COPYRIGHT © 2013 ALCATEL-LUCENT. ALL RIGHTS RESERVED. ALCATEL-LUCENT — CONFIDENTIAL — SOLELY FOR AUTHORIZED PERSONS HAVING A NEED TO KNOW — PROPRIETARY.

Slides:



Advertisements
Similar presentations
An Operational Perspective on BGP Security Geoff Huston February 2005.
Advertisements

Network Monitoring System In CSTNET Long Chun China Science & Technology Network.
© 2011 Infoblox Inc. All Rights Reserved. Infoblox – control, secure & automate Mike Carroll.
1 Yehuda Afek, Tel-Aviv University / WANWall Ltd. Anat Bremler-Barr, Alon Golan, Hank Nussbacher, Dan Touitou WANWall Ltd. Diversion & Sieving Techniques.
 IPv6 Has built in security via IPsec (Internet Protocol Security). ◦ IPsec Operates at OSI layer 3 or internet layer of the Internet Protocol Suite.
Transitioning to IPv6 April 15,2005 Presented By: Richard Moore PBS Enterprise Technology.
Chapter 9: Access Control Lists
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
An Operational Perspective on BGP Security Geoff Huston GROW WG IETF 63 August 2005.
Practical and Configuration issues of BGP and Policy routing Cameron Harvey Simon Fraser University.
Security Awareness: Applying Practical Security in Your World
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Arbor Multi-Layer Cloud DDoS Protection
Department Of Computer Engineering
Firewall on Demand A multidomain approach Leonidas Poulopoulos, Yannis Mitsos – GRNET NOC Firewall on Demand workshop TF-MSP meeting.
PacNOG 6: Nadi, Fiji Dealing with DDoS Attacks Hervey Allen Network Startup Resource Center.
Firewalls CS432. Overview  What are firewalls?  Types of firewalls Packet filtering firewalls Packet filtering firewalls Sateful firewalls Sateful firewalls.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
BGP Flow specification Update
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
Tracking and Tracing Cyber-Attacks
TCOM 515 Lecture 6.
Chapter 6: Packet Filtering
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
Agenda Review route summarization Cisco acquire Sourcefire Review Final Exam.
Session 2 Security Monitoring Identify Device Status Traffic Analysis Routing Protocol Status Configuration & Log Classification.
CS 3700 Networks and Distributed Systems Inter Domain Routing (It’s all about the Money) Revised 8/20/15.
1 The Firewall Menu. 2 Firewall Overview The GD eSeries appliance provides multiple pre-defined firewall components/sections which you can configure uniquely.
Web Application Firewall (WAF) RSA ® Conference 2013.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 9: Access Control Lists Routing & Switching.
Access Control List ACL. Access Control List ACL.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
Chapter 5: Implementing Intrusion Prevention
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
1 Countering DoS Through Filtering Omar Bashir Communications Enabling Technologies
FOR INTERNAL USE ONLY [Your business] exceeds with COLT Network Response to DDoS attacks – TNC 2006 Nicolas FISCHBACH Senior Manager, Network Engineering.
Network Security Chapter 11 powered by DJ 1. Chapter Objectives  Describe today's increasing network security threats and explain the need to implement.
Module 10: How Middleboxes Impact Performance
Net Optics Confidential and Proprietary 1 Bypass Switches Intelligent Access and Monitoring Architecture Solutions.
1 SOS: Secure Overlay Services A. D. Keromytis V. Misra D. Runbenstein Columbia University.
Chapter 7 Denial-of-Service Attacks Denial-of-Service (DoS) Attack The NIST Computer Security Incident Handling Guide defines a DoS attack as: “An action.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
Internet Security Trends LACNOG 2011 Julio Arruda LATAM Engineering Manager.
An Analysis of IPv6 Security CmpE-209: Team Research Paper Presentation CmpE-209 / Spring Presented by: Dedicated Instructor: Hiteshkumar Thakker.
Security fundamentals Topic 10 Securing the network perimeter.
Chapter 4: Implementing Firewall Technologies
Attacking on IPv6 W.lilakiatsakun Ref: ipv6-attack-defense-33904http://
Filtering Spoofed Packets Network Ingress Filtering (BCP 38) What are spoofed or forged packets? Why are they bad? How to keep them out.
SEMINAR ON IP SPOOFING. IP spoofing is the creation of IP packets using forged (spoofed) source IP address. In the April 1989, AT & T Bell a lab was among.
1 Border Gateway Protocol (BGP) and BGP Security Jeff Gribschaw Sai Thwin ECE 4112 Final Project April 28, 2005.
Inter-domain Routing Outline Border Gateway Protocol.
DDoS Mitigation Using BGP Flowspec
SECURITY CONTROLS FOR AN ENERGY SCIENCE DMZ Robert Marcoux 01/13/2013.
Financial Services Sector Coordinating Council (FSSCC) 1 Current DDoS landscape - Potential Impact Solutions – ISP v.s Carrier Agnostic Solutions – Fundamental.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
1 SENSS Security Service for the Internet Jelena Mirkovic (USC/ISI), Minlan Yu (USC), Ying Zhang (HP Labs), Sivaram Ramanathan (USC)
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
Security fundamentals
CS 3700 Networks and Distributed Systems
BGP 1. BGP Overview 2. Multihoming 3. Configuring BGP.
CS 3700 Networks and Distributed Systems
OpenDaylight BGP Use-Cases
Chapter 4: Access Control Lists (ACLs)
Introduction to Network Security
Presentation transcript:

COPYRIGHT © 2013 ALCATEL-LUCENT. ALL RIGHTS RESERVED. ALCATEL-LUCENT — CONFIDENTIAL — SOLELY FOR AUTHORIZED PERSONS HAVING A NEED TO KNOW — PROPRIETARY — USE PURSUANT TO COMPANY INSTRUCTION BGP FLOWSPEC OVERVIEW

COPYRIGHT © 2012 ALCATEL-LUCENT. ALL RIGHTS RESERVED. DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS IPS/IDS Enterprise or IDC Service Provider Network Router DDoS attack traffic consumes SP network capacity DDoS attacks are launched from compromised systems (bots) DDoS attack traffic saturates inline security devices DDoS attack traffic targets applications & services Firewall Botnet Legitimate Users Victim

4 COPYRIGHT © 2013 ALCATEL-LUCENT. ALL RIGHTS RESERVED. ALCATEL-LUCENT — CONFIDENTIAL — SOLELY FOR AUTHORIZED PERSONS HAVING A NEED TO KNOW — PROPRIETARY — USE PURSUANT TO COMPANY INSTRUCTION DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS DDoS attacks against customers is the number 1 operational threat for SP [1], ahead of outages due to failures or BW saturation. Largest attack this year: 400Gbps NTP amplification attack in Feb Frequency of attacks growing alarmingly [1], some SP with over 100 attacks per month. Over one third of Data Centers experienced attacks exceeding the total BW available to the Data Center [1].

5 COPYRIGHT © 2013 ALCATEL-LUCENT. ALL RIGHTS RESERVED. ALCATEL-LUCENT — CONFIDENTIAL — SOLELY FOR AUTHORIZED PERSONS HAVING A NEED TO KNOW — PROPRIETARY — USE PURSUANT TO COMPANY INSTRUCTION Service Providers must protect their network infrastructure against DDoS attacks, and can also provide DDoS protection services to their customers. ISP network security design considerations: ­ Typically uses a “Defense in Depth” model: ­ Same security function replicated in different layers of the network ­ DDoS protection functionality can be enabled in multiple network components present in different layers of the network: ­ Routers, DDoS Scrubbers, IDS/IPS appliances, Load Balancers, Firewalls. Router’s security features play a key role in helping to secure Service Provider’s network infrastructure and its customers against DDoS attacks. ­ Routers are the first line of defense along the entire perimeter of the network ­ Routers can mitigate the attack at the network edge, minimizing the impact of the attack traffic ­ Routers have a better chance to handle high BW attacks than most other devices ­ Techniques: D/RTBH, S/RTBH, ACLs, BGP Flowspec SERVICE PROVIDER NETWORK SECURITY DESIGN

COPYRIGHT © 2012 ALCATEL-LUCENT. ALL RIGHTS RESERVED. DDoS MITIGATION – D/RTBH FILTERING IPS/IDS Enterprise or IDC Service Provider Network Router D/RTBH applied at SP edge: all traffic destined to the prefix announced (victim) is discarded. Traffic could be originated from anywhere. Customer BGP peer initiates BGP update with prefix to be mitigated pointing to the blackhole route or marked with Community (SP could also initiate it). Firewall Botnet Legitimate Users Router Good traffic Attack traffic BGP Announcement RTBH Sixth most used tool to mitigate DDoS attacks [1] RFCs: RFC 3882, RFC 5635 (includes D/RTBH and S/RTBH) Edge routers configured with blackhole route Victim

COPYRIGHT © 2012 ALCATEL-LUCENT. ALL RIGHTS RESERVED. DDoS MITIGATION – S/RTBH FILTERING IPS/IDS Enterprise or IDC Service Provider Network Router S/RTBH applied at SP edge: all traffic originated from the prefix announced (attackers) is discarded. Traffic can be destined to anywhere. Edge routers configured with blackhole route and uRPF enabled in loose mode on the external interfaces (if source IP matches the blackhole, uRPF treats packets as having failed uRPF check). Firewall Botnet Legitimate Users RTBH Eigth most used tool to mitigate DDoS attacks [1] RFCs: RFC 5635 (includes D/RTBH and S/RTBH) SP BGP peer initiates BGP update with prefix to be mitigated. Good traffic Attack traffic BGP Announcement Victim

8 COPYRIGHT © 2013 ALCATEL-LUCENT. ALL RIGHTS RESERVED. ALCATEL-LUCENT — CONFIDENTIAL — SOLELY FOR AUTHORIZED PERSONS HAVING A NEED TO KNOW — PROPRIETARY — USE PURSUANT TO COMPANY INSTRUCTION BGP Flowspec defines a new BGP Network Layer Reachability Information (NLRI) format used to distribute traffic flow specification rules. Specified in RFC 5575 [2]- Dissemination of Flow Specification Rules (extended to IPv6 in draft-ietf-idr-flow-spec-v6-02) [3] ­ NLRI (AFI=1, SAFI=133): IPv4 unicast filtering ­ NLRI (AFI=1, SAFI=134): VPNv4 BGP/MPLS filtering Main application today is to automate the distribution of traffic filter lists to routers from a single point of control, for the mitigation of DDoS attacks. ­ Selectively drop traffic flows based on L3/L4 information. ­ Intelligent control platform builds filter rules to filter harmful traffic, encodes them as BGP flowspec routes and advertises them to BGP peers. ­ The traffic filtering rules can drop or redirect packets that are deemed invalid or suspicious DDoS MITIGATION – BGP FLOWSPEC

9 COPYRIGHT © 2013 ALCATEL-LUCENT. ALL RIGHTS RESERVED. ALCATEL-LUCENT — CONFIDENTIAL — SOLELY FOR AUTHORIZED PERSONS HAVING A NEED TO KNOW — PROPRIETARY — USE PURSUANT TO COMPANY INSTRUCTION The Flow specification can match on the following criteria: ­ Source / Destination Prefix ­ IP Protocol (UDP, TCP, ICMP, etc.) ­ Source and/or Destination Port ­ ICMP Type and Code ­ TCP Flags ­ Packet Length ­ DSCP (Diffserv Code Point) ­ Fragment (DF, IsF, FF, LF) Actions are defined using Extended Communities: ­ 0x8006: traffic-rate (rate 0 discards all traffic for the flow) ­ 0x8007: traffic-action (sample) ­ 0x8008: redirect to VRF ­ 0x8009: traffic-marking (DSCP value ) DDoS MITIGATION – BGP FLOWSPEC

10 COPYRIGHT © 2013 ALCATEL-LUCENT. ALL RIGHTS RESERVED. ALCATEL-LUCENT — CONFIDENTIAL — SOLELY FOR AUTHORIZED PERSONS HAVING A NEED TO KNOW — PROPRIETARY — USE PURSUANT TO COMPANY INSTRUCTION ACLs are still the most widely used tool to mitigate DDoS attacks [1] ­ But…ACLs are demanding in configuration & maintenance. BGP Flowspec leverages the BGP Control Plane to simplify the distribution of ACLs, greatly improving operations: ­ Inject new filter rules to all routers simultaneously without changing configuration. ­ Reuse existing BGP operational knowledge & and best practices. Improve response time to mitigate mitigate DDoS attacks! Arbor Networks WISR 2014 WHY USE BGP FOR ACLs?

COPYRIGHT © 2012 ALCATEL-LUCENT. ALL RIGHTS RESERVED. BGP FLOWSPEC MITIGATION IPS/IDS Enterprise or IDC Victim Service Provider Network Router Flowspec filter applied on the external interfaces, only traffic matching that flow is discarded. SP Portal initiates BGP update with ACL filter to be applied at the edge router external interfaces (in theory the customer could also initiate it). Firewall Botnet Legitimate Users Router Good traffic Attack traffic BGP Announcement FLOW BGP Flowspec route validation performed for eBGP sessions only. Edge routers configured with BGP flowspec sessions, and flowspec filtering enabled on external peering interfaces.

BGP FLOWSPEC – VENDORS & USERS Router vendors supporting BGP Flowspec: ­ Alcatel-Lucent 7750 SROS 9.0R1 ­ Juniper JunOS 7.3 DDoS mitigation vendors: ­ Arbor Peakflow SP 3.5 BGP Tools: ­ ExaBGP Injector [5] Users: ­ North America: TW Telecom (TWTC) [6], multiple Tier 1, Tier 2 ­ Europe: multiple Tier 1, Tier 2 ­ Latin America & Caribbean: RNP (Brasil) [7]

13 COPYRIGHT © 2013 ALCATEL-LUCENT. ALL RIGHTS RESERVED. ALCATEL-LUCENT — CONFIDENTIAL — SOLELY FOR AUTHORIZED PERSONS HAVING A NEED TO KNOW — PROPRIETARY — USE PURSUANT TO COMPANY INSTRUCTION Another application for BGP Flowspec is its use for traffic redirection to a DDoS Scrubbing device. ­ DDoS scrubbers are dedicated appliances able to mitigate complex, application- layer DDoS attacks using multiple techniques including: DPI inspection, signature matching, behavior analysis, protocol authentication procedures, etc. DDoS Scrubbers are shared resources in the SP infrastructure, typically deployed in designated locations called Scrubbing Centers. ­ Attack traffic backhauling is required for DDoS mitigation Traffic anomalies entering the network need to be redirected to the Scrubbing Centers and go through the scrubbers before reaching the intended destination (Data Center, Customer Network, etc.): ­ Traffic Diversion or Offramping ­ Traffic Reinjection or Onramping TRAFFIC REDIRECTION

Diversion or Offramping: rerouting of traffic destined to the victim to the DDoS mitigation appliance for scrubbing. Reinjection or Onramping: redirection of scrubbed (clean) traffic back to its intended destination. Typically, traffic diversion takes place through more specific BGP prefix announcements (victim addresses), usually in the GRT (called diversion/offramp route): ­ Easier to control & manipulate routes (NH, Communities) ­ Can be signaled across AS boundaries if required ­ All traffic to victim is redirected to scrubber (good & bad) Traffic Reinjection usually requires tunneling or an alternate routing domain (VRF) to get clean traffic back to its intended destination without looping. TRAFFIC REDIRECTION

Real mitigation of DNS attack TRAFFIC REDIRECTION

16 COPYRIGHT © 2013 ALCATEL-LUCENT. ALL RIGHTS RESERVED. ALCATEL-LUCENT — CONFIDENTIAL — SOLELY FOR AUTHORIZED PERSONS HAVING A NEED TO KNOW — PROPRIETARY — USE PURSUANT TO COMPANY INSTRUCTION BGP FLOWSPEC TRAFFIC REDIRECTION DDoS Scrubber Detection& Control Enterprise or IDC Good traffic Attack traffic BGP Flowspec Diversion Internet Scrubbing Center “Dirty” VRF IPS/IDS Enterprise or IDC Victim Router Firewall Router Traffic Reinjection BGP Flowspec filter to redirect only specified traffic that matches rule FLOW Diverted traffic is a subset of all traffic destined to victim

BGP FLOWSPEC REDIRECTION Optimized Design & Operation No changes to the Global Routing Table (GRT) ­ Diversion performed by Flowspec NLRI ­ Flowspec filter Action configured to “Redirect to VRF” ­ Extended Community 0x8008. ­ Less intrusive to the routing system No need for a tunneling design for reinjection/onramping ­ Clean traffic can simply be sent back to the GRT More granular control of diverted traffic ­ Allows for the redirection of only a subset of the traffic to the victim: specific protocols, ports, source prefix, destination prefix Less traffic overhead for DDoS Scrubber to deal with

BGP FLOWSPEC REDIRECTION Enabling New Workflows Facilitates the implementation of new mitigation workflows for demanding use cases: ­ “Always on” Mitigations for critical resources: ­ HTTPS traffic only (normal web traffic follows on-demand mitigation model) ­ Victims with very large traffic volume ­ Divert just traffic from a certain block, or geographical region (based on IP Location)

SUMMARY – BGP FLOWSPEC ­ Improved workflow for the application ACLs for the mitigation of DDoS attacks by infrastructure routers ­ Improved traffic diversion for the mitigation of complex DDoS attacks by Scrubbing Appliances ­ Allows for a better optimization of the shared mitigation capacity of the scrubbers. ­ Simplifies the design of traffic redirection & reinjection in the network

References: [1] Arbor Networks – 2014 Worldwide Infrastructure Security Report, Volume IX [2] RFC 5575, Dissemination of Flow Specification Rules [3] draft-ietf-idr-flow-spec-v6-03 – Dissemination of Flow Specification Rules for IPv6 [4] draft-ietf-idr-bgp-flowspec-oid-01 – Revised Validation Procedure for BGP Flow Specifications [5] LINX69, Thomas Mangin (Exa Networks), Andy Davidson (NetSumo), "BGP Route Injection” [6] NANOG 38, D. Gassen, R. Lozano (Time Warner Telecom), D. McPherson, C. Labovitz (Arbor Networks), "BGP Flow Specification Deployment Experience“ [8] GTER/GTS 2007, Raniery Pontes (RNP), “Flowspec em ação - Experiência de uso no backbone da RNP”