A Pluralist Approach to Interdomain Communication Security Ioannis Avramopoulos Princeton University Joint work with Jennifer Rexford.

Slides:



Advertisements
Similar presentations
Secure Routing Panel FIND PI Meeting (June 27, 2007) Morley Mao, Jen Rexford, Xiaowei Yang.
Advertisements

All rights reserved © 2000, Alcatel 1 CPE-based VPNs Hans De Neve Alcatel Network Strategy Group.
Jennifer Rexford Princeton University MW 11:00am-12:20pm Network Virtualization COS 597E: Software Defined Networking.
Guide to Network Defense and Countermeasures Second Edition
Martin Suchara in collaboration with I. Avramopoulos and J. Rexford How Small Groups Can Secure Interdomain Routing.
Information-Centric Networks04c-1 Week 4 / Paper 3 A Survey of BGP Security Issues and Solutions –Kevin Butler, Toni Farley, Patrick McDaniel, and Jennifer.
Network Isolation Using Group Policy and IPSec Paula Kiernan Senior Consultant Ward Solutions.
Internet Protocol Security An Overview of IPSec. Outline:  What Security Problem?  Understanding TCP/IP.  Security at What Level?  IP Security. 
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
1 IP Security Outline of the session –IP Security Overview –IP Security Architecture –Key Management Based on slides by Dr. Lawrie Brown of the Australian.
Eric Kilroy. Introduction  Virtual Private Network A way to connect to a private network through a public network such as the internet.
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
Future Research Directions Jennifer Rexford Advanced Computer Networks Tuesdays/Thursdays 1:30pm-2:50pm.
Applied Cryptography for Network Security
Virtual Private Networking Karlene R. Samuels COSC513.
Data Security in Local Networks using Distributed Firewalls
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Stealth Probing: Efficient Data- Plane Security for IP Routing Ioannis Avramopoulos Princeton University Joint work with Jennifer Rexford.
VPN – Technologies and Solutions CS158B Network Management April 11, 2005 Alvin Tsang Eyob Solomon Wayne Tsui.
Internet Protocol Security (IPSec)
Virtual Private Networks Shamod Lacoul CS265 What is a Virtual Private Network (VPN)? A Virtual Private Network is an extension of a private network.
Backbone Support for Host Mobility: A Joint ORBIT/VINI Experiment Jennifer Rexford Princeton University Joint work with the ORBIT team (Rutgers) and Andy.
Building a Strong Foundation for a Future Internet Jennifer Rexford ’91 Computer Science Department (and Electrical Engineering and the Center for IT Policy)
1 Lecture 20: Firewalls motivation ingredients –packet filters –application gateways –bastion hosts and DMZ example firewall design using firewalls – virtual.
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
1 © J. Liebeherr, All rights reserved Virtual Private Networks.
Secure Remote Access to an Internal Web Server Christian Gilmore, David Kormann, and Aviel D. Rubin ATT Labs - Research “The security policy usually amounts.
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
Virtual Private Network prepared by Rachna Agrawal Lixia Hou.
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
COMP 6005 An Introduction To Computing Session Four: Internetworking and the World Wide Web.
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
9/15/2015CS622 - MIRO Presentation1 Wen Xu and Jennifer Rexford Department of Computer Science Princeton University Chuck Short CS622 Dr. C. Edward Chow.
– Chapter 5 – Secure LAN Switching
Network Security1 – Chapter 5 – Secure LAN Switching Layer 2 security –Port security –IP permit lists –Protocol filtering –Controlling LAN floods (using.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
Virtual Private Networks Warren Toomey. Available WAN Links.
Module 5: Configuring Access for Remote Clients and Networks.
Lecture 16 Page 1 Advanced Network Security Perimeter Defense in Networks: Virtual Private Networks Advanced Network Security Peter Reiher August, 2014.
Virtual Private Ad Hoc Networking Jeroen Hoebeke, Gerry Holderbeke, Ingrid Moerman, Bard Dhoedt and Piet Demeester 2006 July 15, 2009.
Security Issues in Control, Management and Routing Protocols M.Baltatu, A.Lioy, F.Maino, D.Mazzocchi Computer and Network Security Group Politecnico di.
Interdomain Routing Security. How Secure are BGP Security Protocols? Some strange assumptions? – Focused on attracting traffic from as many Ases as possible.
Security Requirements of NVO3 draft-hartman-nvo3-security-requirements-01 S. Hartman M. Wasserman D. Zhang 1.
Content-oriented Networking Platform: A Focus on DDoS Countermeasure ( In incremental deployment perspective) Authors: Junho Suh, Hoon-gyu Choi, Wonjun.
A Light-Weight Distributed Scheme for Detecting IP Prefix Hijacks in Real-Time Lusheng Ji†, Joint work with Changxi Zheng‡, Dan Pei†, Jia Wang†, Paul Francis‡
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Security Mechanisms for Delivering Ubiquitous Services in Next Generation Mobile Networks Haitham Cruickshank University of Surrey workshop on Ubiquitous.
Securing Data Transmission and Authentication. Securing Traffic with IPSec IPSec allows us to protect our network from within IPSec secures the IP protocol.
Virtual Private Network (VPN)
Understand Network Isolation Part 2 LESSON 3.3_B Security Fundamentals.
1 Objectives Wireless Access IPSec Discuss Network Access Protection Install Network Access Protection.
1 Border Gateway Protocol (BGP) and BGP Security Jeff Gribschaw Sai Thwin ECE 4112 Final Project April 28, 2005.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
K. Salah1 Security Protocols in the Internet IPSec.
Securing Access to Data Using IPsec Josh Jones Cosc352.
A Security Framework for ROLL draft-tsao-roll-security-framework-00.txt T. Tsao R. Alexander M. Dohler V. Daza A. Lozano.
Securing Interconnect Networks By: Bryan Roberts.
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public Presentation_ID 1 Security Requirements of NVO3 draft-hartman-nvo3-security-requirements-00.
Virtual Private Networks
Virtual Private Network
Virtual Private Networks
IP-Spoofing and Source Routing Connections
Virtual Private Networks (VPNs)
Cengage Learning: Computer Networking from LANs to WANs
OCI – VPN Connect Internet Customer Premises
Presentation transcript:

A Pluralist Approach to Interdomain Communication Security Ioannis Avramopoulos Princeton University Joint work with Jennifer Rexford

Economics & the Internet Inertness Internet infrastructure is insecure Despite the obvious threat, countermeasures are not being deployed –E.g., Secure-BGP We argue that the reason is mainly economic Autonomous systems (ASes) in commercial Internet are independent, rational, and pay-off maximizing entities

Overview Economic Case for Pluralism Architectural Framework for Pluralism Example of Using the Architectural Framework

Background: Economics of Groups and Goods Good: Secure communication between domains –Goods are confidentiality, integrity, and availability Producing such goods requires action in groups –Group members are ASes Goods can be –purely public (e.g., public television broadcasting) –purely private (e.g., recorded music sold in stores) –impurely public (e.g., cable television broadcasting) Type of good can be engineered

Background: Routing Protocols

The Case for Pluralism: Purism is not Economically Viable Purism: Ubiquitous deployment of a secure routing protocol Purism treats secure interdomain communication as a pure public good –Therefore, purism is not economically viable

The Case for Pluralism: Smaller Groups are More Effective Olson classifies interaction among group members in three categories: –Large group; good will not be provided unless there is coercion –Small group; good may be provided by unilateral action –Medium group; good may be provided by strategic interaction

The Case for Pluralism: Custom Security Solutions Per Group Many options (mechanisms) to improve communication security –E.g., confidentiality can be protected by a secure routing protocol or encryption ciphers No single mechanism can address the full gamut of threats –E.g., during a DoS attack you prefer unreachability Network architecture should support the graceful coexistence of different mechanisms

SBone Architectural Framework for Pluralism Objective: support the formation of groups of any size---irrespective of IP connectivity of group members---without compromising security

Formation of Arbitrary Groups Irrespective of IP Connectivity island Archipelago

Threat Model DoS attacks –against targets inside the overlay –against virtual links Routing-protocol attacks –to intercept cross-island traffic Data-plane attacks –to manipulate cross-island traffic

Secure Virtual Link: Surelink Connects a relay point in one island to a relay point in another forming an IP tunnel Surelinks enhance the service model of a vanilla IP tunnel with –an encryption cipher to protect confidentiality –an authentication cipher to protect integrity and enforce access control –secure availability monitoring capability

Secure Virtual Topology Collection of multiple surelinks giving control of the underlying paths traffic takes Path control can be leveraged to –proactively prevent routing attacks –proactively bypass untrusted non-participants –proactively spread traffic over multiple paths –reactively reroute traffic to alternate paths

Example of Archipelago Backbone-provider trusted VPN –Example of revenue-generating service based on coalitions among providers

Example of Archipelago AT&T Telstra US branch Australian branch surelinks

Example of Archipelago Backbone-provider trusted VPN –Example of revenue-generating service based on coalitions among providers Coalition-based trusted VPNs can serve multinational customers without additional investment on infrastructure

Conclusion Purism is not economically viable Deployment of communication security mechanism should be based on pluralism; –I.e., the formation of variable-sized groups deploying mechanism customized to group-specific needs Proposed an architectural framework to support pluralism that is backward compatible with existing infrastructure

Thank you! Questions