University of Massachusetts at Amherst 1 Flooding Attacks by Exploiting Persistent Forwarding Loops Jianhong Xia, Lixin Gao and Teng Fei University of.

Slides:



Advertisements
Similar presentations
Self-Managed Future Wireless Networks? Lixin Gao University of Massachusetts, Amherst.
Advertisements

© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Introduction to IPv4 Introduction to Networks.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
Ningning HuCarnegie Mellon University1 Optimizing Network Performance In Replicated Hosting Peter Steenkiste (CMU) with Ningning Hu (CMU), Oliver Spatscheck.
1 Interdomain Routing Protocols. 2 Autonomous Systems An autonomous system (AS) is a region of the Internet that is administered by a single entity and.
By Hitesh Ballani, Paul Francis, Xinyang Zhang Slides by Benson Luk for CS 217B.
Detecting Traffic Differentiation in Backbone ISPs with NetPolice Ying Zhang Zhuoqing Morley Mao Ming Zhang.
© 2003 By Default! A Free sample background from Slide 1 SAVE: Source Address Validity Enforcement Protocol Authors: Li,
MIRED: Managing IP Routing is Extremely Difficult Jennifer Rexford Internet and Networking Systems AT&T Labs - Research; Florham Park, NJ
Chapter 6 Network Address Translation (NAT). Network Address Translation  Modification of source or destination IP address  Needed by networks using.
Inherently Safe Backup Routing with BGP Lixin Gao (U. Mass Amherst) Timothy Griffin (AT&T Research) Jennifer Rexford (AT&T Research)
E2E Routing Behavior in the Internet Vern Paxson Sigcomm 1996 Slides are adopted from Ion Stoica’s lecture at UCB.
Routing Jennifer Rexford Advanced Computer Networks Tuesdays/Thursdays 1:30pm-2:50pm.
Routing and Routing Protocols
Ningning HuCarnegie Mellon University1 A Measurement Study of Internet Bottlenecks Ningning Hu (CMU) Joint work with Li Erran Li (Bell Lab) Zhuoqing Morley.
ROUTING PROTOCOL IGRP. REVIEW 4 Purpose of Router –determine best path to destination –pass the frames to the destination 4 Protocols –routed - used by.
End-to-End Issues. Route Diversity  Load balancing o Per packet splitting o Per flow splitting  Spill over  Route change o Failure o policy  Route.
University of Massachusetts, Amherst 1 On the Evaluation of AS Relationship Inferences Jianhong Xia and Lixin Gao Department of Electrical and Computer.
Common forms and remedies Neeta Bhadane Raunaq Nilekani Sahasranshu.
Route Selection in Cisco Routers. Route Selection One of the intriguing aspects of Cisco routers, especially for those new to routing, is how the router.
Chapter 4. After completion of this chapter, you should be able to: Explain “what is the Internet? And how we connect to the Internet using an ISP. Explain.
1 CS 4396 Computer Networks Lab LAN Switching and Bridges.
Impact of Prefix Hijacking on Payments of Providers Pradeep Bangera and Sergey Gorinsky Institute IMDEA Networks, Madrid, Spain Developing the Science.
Routing and Routing Protocols Routing Protocols Overview.
1 Introducing Routing 1. Dynamic routing - information is learned from other routers, and routing protocols adjust routes automatically. 2. Static routing.
By Sylvia Ratnasamy, Andrey Ermolinskiy, Scott Shenker Presented by Fei Jia Revisiting IP Multicast.
Communication Between Networks How the Internet Got Its Name.
David Wetherall Professor of Computer Science & Engineering Introduction to Computer Networks Hierarchical Routing (§5.2.6)
Interdomain Routing Security. How Secure are BGP Security Protocols? Some strange assumptions? – Focused on attracting traffic from as many Ases as possible.
A Firewall for Routers: Protecting Against Routing Misbehavior1 June 26, A Firewall for Routers: Protecting Against Routing Misbehavior Jia Wang.
A Measurement Study on the Impact of Routing Events on End-to-End Internet Path Performance Feng Wang 1, Zhuoqing Morley Mao 2 Jia Wang 3, Lixin Gao 1,
T. S. Eugene Ngeugeneng at cs.rice.edu Rice University1 COMP/ELEC 429/556 Introduction to Computer Networks Inter-domain routing Some slides used with.
On Understanding of Transient Interdomain Routing Failures Feng Wang, Lixin Gao, Jia Wang, and Jian Qiu Department of Electrical and Computer Engineering.
A Light-Weight Distributed Scheme for Detecting IP Prefix Hijacks in Real-Time Lusheng Ji†, Joint work with Changxi Zheng‡, Dan Pei†, Jia Wang†, Paul Francis‡
Detection of Routing Loops and Analysis of Its Causes Sue Moon Dept. of Computer Science KAIST Joint work with Urs Hengartner, Ashwin Sridharan, Richard.
Understanding the Network-Level Behavior of Spammers Author: Anirudh Ramachandran, Nick Feamster SIGCOMM ’ 06, September 11-16, 2006, Pisa, Italy Presenter:
1 A Framework for Measuring and Predicting the Impact of Routing Changes Ying Zhang Z. Morley Mao Jia Wang.
CCNA 2 Week 6 Routing Protocols. Copyright © 2005 University of Bolton Topics Static Routing Dynamic Routing Routing Protocols Overview.
Routing and Routing Protocols
N. Hu (CMU)L. Li (Bell labs) Z. M. Mao. (U. Michigan) P. Steenkiste (CMU) J. Wang (AT&T) Infocom 2005 Presented By Mohammad Malli PhD student seminar Planete.
CS 4396 Computer Networks Lab BGP. Inter-AS routing in the Internet: (BGP)
1 Version 3.1 Module 6 Routed & Routing Protocols.
Routing and Routing Protocols PJC CCNA Semester 2 Ver. 3.0 by William Kelly.
NAT/PAT by S K SATAPATHY
Has the Internet Delay Gotten Better or Worse? Universidad Carlos III de Madrid DK Lee, Keon Jang, Changhyun Lee, Gianluca Iannaccone, Kenjiro.
A Measurement Study on the Impact of Routing Events on End-to-End Internet Path Performance Feng Wang 1, Zhuoqing Morley Mao 2 Jia Wang 3, Lixin Gao 1,
Sem1 - Module 10 Routing Fundamentals and Subnets
Delivery and Forwarding Chapter 18 COMP 3270 Computer Networks Computing Science Thompson Rivers University.
Chapter 8: IP Addressing
Introduction to Internetworking. 2 The IP Addressing Scheme (IPv4) (psu.edu) Dotted Decimal Notation: A notation more convenient for humans.
Network Layer IP Address.
Routing and Routing Protocols CCNA 2 v3 – Module 6.
PlanetSeer: Internet Path Failure Monitoring and Characterization in Wide-Area Services Ming Zhang, Chi Zhang Vivek Pai, Larry Peterson, Randy Wang Princeton.
Configuration for routing example
Jennifer Rexford Princeton University
Forwarding and Routing IP Packets
COMP 3270 Computer Networks
Chapter 6 – Routing.
Chapter 2: Static Routing
Ct1304 Lecture#4 IPV4 Addressing Asma AlOsaimi.
NET302 Lecture#3 IPV4 Addressing Asma AlOsaimi.
Introduction to Networking
CS 1302 Computer Networks — Unit - 3 — — Network Layer —
Detection of Routing Loops and Analysis of Its Causes
Chapter 2: Static Routing
Lecture#3 IPV4 Addressing Net 302- Asma AlOsaimi.
COS 561: Advanced Computer Networks
Ct1304 Lecture#4 IPV4 Addressing Asma AlOsaimi.
COMP/ELEC 429/556 Introduction to Computer Networks
Lecture#3-IPV4 Addressing
Presentation transcript:

University of Massachusetts at Amherst 1 Flooding Attacks by Exploiting Persistent Forwarding Loops Jianhong Xia, Lixin Gao and Teng Fei University of Massachusetts, Amherst MA 01003, USA {jxia, lgao,

University of Massachusetts at Amherst 2Introduction Routing determines forwarding paths A B X C Y

University of Massachusetts at Amherst 3 Forwarding Loops Forwarding loops exist in the Internet –Transient or persistent [Paxson97], [Hengartner02], [Francois05], [Zhang04] –Misconfigurations may cause forwarding loops [Griffin02] Security issues –Blackhole some network addresses –Can be exploited to launch flooding attacks

University of Massachusetts at Amherst 4 Flooding Attacks Using Persistent Forwarding Loops How many shadowed addresses in the Internet? X Y RaRa Shadowed Addresses Imperiled Addresses RbRb RcRc Affect legitimate end hosts Traffic to Y Traffic to X How many imperiled addresses in the Internet?

University of Massachusetts at Amherst 5 Measurement Design Design –Balancing granularity and overhead –Samples 2 addresses in each /24 IP block Addresses space collection –Addresses covered by RouteView table –De-aggregate prefixes to /24 prefixes Fine-grained prefixes Data traces –Traceroute to 5.5 million fine-grained prefixes –Measurement lasts for 3 weeks

University of Massachusetts at Amherst 6 Shadowed vs. Imperiled Addresses Shadowed addresses/prefixes –135,973 shadowed prefixes –2.47% of routable addresses –Located in 5120 ASes Imperiled addresses/prefixes –42,887 imperiled prefixes –0.78% of routable addresses –Located in 2051 ASes

University of Massachusetts at Amherst 7 Properties of Persistent Forwarding Loops Length –86.6% of persistent loops are two hops long Location –81.8% of persistent loops occur within destination domains Implications –Significantly amplify attacking traffic –Can be exploited from different places

University of Massachusetts at Amherst 8Validation Validation from various locations –From Asia, Europe, West and East coast of US –90% of shadowed prefixes consistently have persistent forwarding loops Validation to multiple addresses in shadowed prefixes –Sampling ~50 addresses in each shadowed prefix –68% of shadowed prefixes show that All samples have forwarding loops

University of Massachusetts at Amherst 9 Impact on Bandwidth Consumption Example on overloading link L bc –Available bandwidth: 100Mbps –Number of compromised hosts: 25 –Average traffic rate needed: X Y RaRa RbRb RcRc Traffic to Y Traffic to X

University of Massachusetts at Amherst 10Conclusion Persistent forwarding loops –Large number of shadowed prefixes –Distributed in a large number of domains Affect legitimate end hosts –Large number of imperiled prefixes –Spread in various domains Can be exploited to launch flooding attacks –Amplifying attacking traffic significantly –Can be launched from various locations

University of Massachusetts at Amherst 11Thanks Any questions or comments?

University of Massachusetts at Amherst 12 Possible Causes of Forwarding Loops Configure errors Example: Pull-up routes –Provider owns /8 Assign /16 to its customer –Customer uses /24 Accept packets to /24 only Others are redirected back to provider by default route –Forwarding loop happens Any packet to addresses in ~ Provider Customer Internet Default route / / /24