SAVE: Source Address Validity Enforcement Protocol Jun Li, Jelena Mirković, Mengqiu Wang, Peter Reiher and Lixia Zhang UCLA Computer Science Dept 10/04/2001.

Slides:



Advertisements
Similar presentations
Copyright 2008 Kenneth M. Chipps Ph.D. Cisco CCNA Exploration CCNA 2 Routing Protocols and Concepts Chapter 4 Distance Vector Routing Protocols.
Advertisements

© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—2-1 Label Assignment and Distribution Introducing Typical Label Distribution in Frame-Mode MPLS.
IP Spoofing Defense On the State of IP Spoofing Defense TOBY EHRENKRANZ and JUN LI University of Oregon 1 IP Spoofing Defense.
Hash-Based IP Traceback Best Student Paper ACM SIGCOMM’01.
Scribe: A Large-Scale and Decentralized Application-Level Multicast Infrastructure Miguel Castro, Peter Druschel, Anne-Marie Kermarrec, and Antony L. T.
1 Internet Networking Spring 2004 Tutorial 7 Multicast Routing Protocols.
Traffic Engineering With Traditional IP Routing Protocols
© 2003 By Default! A Free sample background from Slide 1 SAVE: Source Address Validity Enforcement Protocol Authors: Li,
June, 2002INFOCOM 1 Host Multicast: A Framework for Delivering Multicast to End Users Beichuan Zhang (UCLA) Sugih Jamin (UMich) Lixia Zhang (UCLA)
Slide Set 15: IP Multicast. In this set What is multicasting ? Issues related to IP Multicast Section 4.4.
Routing Security in Ad Hoc Networks
RFC 2453 RIP 2 (Routing Information Protocol) Daher Kaiss.
IP layer restoration and network planning based on virtual protection cycles 2000 IEEE Journal on Selected Areas in Communications Reporter: Jyun-Yong.
Milano, 4-5 Ottobre 2004 IS-MANET The Virtual Routing Protocol for Ad Hoc Networks ISTI – CNR S. Chessa.
SAVE: Source Address Validity Enforcement Jun Li, Jelena Mirković, Mengqiu Wang, Peter Reiher and Lixia Zhang UCLA USENIX Work-In Progress Session Washington.
Routing.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #5 Mobile Ad-Hoc Networks TBRPF.
Spring Routing & Switching Umar Kalim Dept. of Communication Systems Engineering 06/04/2007.
Delivery, Forwarding, and Routing
© 2009 Cisco Systems, Inc. All rights reserved. ROUTE v1.0—6-1 Connecting an Enterprise Network to an ISP Network Considering the Advantages of Using BGP.
1 ECE453 – Introduction to Computer Networks Lecture 10 – Network Layer (Routing II)
Clouseau: A practical IP spoofing defense through route-based filtering Jelena Mirkovic, University of Delaware Nikola Jevtic,
Chapter 22 Network Layer: Delivery, Forwarding, and Routing
Introduction to Routing and Routing Protocols By Ashar Anwar.
Routing Information Protocol (RIP). Intra-and Interdomain Routing An internet is divided into autonomous systems. An autonomous system (AS) is a group.
Distance Vector Routing Protocols W.lilakiatsakun.
1 Computer Communication & Networks Lecture 22 Network Layer: Delivery, Forwarding, Routing (contd.)
M. Menelaou CCNA2 DYNAMIC ROUTING. M. Menelaou DYNAMIC ROUTING Dynamic routing protocols can help simplify the life of a network administrator Routing.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 2 Module 7 Distance Vector Routing Protocols.
Routing/Routed Protocols. Remember: A Routed Protocol – defines logical addressing. Most notable example on the test – IP A Routing Protocol – fills the.
1 Controlling IP Spoofing via Inter-Domain Packet Filters Zhenhai Duan Department of Computer Science Florida State University.
1 3-Oct-15 Distance Vector Routing CCNA Exploration Semester 2 Chapter 4.
By Sylvia Ratnasamy, Andrey Ermolinskiy, Scott Shenker Presented by Fei Jia Revisiting IP Multicast.
Multicast Routing Algorithms n Multicast routing n Flooding and Spanning Tree n Forward Shortest Path algorithm n Reversed Path Forwarding (RPF) algorithms.
Ad Hoc Routing: The AODV and DSR Protocols Speaker : Wilson Lai “Performance Comparison of Two On-Demand Routing Protocols for Ad Hoc Networks”, C. Perkins.
BGP Man in the Middle Attack Jason Froehlich December 10, 2008.
Introduction to OSPF Nishal Goburdhan. Routing and Forwarding Routing is not the same as Forwarding Routing is the building of maps Each routing protocol.
1 Countering DoS Through Filtering Omar Bashir Communications Enabling Technologies
Interdomain Routing Security. How Secure are BGP Security Protocols? Some strange assumptions? – Focused on attracting traffic from as many Ases as possible.
Load-Balancing Routing in Multichannel Hybrid Wireless Networks With Single Network Interface So, J.; Vaidya, N. H.; Vehicular Technology, IEEE Transactions.
CCNA 2 Week 7 Distance Vector Routing. Copyright © 2005 University of Bolton Topics Distance Vector Protocol Issues RIP IGRP.
TCOM 509 – Internet Protocols (TCP/IP) Lecture 06_a Routing Protocols: RIP, OSPF, BGP Instructor: Dr. Li-Chuan Chen Date: 10/06/2003 Based in part upon.
Packet-Marking Scheme for DDoS Attack Prevention
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 2 v3.1 Module 7 Distance Vector Routing Protocols.
1 1-Dec-15 S Ward Abingdon and Witney College Distance Vector Routing CCNA Exploration Semester 2 Chapter 4.
Routing and Routing Protocols
Cisco Systems Networking Academy S2 C 11 Routing Basics.
1 Computer Communication & Networks Lecture 21 Network Layer: Delivery, Forwarding, Routing Waleed.
Routing protocols. 1.Introduction A routing protocol is the communication used between routers. A routing protocol allows routers to share information.
Introducing a New Concept in Networking Fluid Networking S. Wood Nov Copyright 2006 Modern Systems Research.
Lecture 17 Page 1 CS 236, Spring 2008 Advanced Topics in Network Security: IP Spoofing and DDoS CS 236 On-Line MS Program Networks and Systems Security.
SEMINAR ON IP SPOOFING. IP spoofing is the creation of IP packets using forged (spoofed) source IP address. In the April 1989, AT & T Bell a lab was among.
Spring 2000CS 4611 Routing Outline Algorithms Scalability.
1 Chapter 4: Internetworking (IP Routing) Dr. Rocky K. C. Chang 16 March 2004.
Peter Pham and Sylvie Perreau, IEEE 2002 Mobile and Wireless Communications Network Multi-Path Routing Protocol with Load Balancing Policy in Mobile Ad.
Inter-domain Routing Outline Border Gateway Protocol.
+ Dynamic Routing Protocols 2 nd semester
Zueyong Zhu† and J. William Atwood‡
Multicast Outline Multicast Introduction and Motivation DVRMP.
(How the routers’ tables are filled in)
Routing Information Protocol (RIP)
IP Multicast Fast Reroute follow-up on draft-dimitri-rtgwg-mfrr-framework-00 RTG Working Group IETF 75 meeting Stockholm (Sweden) July 2009.
CCNA 2 v3.1 Module 7 Distance Vector Routing Protocols
Routing.
Dynamic Routing Protocols part2
Dynamic Routing and OSPF
COS 561: Advanced Computer Networks
IP Multicast COSC /5/2019.
Routing.
Outline The spoofing problem Approaches to handle spoofing
Presentation transcript:

SAVE: Source Address Validity Enforcement Protocol Jun Li, Jelena Mirković, Mengqiu Wang, Peter Reiher and Lixia Zhang UCLA Computer Science Dept 10/04/2001 {lijun, sunshine, wangmq, reiher,

Outline  Motivation  The Idea  Handling Routing Changes  Security and Deployment  Simulation and Implementation  Related Work  Ongoing Work  Conclusions

Motivation  Provide routers with information on the valid incoming interface for a given source address  Filter out packets with invalid source addresses  Would be helpful for  Many security issues  Building multicast trees  Network problem debugging  Services relying on accurate source addresses...

The Idea  Build an incoming table at a router that specifies valid incoming interfaces for address spaces  Cannot be derived from forwarding table due to routing asymmetry  Cannot be designed by reversing routing protocol Should be designed to inform routers about the path that has ALREADY been chosen  Cannot augment routing updates to carry SAVE info  So, how?

Desired Properties of SAVE  Routing protocol independence  Immediate response to routing changes  Security  Incremental deployment  Low overhead

Architecture no final stop? yes generating SAVE updates forwarding SAVE updates SAVE updates incoming table updating incoming tree end forwarding table

A B Y X The green router now knows that messages from A and B should arrive on interface 5 XAXA XAB SAVE update AB5 Incoming table XAXAXAXAXAXAXAXAXAXAXAXAXAXA But the green incoming table says messages from A come on interface 5, not interface 6 X4X4 Y3Y3 J3J3 A1A1 B2B2 Forwarding table Example

A B Y X X4X4 Y3Y3 J3J3 A1A1 B2B2 Forwarding table YAB AB AB13 YAB Example

A B Y X ABP13 YABP P YAB AB9 Example

A C B D d=D, s=A C A d=D, s=A,C D CA d=D, s=B B Handling Routing Changes

A C B D C A d=D, s=C,B D CA d=D, s=C B Handling Routing Changes

A C B D C A d=D, s=B,C D d=D, s=C B Handling Routing Changes C A

Security of SAVE itself  Essentially the same problem as securing routing protocol  Requirements  SAVE updates must only be exchanged between routers, excluding hosts  Trust relationship between routers must be established beforehand  SAVE updates must be signed or encrypted  Processing of SAVE updates must be lightweight

Deployment  Can only be incremental  Have to deal with legacy routers  Incoming table will not cover the whole Internet  Deployment at different location has different impact  Some real issues  Mobile IP  Tunnelling  Multipath routing ......

Simulation  All routers run SAVE protocol + routing protocols  Transit-stub topology generated using GT-ITM  BGP as inter-domain routing protocol  RIP as intra-domain routing protocol  Some asymmetric routes

Simulation Goals  Effectiveness - are all spoofing packets successfully detected and dropped?  Correctness - are some valid packets dropped erroneously?  Transient behavior  Cost

 Each packet source generates both valid and spoofing packets  Spoofing source addresses randomly chosen from a pool of all source addresses in the network  Every router is under an average load condition  Results:  In all scenarios all spoofing packets were detected and dropped  Without routing changes no valid packets were dropped Effectiveness and Correctness

Transient Behavior  Route changes introduce a transient period for SAVE to adjust every incoming table along the new route  During this period valid packets can be dropped on new route  Assuming that SAVE packets have same propagation delay as data packets, inconsistency occurs if:  data packet is sent out on new route BEFORE new SAVE update validating this route  data packet is filtered at a router on the path BEFORE new SAVE update is processed

Cost of SAVE  Compared cost of SAVE with costs of routing protocols (BGP and RIP)  Bandwidth cost:  compared bandwidth consumed by SAVE updates with that consumed by routing updates  Storage cost:  compared the size of incoming table with the size of forwarding table

# of routers storage cost (kilobytes) forwarding table built by RIP incoming table built by SAVE optimized incoming table built by SAVE Storage Cost (single domain)

# of routers storage cost (kilobytes) forwarding table built by BGP incoming table built by SAVE optimized incoming table built by SAVE Storage Cost (multiple domains)

# of routers periodic bandwidth ratio SAVE/RIP Periodic Bandwidth (single domain )

# of routers bandwidth ratio SAVE/(BGP+RIP) Periodic Bandwidth (multiple domains)

# of failed links triggered bandwidth ratio SAVE/(BGP+RIP) Triggered Bandwidth (multiple domains)

Implementation in Linux FORWARDING TABLE FIREWALL IP NEIGHBOR MAP KERNEL BGPdOSPFdRIPd ZEBRAd ROUTINGPROTOCOL NETLINK INTERFACE SAVEd FTABLEITABLEITREEINTMAP SAVE

Related Work  Cryptographic Methods  High computation overhead of cryptographic operations  Forwarding-table-based filtering  Routing asymmetry leads to erroneous packet dropping

Related Work  Ingress and egress filtering  Very ineffective if partially deployed  Packet tracing  Complex and expensive  Ineffective when the volume of attack traffic is small or the attack is distributed  Reactive, not preventive

On-going Work  Cooperation with Purdue University on partial deployment investigation  Implementation  IXP router implementation  Cisco router implementation  Testing  FTN testbed  Utah testbed  IETF draft

Conclusions  Filtering improperly addressed packets is worthwhile  Asymmetric network routing demands an incoming table  SAVE builds incoming tables correctly with low bandwidth and storage overhead  SAVE has demonstrated its correctness and effectiveness through simulation  Implementation is under way