Fault-Tolerant Forwarding in the Face of Malicious Routers Alper T. Mızrak, Keith Marzullo, Stefan Savage University of California, San Diego.

Slides:



Advertisements
Similar presentations
Data-Plane Accountability with In-Band Path Diagnosis Murtaza Motiwala, Nick Feamster Georgia Tech Andy Bavier Princeton University.
Advertisements

Detecting Malicious Routers Alper T. Mızrak, Keith Marzullo, Stefan Savage University of California, San Diego.
1 Routing Protocols I. 2 Routing Recall: There are two parts to routing IP packets: 1. How to pass a packet from an input interface to the output interface.
University of California, San Diego Fatih : Detecting and Isolating Malicious Routers Alper T Mizrak, Yu-Chung Cheng, Prof. Keith Marzullo, Prof. Stefan.
Ch. 12 Routing in Switched Networks Routing in Packet Switched Networks Routing Algorithm Requirements –Correctness –Simplicity –Robustness--the.
BY MICHAEL SUDKOVITCH AND DAVID ROITMAN UNDER THE GUIDANCE OF DR. GABI NAKIBLY OSPF Security project: Summary.
Byzantine Generals Problem: Solution using signed messages.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
1 LINK STATE PROTOCOLS (contents) Disadvantages of the distance vector protocols Link state protocols Why is a link state protocol better?
Distributed systems Module 2 -Distributed algorithms Teaching unit 1 – Basic techniques Ernesto Damiani University of Bozen Lesson 3 – Distributed Systems.
Traffic Engineering With Traditional IP Routing Protocols
Multiple constraints QoS Routing Given: - a (real time) connection request with specified QoS requirements (e.g., Bdw, Delay, Jitter, packet loss, path.
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
CCNA 2 v3.1 Module 6.
1 Relates to Lab 4. This module covers link state routing and the Open Shortest Path First (OSPF) routing protocol. Dynamic Routing Protocols II OSPF.
A General approach to MPLS Path Protection using Segments Ashish Gupta Ashish Gupta.
Chapter 10 Introduction to Wide Area Networks Data Communications and Computer Networks: A Business User’s Approach.
Link-State Routing Reading: Sections 4.2 and COS 461: Computer Networks Spring 2011 Mike Freedman
User-level Internet Path Diagnosis R. Mahajan, N. Spring, D. Wetherall and T. Anderson.
Routing and Routing Protocols
Routing Protocol Pertemuan 21 Matakuliah: H0484/Jaringan Komputer Tahun: 2007.
A General approach to MPLS Path Protection using Segments Ashish Gupta Ashish Gupta.
 Structured peer to peer overlay networks are resilient – but not secure.  Even a small fraction of malicious nodes may result in failure of correct.
1 ECE453 – Introduction to Computer Networks Lecture 10 – Network Layer (Routing II)
1 Relates to Lab 4. This module covers link state routing and the Open Shortest Path First (OSPF) routing protocol. Dynamic Routing Protocols II OSPF.
ROUTING ON THE INTERNET COSC Aug-15. Routing Protocols  routers receive and forward packets  make decisions based on knowledge of topology.
Connecting Networks © 2004 Cisco Systems, Inc. All rights reserved. Exploring How Routing Works INTRO v2.0—4-1.
Routing and Routing Protocols Dynamic Routing Overview.
1 CS 4396 Computer Networks Lab Dynamic Routing Protocols - II OSPF.
1 Pertemuan 20 Teknik Routing Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
1 Introducing Routing 1. Dynamic routing - information is learned from other routers, and routing protocols adjust routes automatically. 2. Static routing.
M.Menelaou CCNA2 ROUTING. M.Menelaou ROUTING Routing is the process that a router uses to forward packets toward the destination network. A router makes.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 2 Module 6 Routing and Routing Protocols.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 2 v3.1 Module 6 Routing and Routing Protocols.
Routing -2 Dynamic Routing
Network Layer4-1 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside a router r 4.4 IP: Internet.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Chapter 5 Network Layer.
Review for Exam 2. Topics included Deadlock detection Resource and communication deadlock Graph algorithms: Routing, spanning tree, MST, leader election.
Page 110/27/2015 A router ‘knows’ only of networks attached to it directly – unless you configure a static route or use routing protocols Routing protocols.
1 Week 5 Lecture 2 IP Layer. 2 Network layer functions transport packet from sending to receiving hosts transport packet from sending to receiving hosts.
1 Module 4: Implementing OSPF. 2 Lessons OSPF OSPF Areas and Hierarchical Routing OSPF Operation OSPF Routing Tables Designing an OSPF Network.
Data Communications and Networking Chapter 11 Routing in Switched Networks References: Book Chapters 12.1, 12.3 Data and Computer Communications, 8th edition.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Agenda Fail Stop Processors –Problem Definition –Implementation with reliable stable storage –Implementation without reliable stable storage Failure Detection.
TCOM 509 – Internet Protocols (TCP/IP) Lecture 06_a Routing Protocols: RIP, OSPF, BGP Instructor: Dr. Li-Chuan Chen Date: 10/06/2003 Based in part upon.
CCNA 2 Week 6 Routing Protocols. Copyright © 2005 University of Bolton Topics Static Routing Dynamic Routing Routing Protocols Overview.
Routing and Routing Protocols
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
TELE202 Lecture 6 Routing in WAN 1 Lecturer Dr Z. Huang Overview ¥Last Lecture »Packet switching in Wide Area Networks »Source: chapter 10 ¥This Lecture.
Routing Networks and Protocols Prepared by: TGK First Prepared on: Last Modified on: Quality checked by: Copyright 2009 Asia Pacific Institute of Information.
1 Protecting Network Quality of Service against Denial of Service Attacks Douglas S. Reeves S. Felix Wu Chandru Sargor N. C. State University / MCNC October.
1 Version 3.1 Module 6 Routed & Routing Protocols.
Teknik Routing Pertemuan 10 Matakuliah: H0524/Jaringan Komputer Tahun: 2009.
Dynamic Routing Protocols II OSPF
Spring 2000CS 4611 Routing Outline Algorithms Scalability.
1 An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng.
1 Chapter 4: Internetworking (IP Routing) Dr. Rocky K. C. Chang 16 March 2004.
Improving Fault Tolerance in AODV Matthew J. Miller Jungmin So.
Internet Traffic Engineering Motivation: –The Fish problem, congested links. –Two properties of IP routing Destination based Local optimization TE: optimizing.
CS 6401 Intra-domain Routing Outline Introduction to Routing Distance Vector Algorithm.
Day 13 Intro to MANs and WANs. MANs Cover a larger distance than LANs –Typically multiple buildings, office park Usually in the shape of a ring –Typically.
ROUTING ON THE INTERNET COSC Jun-16. Routing Protocols  routers receive and forward packets  make decisions based on knowledge of topology.
Fundamentals of Fault-Tolerant Distributed Computing In Asynchronous Environments Paper by Felix C. Gartner Graeme Coakley COEN 317 November 23, 2003.
Dynamic Routing Protocols II OSPF
CCNA 2 v3.1 Module 6 Routing and Routing Protocols
CS 457 – Lecture 12 Routing Spring 2012.
Dynamic Routing Protocols II OSPF
Link-State Routing Protocols
Intradomain Routing Outline Introduction to Routing
Link-State Routing Protocols
Presentation transcript:

Fault-Tolerant Forwarding in the Face of Malicious Routers Alper T. Mızrak, Keith Marzullo, Stefan Savage University of California, San Diego

Alper T. Mızrak; University of California, San Diego2 Introduction Modern packet switched data networks. Data must be forwarded hop-by-hop from router to router towards destination. If a router is compromised, then  Control plane: E.g. announce false route updates  Data plane: E.g. alter, misroute, drop, reorder, delay or fabricate data packets. Threat model: Byzantine failures.

Alper T. Mızrak; University of California, San Diego3 Goal Fault tolerant forwarding in the face of malicious routers. Detect the existence of compromised routers in a network. Remove them from the routing fabric.

Alper T. Mızrak; University of California, San Diego4 Approach Given a routing protocol the decisions routers make are predictable. … so this problem is a candidate for anomaly-based intrusion detection A compromised router  can be identified by correct routers  when it deviates from exhibiting expected behavior.

Alper T. Mızrak; University of California, San Diego5 Overview System Model  Network Model  Threat Model Traffic validation  Traffic summary functions Distributed detection  Specification  An example protocol Response: Changing the routing fabric Conclusion

Alper T. Mızrak; University of California, San Diego6 Network Model Assumptions  The routing protocol provides each node with a global view of the topology: Distributed link-state routing protocol: OSPF or IS-IS.  Synchronous system: Link-state protocols operate by periodically  measuring network connectivity  disseminating information  Key distribution between pairs of nearby routers This overall model is consistent with the typical construction  Large enterprise IP networks  The internal structure of single ISP backbone networks

Alper T. Mızrak; University of California, San Diego7 Definitions  Path: a finite sequence of adjacent routers:  X-path segment: a sequence of x routers that is a subsequence of a path:,  A router is faulty if it introduces discrepancy into the traffic.

Alper T. Mızrak; University of California, San Diego8 Threat Model  bad(k): Impose an upper bound on the number of adjacent faulty routers in any path. bad(2): there can be no more than 2 adjacent faulty routers in any path.  The routers at the source and sink of a flow are not faulty with respect to that flow's path. st bad(2), s source, t sink.

Alper T. Mızrak; University of California, San Diego9 Traffic Validation Way to tell that traffic isn’t disrupted en route We represent TV mechanisms as a predicate TV ( , info r i , , info r j ,  ), where:   is a path segment whose traffic is to be validated between routers r i and r j both r i and r j are in  ;  info r ,  is some abstract description of the packets router r forwarded to be routed along  over some time interval .  If routers r i and r j are not faulty, then TV ( , info ri , , info rj ,  ) evaluates to FALSE iff  contains a router that was faulty in  during .

Alper T. Mızrak; University of California, San Diego10 Traffic Summary Information How to concisely represent info r ,  ? The most precise description of traffic  an exact copy of that traffic. Many characteristics of the traffic can be summarized far more concisely:  Conservation of flow: a counter  Conservation of content: a set of fingerprints  Conservation of content order: a list of fingerprints a b info a ,  : [f 1, f 2, f 3, f 4 ] info b ,  : [f 2, f 4, f 3 ]

Alper T. Mızrak; University of California, San Diego11 Traffic Validation Evaluation In an idealized network, TV might check info r i ,  = info r j ,  However, real networks occasionally  Lose packet due to congestion.  Reorder packets due to internal multiplexing.  Corrupt packets due to interface errors. TV must be sophisticated to accommodate this abnormal, but non-malicious behaviors. Implementing TV is a tricky engineering problem. a b info a ,  : [f 1, f 2, f 3, f 4 ] info b ,  : [f 2, f 4, f 3 ]

Alper T. Mızrak; University of California, San Diego12 Overview System Model  Network Model.  Threat Model. Traffic validation.  Traffic summary functions. Distributed detection.  Specification.  An example protocol. Response: Changing the routing fabric. Conclusion

Alper T. Mızrak; University of California, San Diego13 Specification A perfect failure detector (FD) would implement the following two properties:  Accuracy (tentative): An FD is Accurate if, whenever a correct router suspects (r,  ), then r was faulty during .  Completeness (tentative): An FD is Complete if, whenever a router r is faulty at some time t, then all correct routers eventually suspect (r,  ) for some  containing t.

Alper T. Mızrak; University of California, San Diego14 Inadequate Implement the FD via Traffic Validation:  By collecting traffic information from different points in the network. Consider Any other router than b and c  Can not distinguish between the case of b being faulty and of c being faulty.  Can only infer that at least one of b and c is faulty. sab d c info ,  : ?

Alper T. Mızrak; University of California, San Diego15 Weaken the Specification Detect suspicious path segments, not individual routers. An FD returns a pair ( ,  ) where  is a path segment:  α -Accuracy: An FD is α -Accurate if, whenever a correct router suspects ( ,  ), then |  | ≤ α and some router r   was faulty in  during .  α -Completeness: An FD is α -Complete if, whenever a router r is faulty at some time t, then all correct routers eventually suspect ( ,  ) for some path segment  : |  | ≤ α such that  r was faulty in  at t, and  for some interval  containing t.

Alper T. Mızrak; University of California, San Diego16 An Example Protocol:  k+2 A router r has a set of path segments P r that it monitors.  P r contains all the path segments that have r at one end and whose length is at most k+2.  k is the maximum number of adjacent faulty routers along a path. for each path segment  in P r : while (true) { synchronize with router r' at other end of  ; collect info r ,  about  for an agreed-upon interval  ; exchange [info r ,  ] r and [info r’ ,  ] r’ with r’ through  ; if TV( , info r , , info r’ ,  ) = FALSE then suspect  ; reliable broadcast ( ,  ); }

Alper T. Mızrak; University of California, San Diego17 Properties of Protocol  k+2  k+2 is (k  2)-Accurate:  k+2 is (k  2)-Complete.  If r is faulty at some time t, then  a path segment  :  r  .  r introduce discrepancy into the traffic through  during  containing t.  Only  and  -the first and last routers of  - are correct.  3 ≤ |  | ≤ k  2.  and  monitor  and apply the  k+2 for  :  Compute TV ( , info  , , info  ,  ) to be false  Suspect , disseminate this information to the all other correct routers.

Alper T. Mızrak; University of California, San Diego18 Overhead of Protocol  k+2 This algorithm has reasonable overhead  For each forwarded packet compute a fingerprint.  Each router r must synchronize and authenticate with the other end of each  in P r.  The size of P r dominates the overhead. For Sprintlink network[Rocketfuel] of 315 routers and 972 links:  bad(1): a router monitors 35 path segments on average  bad(2): a router monitors 110 path segments on average  Dissemination of the suspected path segments can be integrated into the link state flooding mechanism.

Alper T. Mızrak; University of California, San Diego19 Response What happens as a result of a detection? Need some countermeasure protocol.  Inform the administrator.  Immediate action: Ideally would be part of the link state protocol. We have a version of Dijkstra's SPF that can exclude suspected x  path segments. ab c d is suspected

Alper T. Mızrak; University of California, San Diego20 Current Status We have implemented a prototype system, called Fatih. Runs in user-level on Linux cooperating with Zebra OSPF implementation. Gaining experience with traffic summary and validation mechanisms Still work-in-progress

Alper T. Mızrak; University of California, San Diego21 Conclusion Specified the problem formally. Explore the implementation  Traffic validation  Distributed detection  Countermeasure It might be feasible to protect networks from insider attacks of routers. There's a lot of design and engineering to do first.

Alper T. Mızrak; University of California, San Diego22 The end Thank you…

Alper T. Mızrak; University of California, San Diego23 Challenges Efficient, compact and accurate traffic summaries  What disruptions can be detected?  Sensitivity vs overhead? Sampling? Traffic validation predicates  Noise: how to distinguish normal packet loss, reordering, corruption from malicious activities. Requires secure control plane.

Alper T. Mızrak; University of California, San Diego24 WATCHERS WATCHERS protocol developed (and criticized) at University of California, Davis through Based on conservation of flow: Input to a system must either be absorbed at that system or passed along to another system.

Alper T. Mızrak; University of California, San Diego25 WATCHERS: Transit Packets xy T x,y S x,y D x,y For each router pair x and y, both routers maintain six counters for transit packets: T y,x D y,x S y,x xy

Alper T. Mızrak; University of California, San Diego26 WATCHERS: Conservation of Flow xy T x,y S x,y D x,y Conservation of flow can be expressed using these counters:

Alper T. Mızrak; University of California, San Diego27 WATCHERS: Assumptions System assumptions: Each router is a neighbor to at least one good router (good neighbor condition). Each pair of good routers has at least one path of only good routers connecting them (good path condition). A majority of the routers are good.

Alper T. Mızrak; University of California, San Diego28 WATCHERS: Algorithm Each router A and each neighbor N: 1. Compares counters of A and N.... if they don’t agree, then A diagnoses N is bad. 2. Check counters of N with those of each N ’s neighbor M.... if they don’t agree, then N and M will sort it out.

Alper T. Mızrak; University of California, San Diego29 WATCHERS: Algorithm (cont'd) 3. Check conservation of flow with each neighbor N using N ’s counters. I =   M: M  N : (S M, N + T M, N ) O =   M: M  N : (D M, N + T M, N ) If |I  O| > T for some threshold T then A diagnoses N as bad.

Alper T. Mızrak; University of California, San Diego30 WATCHERS: Consorting Routers By itself, this algorithm is not sufficient to detect consorting routers: A1234 B 3 and 4 increment D 3,4 rather than T 3,4 A sends to B 4 discards... so, changed algorithm so router maintains counters with each neighbor and destination (here, B).

Alper T. Mızrak; University of California, San Diego31 WATCHERS: Discussion Some observations: WATCHERS requires global synchronization for counter comparison. The good neighbor requirement is strong. Traffic validation is explicit. It took authors a few tries to get it right. There gave no real specification of the problem.