Accurate Real-Time Identification of IP Prefix Hijacking Z. Morley Mao Xin Hu 2007 IEEE Symposium on and Privacy Oakland, California 2007 IEEE Symposium.

Slides:



Advertisements
Similar presentations
Zhiyun Qian, Z. Morley Mao (University of Michigan)
Advertisements

Locating Prefix Hijackers using LOCK Tongqing Qiu +, Lusheng Ji *, Dan Pei * Jia Wang *, Jun (Jim) Xu +, Hitesh Ballani ++ + College of Computing, Georgia.
Martin Suchara in collaboration with I. Avramopoulos and J. Rexford How Small Groups Can Secure Interdomain Routing.
BGP Multiple Origin AS (MOAS) Conflict Analysis Xiaoliang Zhao, NCSU S. Felix Wu, UC Davis Allison Mankin, Dan Massey, USC/ISI Dan Pei, Lan Wang, Lixia.
Seongcheol Hong, POSTECHPhD Thesis Defense 1/30 Network Reachability-based IP Prefix Hijacking Detection - PhD Thesis Defense - Seongcheol Hong Supervisor:
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
By Hitesh Ballani, Paul Francis, Xinyang Zhang Slides by Benson Luk for CS 217B.
IP Spoofing Defense On the State of IP Spoofing Defense TOBY EHRENKRANZ and JUN LI University of Oregon 1 IP Spoofing Defense.
Active correlation between the control and data plane: Accurate real-time identification of IP hijacking Z. Morley Mao University of Michigan.
Student : Wilson Hidalgo Ramirez Supervisor: Udaya Tupakula Filtering Techniques for Counteracting DDoS Attacks.
1 A survey of Internet Topology Discovery. 2 Outline Motivations Internet topology IP Interface Level Router Level AS Level PoP Level.
1 BGP Security -- Zhen Wu. 2 Schedule Tuesday –BGP Background –" Detection of Invalid Routing Announcement in the Internet" –Open Discussions Thursday.
SAVE: Source Address Validity Enforcement Protocol Jun Li, Jelena Mirković, Mengqiu Wang, Peter Reiher and Lixia Zhang UCLA Computer Science Dept 10/04/2001.
Understanding the Network-Level Behavior of Spammers Mike Delahunty Bryan Lutz Kimberly Peng Kevin Kazmierski John Thykattil By Anirudh Ramachandran and.
Beyond the perimeter: the need for early detection of Denial of Service Attacks John Haggerty,Qi Shi,Madjid Merabti Presented by Abhijit Pandey.
Interdomain Routing Security Jennifer Rexford Advanced Computer Networks Tuesdays/Thursdays.
On the Effectiveness of Route- Based Packet Filtering for Distributed DoS Attack Prevention in Power-Law Internets Kihong Park and Heejo Lee Network Systems.
Measurement and Monitoring Nick Feamster Georgia Tech.
Sagar Vemuri (slides, courtesy Z. Morley Mao and Mohit Lad)
Verification in Routing Protocols Lakshminarayanan Subramanian Sahara Retreat, Jan 2004.
10/21/20031 Framework For Classifying Denial of Service Attacks Alefiya Hussain, John Heidemann, Christos Papadopoulos Kavita Chada & Viji Avali CSCE 790.
Stealth Probing: Efficient Data- Plane Security for IP Routing Ioannis Avramopoulos Princeton University Joint work with Jennifer Rexford.
Department Of Computer Engineering
DDoS Attack and Its Defense1 CSE 5473: Network Security Prof. Dong Xuan.
Mobile IP: Introduction Reference: “Mobile networking through Mobile IP”; Perkins, C.E.; IEEE Internet Computing, Volume: 2 Issue: 1, Jan.- Feb. 1998;
A LIGHT-WEIGHT DISTRIBUTED SCHEME FOR DETECTING IP PREFIX HIJACKS IN REAL TIME Changxi Zheng, Lusheng Ji, Dan Pei, Jia Wang and Paul Francis. Cornell University,
IIT Indore © Neminath Hubballi
Constructing Inter-Domain Packet Filters to Control IP Spoofing Based on BGP Updates Zhenhai Duan, Xin Yuan Department of Computer Science Florida State.
1 Controlling IP Spoofing via Inter-Domain Packet Filters Zhenhai Duan Department of Computer Science Florida State University.
Fast Portscan Detection Using Sequential Hypothesis Testing Authors: Jaeyeon Jung, Vern Paxson, Arthur W. Berger, and Hari Balakrishnan Publication: IEEE.
Understanding the Network-Level Behavior of Spammers Best Student Paper, ACM Sigcomm 2006 Anirudh Ramachandran and Nick Feamster Ye Wang (sando)
On AS-Level Path Inference Jia Wang (AT&T Labs Research) Joint work with Z. Morley Mao (University of Michigan, Ann Arbor) Lili Qiu (University of Texas,
Advanced Networking Lab. Given two IP addresses, the estimation algorithm for the path and latency between them is as follows: Step 1: Map IP addresses.
MonNet – a project for network and traffic monitoring Detection of malicious Traffic on Backbone Links via Packet Header Analysis Wolfgang John and Tomas.
1 Countering DoS Through Filtering Omar Bashir Communications Enabling Technologies
Interdomain Routing Security. How Secure are BGP Security Protocols? Some strange assumptions? – Focused on attracting traffic from as many Ases as possible.
A Firewall for Routers: Protecting Against Routing Misbehavior1 June 26, A Firewall for Routers: Protecting Against Routing Misbehavior Jia Wang.
A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University.
A Measurement Study on the Impact of Routing Events on End-to-End Internet Path Performance Feng Wang 1, Zhuoqing Morley Mao 2 Jia Wang 3, Lixin Gao 1,
A Light-Weight Distributed Scheme for Detecting IP Prefix Hijacks in Real-Time Lusheng Ji†, Joint work with Changxi Zheng‡, Dan Pei†, Jia Wang†, Paul Francis‡
Understanding the Network-Level Behavior of Spammers Author: Anirudh Ramachandran, Nick Feamster SIGCOMM ’ 06, September 11-16, 2006, Pisa, Italy Presenter:
1 A Framework for Measuring and Predicting the Impact of Routing Changes Ying Zhang Z. Morley Mao Jia Wang.
Packet-Marking Scheme for DDoS Attack Prevention
Information-Centric Networks04b-1 Week 4 / Paper 2 Understanding BGP Misconfiguration –Rahil Mahajan, David Wetherall, Tom Anderson –ACM SIGCOMM 2002 Main.
High-Speed Policy-Based Packet Forwarding Using Efficient Multi-dimensional Range Matching Lakshman and Stiliadis ACM SIGCOMM 98.
Detecting Prefix Hijackings in the Internet with Argus Xingang Shi Yang Xiang Zhiliang Wang Xia Yin Jianping Wu Tsinghua University.
Yaping Zhu with: Jennifer Rexford (Princeton University) Aman Shaikh and Subhabrata Sen (ATT Research) Route Oracle: Where Have.
Selective Packet Inspection to Detect DoS Flooding Using Software Defined Networking Author : Tommy Chin Jr., Xenia Mountrouidou, Xiangyang Li and Kaiqi.
Information-Centric Networks Section # 4.2: Routing Issues Instructor: George Xylomenos Department: Informatics.
SEMINAR ON IP SPOOFING. IP spoofing is the creation of IP packets using forged (spoofed) source IP address. In the April 1989, AT & T Bell a lab was among.
Role Of Network IDS in Network Perimeter Defense.
1 Effective Diagnosis of Routing Disruptions from End Systems Ying Zhang Z. Morley Mao Ming Zhang.
Constructing Inter-Domain Packet Filters to Control IP Spoofing Based on BGP Updates Zhenhai Duan, Xin Yuan Department of Computer Science Florida State.
IP Spoofing. What Is IP Spoofing Putting a fake IP address in the IP header field for source address (requires root)
Secure Single Packet IP Traceback Mechanism to Identify the Source Zeeshan Shafi Khan, Nabila Akram, Khaled Alghathbar, Muhammad She, Rashid Mehmood Center.
Network Devices and Firewalls Lesson 14. It applies to our class…
BGP security some slides borrowed from Jen Rexford (Princeton U)
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
1 On the Impact of Route Monitor Selection Ying Zhang* Zheng Zhang # Z. Morley Mao* Y. Charlie Hu # Bruce M. Maggs ^ University of Michigan* Purdue University.
Problem: Internet diagnostics and forensics
Monitoring Persistently Congested Internet Links
Computer Data Security & Privacy
Defending Against DDoS
Preventing Internet Denial-of-Service with Capabilities
COS 561: Advanced Computer Networks
IP Traceback Problem: How do we determine where malicious packet came from ? It’s a problem because attacker can spoof source IP address If we know where.
BGP Multiple Origin AS (MOAS) Conflict Analysis
COS 561: Advanced Computer Networks
BGP Security Jennifer Rexford Fall 2018 (TTh 1:30-2:50 in Friend 006)
Presentation transcript:

Accurate Real-Time Identification of IP Prefix Hijacking Z. Morley Mao Xin Hu 2007 IEEE Symposium on and Privacy Oakland, California 2007 IEEE Symposium on Security and Privacy Oakland, California

IEEE Symposium on Security and Privacy May Outline Introduction Taxonomy of IP prefix hijacking Proposed approach of combining control and data plane information Implementation and results Conclusion

IEEE Symposium on Security and Privacy May Outline Introduction Taxonomy of IP prefix hijacking Proposed approach of combining control and data plane information Implementation and results Conclusion

IEEE Symposium on Security and Privacy May IP prefix hijacking Fraudulent origin attack Steal IP prefixes belonging to other networks Announce unauthorized prefixes through BGP Can also result from network misconfiguration

IEEE Symposium on Security and Privacy May Motivation Existing solutions  Route filters  Short-lived announcements [Boothe06]  Anomalous routing information [Lad06] Control plane + Data plane  Control plane anomalies trigger real-time detection  Data plane fingerprints provide confirmative evidence  Real-time and accurate identification of prefix hijacking  Insufficient due to multi-homing  Solely rely on Control plane  High false positive and false negative

IEEE Symposium on Security and Privacy May Outline Introduction Taxonomy of IP prefix hijacking Proposed approach of combining control and data plane information Implementation and results Conclusion

IEEE Symposium on Security and Privacy May Prefix announcements IEEE Symposium on Security and Privacy May 2007 AS 1AS 2 AS 3 AS 4 AS 5 PrefixPath /161 PrefixPath /162, 1 PrefixPath /162, 1 Advertise /16 PrefixPath /164, 2, /16 Path: /16 Path: 2, /16 Path: 4, 2, /16 Path: 3, 2, 1

IEEE Symposium on Security and Privacy May Type 1: Hijack a prefix AS 1AS 2 AS 3 AS 4 AS 5 PrefixPath /161 PrefixPath /162, 1 PrefixPath /162, /16 path: 5 PrefixPath /165 PrefixPath /164, 5 MOAS (Multiple Origin AS) Advertise / /16 path: 4, 5

IEEE Symposium on Security and Privacy May Type 2: Hijack a prefix and its AS number AS 1AS 2 AS 3 AS 4 AS 5 PrefixPath /161 PrefixPath /162, 1 PrefixPath /162, /16 Path: 5, 1 PrefixPath /165, /16 Path: 4, 5, 1 NO MOAS! Advertise /16 Advertise a path to /16

IEEE Symposium on Security and Privacy May Type 3: Hijack a subnet of a prefix AS 1AS 2 AS 3 AS 4 AS 5 PrefixPath /161 PrefixPath /162, 1 PrefixPath /162, /24 path: /24 Path: 4, 5 PrefixPath / /162, 1 PrefixPath /244, /162,1 PrefixPath /244, /161 No MOAS! Advertise / 24 SubMOAS! Advertise / 16

IEEE Symposium on Security and Privacy May Longest prefix matching IEEE Symposium on Security and Privacy May 2007 Attacker is able to attract all traffic AS 1AS 2 AS 3 AS 4 AS 5 PrefixPath /162, 1 PefixPath / /162, 1 PrefixPath /244, /162, 1 PrefixPath /244, /161 Send packet to in AS 1 Longest Prefix Matching Advertise / 24 Advertise / 16

IEEE Symposium on Security and Privacy May Type 4: Hijack a subnet of a prefix and AS number IEEE Symposium on Security and Privacy May 2007 AS 1AS 2 AS 3 AS 4 AS 5 PrefixPath /161 PrefixPath /162, 1 PrefixPath /162, /24 path 5, /24 Path: 4, 5,1 PrefixPath /245, /162, 1 PrefixPath /244,5, /162, 1 PrefixPath /244,5, /161 Neither MOAS Nor SubMOAS! Advertise a path to / 24 Advertise / 16 Longest Prefix Matching

IEEE Symposium on Security and Privacy May Outline Introduction Taxonomy of IP prefix hijacking Proposed approach of combining control and data plane information Implementation and results Conclusion

IEEE Symposium on Security and Privacy May Control plane information alone is insufficient False positive  Legitimate reasons for anomalous routing updates  Multi-homing with static link AS 3 AS /24 path: 1 AS /24 static link or IGP route /24 path: 2, /24 path: 3 aggregation MOAS! AS /16 AS /24 AS / /24 path: /16 path: /24 path: /24 path: 3, 1 subMOAS!

IEEE Symposium on Security and Privacy May Control plane information alone is insufficient False positive  Legitimate reasons for anomalous routing updates  Multi-homing with static link and aggregation False negative  AS-level path may not match the forwarding path  Type 2 and type 4 attack do not lead to control plane anomalies

IEEE Symposium on Security and Privacy May Proposed approach Combine control plane and data plane information  A successful hijacking will result in conflicting data plane fingerprints  A hijacking attempt cannot affect the entire network, especially the network topologically close to the victim Fingerprinting-based consistency check  For valid MOAS and subMOAS, there is only one owner for the prefix  For real hijacking, traffic from different locations may arrive at true owner or attackers  Same data plane fingerprints  conflicting fingerprints

IEEE Symposium on Security and Privacy May Fingerprinting techniques Determine characteristics of remote hosts or networks by sending probe packets Host-based fingerprinting  Host Operating System detection  IP Identifier (IPID) probing  Timestamp probing (ICMP and TCP timestamp)  Reflect-scan Network fingerprinting  Firewall policies  Resource properties (e.g., bandwidth)  Edge router characteristics

IEEE Symposium on Security and Privacy May Detection of prefix hijack AS 1 AS 2 AS 3 AS 4 AS 5 PrefixPath /162, 1 PrefixPath /162, 1 Advertise /16 PrefixPath /165 PrefixPath /164, 5 Advertise / PrefixPath /161 Fingerprint probing server

IEEE Symposium on Security and Privacy May Detection of prefix and AS hijacking Problem  Attackers avoid MOAS conflicts by retaining correct origin AS  Checking all updates is prohibitively expensive Heuristics for detecting the fake AS edge  Edge popularity constraint  Geographic constraint  Relationship constraint [ Kruegel2003 ] Violation of these constraints triggers fingerprinting check

IEEE Symposium on Security and Privacy May Detection of prefix subnet hijacking Problem  Attackers avoid MOAS conflicts by hijacking a subnet  longest prefix matching AS 1 AS 2 AS 3 AS 4 AS 5 Advertise /24 Advertise / fingerprint PrefixPath / /162, 1 PrefixPath /244, /162, 1 PrefixPath /244, /161

IEEE Symposium on Security and Privacy May Detection of prefix subnet hijacking (Cont.) Identify subMOAS conflicts  Newly announced prefixes which is part of existing prefix Customer-provider relationship check  Assume provider and customer will not hijack one another Reflect-scan to detect subnet hijacking  IGP routing within victim AS is unaffected  Use IP spoofing to solicit traffic inside victim AS  Predictable IP ID increment in IP packet

IEEE Symposium on Security and Privacy May Summary of detection techniques IEEE Symposium on Security and Privacy May 2007 Limitations  Detection is triggered by anomalous updates  Limited number of vantage points  Firewall blocks probing packets  Ingress filtering Attack Type Monitored Routing Updates Detection Technique Hijack prefixMOAS updates Fingerprinting-based consistency check (FP check) Hijack prefix & ASAll updates Edge, geographic, and relationship (EGR) constraints, FP check Hijack subnet prefixsubMOAS updates Customer-provider (C-P) check, reflect-scan Hijack subnet prefix & ASNew, non-subMOAS updatesEGR constraints, reflect-scan

IEEE Symposium on Security and Privacy May Outline Introduction Taxonomy of IP prefix hijacking Proposed approach of combining control and data plane information Implementation and results Conclusion

IEEE Symposium on Security and Privacy May Prototype Implementation Data Set  BGP data set: RouteView + Our own BGP monitor  Probe location: Planetlab testbed  Live IP addresses: DNS and Web Server log + lightweight ping  Prefix Geographic information: NetGeo from CAIDA Fingerprinting  OS detection and TCP timestamp: Nmap v 3.95  IPID and ICMP timestamp: Ruby in planetlab  Reflect-scan: hping v2

IEEE Symposium on Security and Privacy May Results 2 weeks’ monitoring period Real time BGP data from our BGP monitor Attack Type Anomalous updatesTotal number Avg rate /15 min Suspicious updates (After F-P check) 1MOAS conflicts Violate EGR constraints subMOAS conflicts (after C-P check) New non-subMOAS prefix that viiolate EGR constraints

IEEE Symposium on Security and Privacy May Potential attack (type 1)

IEEE Symposium on Security and Privacy May Potential attack (type 2)

IEEE Symposium on Security and Privacy May DNS anycast validation IP anycast of root DNS server  Multiple server support same service under same IP address  5 out of 13 DNS servers use anycast (C, F, I, J and K) Legitimate type 2 hijack attack  Hijack both prefix and AS number  Our system successfully detect 4 of them  C-root server doesn’t violate EGR check

IEEE Symposium on Security and Privacy May Fingerprints for F root server

IEEE Symposium on Security and Privacy May Correlation with spam data Hijacked IP prefixes are often used for spamming  Correlate identified suspicious updates with Spam source IPs  Non-negligible correlation between hijacking and spamming Time interval between identification of suspicious updates and the arrival of spam Type# of suspicious prefix # of matched prefix # of matched prefixes within the time window 1 h6 h1 d Correlation between detected suspicious prefixes and spam sources.

IEEE Symposium on Security and Privacy May Conclusion IEEE Symposium on Security and Privacy May 2007 Propose a framework for accurate real-time detection of IP prefix hijacking attacks Exploit a novel insight that a real hijacking will result in conflicting data-plane fingerprints Propose detailed classification of hijacking attacks and the detection algorithm for each type Achieve significant reduction in both false positives and false negatives

IEEE Symposium on Security and Privacy May Paper-2 A Light-Weight Distributed Scheme for Detecting IP Prefix Hijacks in Real-Time In SIGCOMM’07

IEEE Symposium on Security and Privacy May Key observations If a prefix is hijacked, the paths observed from certain vantage points to the prefix would likely exhibit significant changes. The path from a source to a prefix is almost always a super-path of the path from the same source to a reference point along the previous path, as long as the reference point is topologically close to the prefix.

IEEE Symposium on Security and Privacy May High-level Methodology and Results Detect the suspicious hijacking using the first observation Confirm the real hijacking using the second observation Result is surprising good, 0.5% false positive and false negative. (which is really beyond my expectation, why?)

IEEE Symposium on Security and Privacy May Comparison between the two paper Paper 1Paper 2 Simplicity control + data√ data Real-time effect analysis -> probing √ online probing Accuracy √ Probing overhead √ targeted brute-force

IEEE Symposium on Security and Privacy May My thinking (a 100% detection) Observation ? (my guess) - hijacked prefixes and victim prefixes are not identically used. Hijacked addresses may be little used ? Proposed Method - Why not use a very simple and 100% accurate method, PING!!! Just ping the sampled addresses, to detect reachable or unreachable. Merits - Very simple, easy to deploy, no false positive and false negative, comparable overhead with previous work, no other assistance is need! Opportunity - I search online, nobody do so! Want to discuss with all of you - Why cannot we just do so?