Impact of Prefix Hijacking on Payments of Providers Pradeep Bangera and Sergey Gorinsky Institute IMDEA Networks, Madrid, Spain Developing the Science.

Slides:



Advertisements
Similar presentations
Routing Basics.
Advertisements

Censorship Resistance: Decoy Routing Amir Houmansadr CS660: Advanced Information Assurance Spring 2015 Content may be borrowed from other resources. See.
Martin Suchara in collaboration with I. Avramopoulos and J. Rexford How Small Groups Can Secure Interdomain Routing.
Network Layer: Internet-Wide Routing & BGP Dina Katabi & Sam Madden.
Fundamentals of Computer Networks ECE 478/578 Lecture #18: Policy-Based Routing Instructor: Loukas Lazos Dept of Electrical and Computer Engineering University.
CS 4700 / CS 5700 Network Fundamentals Lecture 16: IXPs (The Underbelly of the Internet) Revised 3/23/2015.
1 Interdomain Routing Protocols. 2 Autonomous Systems An autonomous system (AS) is a region of the Internet that is administered by a single entity and.
The need for BGP AfNOG Workshops Philip Smith. “Keeping Local Traffic Local”
Advanced Topics of WAN Compiled from Previous ISQS 6341 Project November 2003.
Interdomain Routing Security COS 461: Computer Networks Michael Schapira.
1 BGP Security -- Zhen Wu. 2 Schedule Tuesday –BGP Background –" Detection of Invalid Routing Announcement in the Internet" –Open Discussions Thursday.
Mini Introduction to BGP Michalis Faloutsos. What Is BGP?  Border Gateway Protocol BGP-4  The de-facto interdomain routing protocol  BGP enables policy.
Analysis of BGP Routing Tables
MIRED: Managing IP Routing is Extremely Difficult Jennifer Rexford Internet and Networking Systems AT&T Labs - Research; Florham Park, NJ
Stable Internet Routing Without Global Coordination Jennifer Rexford Princeton University Joint work with Lixin Gao (UMass-Amherst)
Dynamics of Hot-Potato Routing in IP Networks Renata Teixeira (UC San Diego) with Aman Shaikh (AT&T), Tim Griffin(Intel),
Wresting Control from BGP: Scalable Fine-grained Route Control UCSD / AT&T Research Usenix —June 22, 2007 Dan Pei, Tom Scholl, Aman Shaikh, Alex C. Snoeren,
Inherently Safe Backup Routing with BGP Lixin Gao (U. Mass Amherst) Timothy Griffin (AT&T Research) Jennifer Rexford (AT&T Research)
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 Exterior Gateway Protocols: EGP, BGP-4, CIDR Shivkumar Kalyanaraman Rensselaer Polytechnic Institute.
The Shapley Value: Its Use and Implications on Internet Economics Richard T.B. Ma Columbia University Dah-ming Chiu, John C.S. Lui The Chinese University.
Stable Internet Routing Without Global Coordination Jennifer Rexford AT&T Labs--Research
Stable Internet Routing Without Global Coordination Jennifer Rexford AT&T Labs--Research
1 Autonomous Systems An autonomous system is a region of the Internet that is administered by a single entity. Examples of autonomous regions are: UVA’s.
Stable Internet Routing Without Global Coordination Jennifer Rexford AT&T Labs--Research Joint work with Lixin Gao.
Building a Strong Foundation for a Future Internet Jennifer Rexford ’91 Computer Science Department (and Electrical Engineering and the Center for IT Policy)
Border Gateway Protocol (BGP4) Rizwan Rehman, CCS, DU.
1 ECE453 – Introduction to Computer Networks Lecture 10 – Network Layer (Routing II)
Computer Networks Layering and Routing Dina Katabi
Inter-domain Routing Outline Border Gateway Protocol.
Yaping Zhu with: Jennifer Rexford (Princeton University) Subhabrata Sen and Aman Shaikh (AT&T Labs-Research) Impact of Prefix-Match.
APNIC eLearning: Intro to RPKI 10 December :30 PM AEST Brisbane (UTC+10)
A LIGHT-WEIGHT DISTRIBUTED SCHEME FOR DETECTING IP PREFIX HIJACKS IN REAL TIME Changxi Zheng, Lusheng Ji, Dan Pei, Jia Wang and Paul Francis. Cornell University,
Lecture 8 Page 1 Advanced Network Security Review of Networking Basics: Internet Architecture, Routing, and Naming Advanced Network Security Peter Reiher.
Introduction to BGP.
9/15/2015CS622 - MIRO Presentation1 Wen Xu and Jennifer Rexford Department of Computer Science Princeton University Chuck Short CS622 Dr. C. Edward Chow.
CS 3700 Networks and Distributed Systems Inter Domain Routing (It’s all about the Money) Revised 8/20/15.
Routing protocols Basic Routing Routing Information Protocol (RIP) Open Shortest Path First (OSPF)
Othman Othman M.M., Koji Okamura Kyushu University 1.
How Secure are Secure Inter- Domain Routing Protocols? SIGCOMM 2010 Presenter: kcir.
1 GIRO: Geographically Informed Inter-domain Routing Ricardo Oliveira, Mohit Lad, Beichuan Zhang, Lixia Zhang.
Jennifer Rexford Fall 2014 (TTh 3:00-4:20 in CS 105) COS 561: Advanced Computer Networks BGP.
David Wetherall Professor of Computer Science & Engineering Introduction to Computer Networks Hierarchical Routing (§5.2.6)
Interdomain Routing Security. How Secure are BGP Security Protocols? Some strange assumptions? – Focused on attracting traffic from as many Ases as possible.
More on Internet Routing A large portion of this lecture material comes from BGP tutorial given by Philip Smith from Cisco (ftp://ftp- eng.cisco.com/pfs/seminars/APRICOT2004.
SDX: A Software-Defined Internet eXchange Jennifer Rexford Princeton University
A Light-Weight Distributed Scheme for Detecting IP Prefix Hijacks in Real-Time Lusheng Ji†, Joint work with Changxi Zheng‡, Dan Pei†, Jia Wang†, Paul Francis‡
CS 4396 Computer Networks Lab BGP. Inter-AS routing in the Internet: (BGP)
ICS 156: Networking Lab Magda El Zarki Professor, ICS UC, Irvine.
4: Network Layer4b-1 OSPF (Open Shortest Path First) r “open”: publicly available r Uses Link State algorithm m LS packet dissemination m Topology map.
Routing in the Inernet Outcomes: –What are routing protocols used for Intra-ASs Routing in the Internet? –The Working Principle of RIP and OSPF –What is.
CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 16 PHILLIPA GILL - STONY BROOK U.
CS 640: Introduction to Computer Networks Aditya Akella Lecture 11 - Inter-Domain Routing - BGP (Border Gateway Protocol)
1 Agenda for Today’s Lecture The rationale for BGP’s design –What is interdomain routing and why do we need it? –Why does BGP look the way it does? How.
Securing BGP Bruce Maggs. BGP Primer AT&T /8 Sprint /16 CMU /16 bmm.pc.cs.cmu.edu Autonomous System Number Prefix.
1 Border Gateway Protocol (BGP) and BGP Security Jeff Gribschaw Sai Thwin ECE 4112 Final Project April 28, 2005.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—3-1 Route Selection Using Policy Controls Using Multihomed BGP Networks.
1 Chapter 4: Internetworking (IP Routing) Dr. Rocky K. C. Chang 16 March 2004.
Michael Schapira, Princeton University Fall 2010 (TTh 1:30-2:50 in COS 302) COS 561: Advanced Computer Networks
Inter-domain Routing Outline Border Gateway Protocol.
Constructing Inter-Domain Packet Filters to Control IP Spoofing Based on BGP Updates Zhenhai Duan, Xin Yuan Department of Computer Science Florida State.
One Hop for RPKI, One Giant Leap for BGP Security Yossi Gilad (Hebrew University) Joint work with Avichai Cohen (Hebrew University), Amir Herzberg (Bar.
1 On the Impact of Route Monitor Selection Ying Zhang* Zheng Zhang # Z. Morley Mao* Y. Charlie Hu # Bruce M. Maggs ^ University of Michigan* Purdue University.
1 CS716 Advanced Computer Networks By Dr. Amir Qayyum.
CS 3700 Networks and Distributed Systems
CS 3700 Networks and Distributed Systems
COMP 3270 Computer Networks
No Direction Home: The True cost of Routing Around Decoys
Internet Traffic Management: Security vs. Economics
BGP Policies Jennifer Rexford
Fixing the Internet: Think Locally, Impact Globally
Presentation transcript:

Impact of Prefix Hijacking on Payments of Providers Pradeep Bangera and Sergey Gorinsky Institute IMDEA Networks, Madrid, Spain Developing the Science of Networks COMSNETS 2011, 6 January 2011

Pradeep Bangera and Sergey Gorinsky, "Impact of Prefix Hijacking on Payments of Providers" 2 Outline Background Internet structure IP and BGP Prefix hijacking Contribution Economic perspective on traffic attraction via prefix hijacking Methodology Real AS-level topology data set Internet-scale simulations in C-BGP Results BGP connectivity, inter-AS link traffic, payments of providers Conclusions

Internet Structure Internet entities More than a billion users Tens of thousands of Internet Service Providers (ISPs) Own infrastructure organized as ASes (Autonomous Systems) Form a hierarchy: local, regional, global ASes Operate as commercial entities Inter-AS relationships Transit links Result in payments from the customer to the provider for the traffic exchanged in both directions Peering links Exchange traffic of own customers at reduced costs Pradeep Bangera and Sergey Gorinsky, "Impact of Prefix Hijacking on Payments of Providers" 3

Internet Protocol (IP) Forwarding IP identifies destinations with 32-bit addresses A prefix compactly represents a block of IP addresses Forwarding table of a router maps prefixes to output links A router uses the forwarding table to forward IP packets Based on the longest-prefix match rule e.g., Pradeep Bangera and Sergey Gorinsky, "Impact of Prefix Hijacking on Payments of Providers" 4 Prefixoutput_link /26e /24e1

Border Gateway Protocol (BGP) Routing Constructs and maintain forwarding tables in routers Relies on AS announcements of paths to prefixes Does not have a mechanism for verifying the validity of path announcements Pradeep Bangera and Sergey Gorinsky, "Impact of Prefix Hijacking on Payments of Providers" 5

Prefix Hijacking Refers to BGP announcements that attract traffic to different paths e.g., by pretending to own a more specific prefix than the one announced by the prefix owner Has been studied from security perspectives prevention is difficult Pradeep Bangera and Sergey Gorinsky, "Impact of Prefix Hijacking on Payments of Providers" 6

Our Contribution Economic perspective on prefix hijacking as a mechanism for sustainable traffic attraction that boosts ISP revenues Pradeep Bangera and Sergey Gorinsky, "Impact of Prefix Hijacking on Payments of Providers" 7

Methodology Internet-scale simulations in C-BGP Before and after prefix hijacking Real Internet data Real 2008 incident of YouTube prefix hijacking by Pakistan Telecommunication Company Limited (PTCL) Cooperative Association for Internet Data Analysis (CAIDA) data set for the contemporary AS-level topology Synthetic traffic Uniform YouTube-addressed video uploads from ASes No other traffic for simulation scalability reasons Pradeep Bangera and Sergey Gorinsky, "Impact of Prefix Hijacking on Payments of Providers" 8

Link Pricing and Provider Payments Price p t for a transit link [Amogh et al.]: p t = m t (V 0.75 ) V is the 95 th percentile of the traffic volume in Kbps m t = is such that 1 Mbps is priced at $12 Price p e for a peering link [H. Chang et al.]: p e = m e (V 0.4 ) m e = is such that 1 Mbps is priced at $1 Payment P of an AS: P = ∑ t є R p t - ∑ t є C p t - ∑ e є E p e Set R contains the transit links where the AS is a provider Set C contains the transit links where the AS is a customer Set E contains the peering links of the AS Pradeep Bangera and Sergey Gorinsky, "Impact of Prefix Hijacking on Payments of Providers" 9

Three Levels of Simulation Results BGP path counts of transit ASes Transit AS is an AS that serves a BGP path between other ASes BGP path count of a transit AS is the number of BGP paths traversing the AS Inter-AS link traffic Provider payments Pradeep Bangera and Sergey Gorinsky, "Impact of Prefix Hijacking on Payments of Providers" 10

BGP Path Counts of Transit ASes Pradeep Bangera and Sergey Gorinsky, "Impact of Prefix Hijacking on Payments of Providers" 11 Distributions are similar but some ASes are significantly affected Before prefix hijacking After prefix hijacking 2878 transit ASes: 64,213 BGP paths2760 transit ASes: 68,962 BGP paths 9, ,942

Losers and Winners of BGP Paths Pradeep Bangera and Sergey Gorinsky, "Impact of Prefix Hijacking on Payments of Providers" 12 9,728 12,723

Inter-AS Link Traffic Pradeep Bangera and Sergey Gorinsky, "Impact of Prefix Hijacking on Payments of Providers" 13 Before prefix hijackingAfter prefix hijacking PTCL (AS 17557) successfully attracts YouTube (AS 36561) traffic from all the BGP-connected ASes traffic to YouTube YouTube traffic hijacked by PTCL YouTube (AS 36561) PTCL (AS 17557)

Payments of Providers Pradeep Bangera and Sergey Gorinsky, "Impact of Prefix Hijacking on Payments of Providers" 14 Realistic traffic matrices and pricing functions are important YouTubeTransitRail PTCL Before prefix hijackingAfter prefix hijacking

Financial Losers and Gainers Pradeep Bangera and Sergey Gorinsky, "Impact of Prefix Hijacking on Payments of Providers" 15 Economic incentive Low in absolute terms but relatively high, e.g., Verizon Business gains $476 which is 58% of the YouTube payments Higher if multiple prefixes are hijacked Biggest financial winners and losers Top-tier provider-free ASes $708 $476$823

Viability of Traffic Attraction via Prefix Hijacking Pradeep Bangera and Sergey Gorinsky, "Impact of Prefix Hijacking on Payments of Providers" 16 Technical feasibility Detection is limited Prevention is very difficult especially if all the ISPs along the hijacked path are comfortable with the traffic attraction Legal feasibility Global nature of Internet complicates the judicial process ISPs operate within different national boundaries Business feasibility Reputation and negotiation power are important factors

Future Work Pradeep Bangera and Sergey Gorinsky, "Impact of Prefix Hijacking on Payments of Providers" 17 Realistic traffic matrices Realistic link pricing functions Traffic-interception scenarios where top-tier ISPs hijack traffic to deliver it to the destinations Economic tussle as a dynamic game

Conclusions Pradeep Bangera and Sergey Gorinsky, "Impact of Prefix Hijacking on Payments of Providers" 18 First economic perspective on prefix hijacking as a mechanism for sustainable traffic attraction that boosts ISP revenues Internet-scale simulations in C-BGP using a real CAIDA data set Quantitative impact of prefix hijacking on payments of providers Technical, legal and business feasibility of traffic attraction via prefix hijacking Top-tier provider-free ASes as the biggest financial beneficiaries and other directions for future work

Thank you Pradeep Bangera and Sergey Gorinsky, "Impact of Prefix Hijacking on Payments of Providers" 19