterogeneous Networks (July 2005)
Swiderski, F., Snyder, W.: Threat modeling. Microsoft Press, Redmond (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 IFIP International Federation for Information Processing
About this paper
Cite this paper
Alsbih, A., Freiling, F.C., Schindelhauer, C. (2011). A Case Study in Practical Security of Cable Networks. In: Camenisch, J., Fischer-Hübner, S., Murayama, Y., Portmann, A., Rieder, C. (eds) Future Challenges in Security and Privacy for Academia and Industry. SEC 2011. IFIP Advances in Information and Communication Technology, vol 354. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-21424-0_8
Download citation
DOI: https://doi.org/10.1007/978-3-642-21424-0_8
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-21423-3
Online ISBN: 978-3-642-21424-0
eBook Packages: Computer ScienceComputer Science (R0)