How Secure are Secure Inter- Domain Routing Protocols? SIGCOMM 2010 Presenter: kcir.

Slides:



Advertisements
Similar presentations
A Threat Model for BGPSEC
Advertisements

A Threat Model for BGPSEC Steve Kent BBN Technologies.
COS 461 Fall 1997 Routing COS 461 Fall 1997 Typical Structure.
How Secure are Secure Interdomain Routing Protocols? B 大氣四 鍾岳霖 B 財金三 婁瀚升 1.
1 Robert Lychev Sharon GoldbergMichael Schapira Georgia Tech Boston University Hebrew University.
1 Robert Lychev Sharon GoldbergMichael Schapira Georgia Tech Boston University Hebrew University.
Sign What You Really Care About - $ecure BGP AS Paths Efficiently Yang Xiang Zhiliang Wang Jianping Wu Xingang Shi Xia Yin Tsinghua University, Beijing.
Martin Suchara in collaboration with I. Avramopoulos and J. Rexford How Small Groups Can Secure Interdomain Routing.
Network Layer: Internet-Wide Routing & BGP Dina Katabi & Sam Madden.
CS540/TE630 Computer Network Architecture Spring 2009 Tu/Th 10:30am-Noon Sue Moon.
© J. Liebeherr, All rights reserved 1 Border Gateway Protocol This lecture is largely based on a BGP tutorial by T. Griffin from AT&T Research.
Availability Centric Routing (ACR) Robust Interdomain Routing Without BGP Security July 25 th, 2006.
Fundamentals of Computer Networks ECE 478/578 Lecture #18: Policy-Based Routing Instructor: Loukas Lazos Dept of Electrical and Computer Engineering University.
Let the Market Drive Deployment A Strategy for Transitioning to BGP Security Phillipa Gill University of Toronto Sharon Goldberg Boston University Michael.
1 Interdomain Routing Protocols. 2 Autonomous Systems An autonomous system (AS) is a region of the Internet that is administered by a single entity and.
By Hitesh Ballani, Paul Francis, Xinyang Zhang Slides by Benson Luk for CS 217B.
Part II: Inter-domain Routing Policies. March 8, What is routing policy? ISP1 ISP4ISP3 Cust1Cust2 ISP2 traffic Connectivity DOES NOT imply reachability!
1 Towards Secure Interdomain Routing For Dr. Aggarwal Win 2004.
Interdomain Routing Security COS 461: Computer Networks Michael Schapira.
1 Tutorial 5 Safe “Peering Backup” Routing With BGP Based on:
Practical and Configuration issues of BGP and Policy routing Cameron Harvey Simon Fraser University.
1 BGP Security -- Zhen Wu. 2 Schedule Tuesday –BGP Background –" Detection of Invalid Routing Announcement in the Internet" –Open Discussions Thursday.
Tutorial 5 Safe Routing With BGP Based on: Internet.
Internet Networking Spring 2004 Tutorial 5 Safe “Peering Backup” Routing With BGP.
Stable Internet Routing Without Global Coordination Jennifer Rexford Princeton University Joint work with Lixin Gao (UMass-Amherst)
Interdomain Routing Establish routes between autonomous systems (ASes). Currently done with the Border Gateway Protocol (BGP). AT&T Qwest Comcast Verizon.
Inherently Safe Backup Routing with BGP Lixin Gao (U. Mass Amherst) Timothy Griffin (AT&T Research) Jennifer Rexford (AT&T Research)
Let the Market Drive Deployment A Strategy for Transitioning to BGP Security Phillipa Gill University of Toronto Sharon Goldberg Boston University Michael.
Ion Stoica October 2, 2002 (* this presentation is based on Lakshmi Subramanian’s slides) EE 122: Inter-domain routing – Border Gateway Protocol (BGP)
Economic Incentives in Internet Routing Jennifer Rexford Princeton University
Stable Internet Routing Without Global Coordination Jennifer Rexford AT&T Labs--Research Joint work with Lixin Gao.
Border Gateway Protocol(BGP) L.Subramanian 23 rd October, 2001.
Computer Networks Layering and Routing Dina Katabi
Inter-domain Routing Outline Border Gateway Protocol.
Constructing Inter-Domain Packet Filters to Control IP Spoofing Based on BGP Updates Zhenhai Duan, Xin Yuan Department of Computer Science Florida State.
1 Computer Communication & Networks Lecture 22 Network Layer: Delivery, Forwarding, Routing (contd.)
Information-Centric Networks04a-1 Week 4 / Paper 1 Open issues in Interdomain Routing: a survey –Marcelo Yannuzzi, Xavier Masip-Bruin, Olivier Bonaventure.
9/15/2015CS622 - MIRO Presentation1 Wen Xu and Jennifer Rexford Department of Computer Science Princeton University Chuck Short CS622 Dr. C. Edward Chow.
1 Controlling IP Spoofing via Inter-Domain Packet Filters Zhenhai Duan Department of Computer Science Florida State University.
1 Interdomain Routing (BGP) By Behzad Akbari Fall 2008 These slides are based on the slides of Ion Stoica (UCB) and Shivkumar (RPI)
Jennifer Rexford Fall 2014 (TTh 3:00-4:20 in CS 105) COS 561: Advanced Computer Networks BGP.
Finding Vulnerable Network Gadgets in the Internet Topology Author: Nir Amar Supervisor: Dr. Gabi Nakibly Author: Nir Amar Supervisor: Dr. Gabi Nakibly.
Sign What You Really Care About -- Secure BGP AS Paths Efficiently Yang Xiang, Z. Wang, J. Wu, X. Shi, X. Yin Tsinghua University, Beijing AsiaFI 2011.
Interdomain Routing Security. How Secure are BGP Security Protocols? Some strange assumptions? – Focused on attracting traffic from as many Ases as possible.
A Firewall for Routers: Protecting Against Routing Misbehavior1 June 26, A Firewall for Routers: Protecting Against Routing Misbehavior Jia Wang.
More on Internet Routing A large portion of this lecture material comes from BGP tutorial given by Philip Smith from Cisco (ftp://ftp- eng.cisco.com/pfs/seminars/APRICOT2004.
T. S. Eugene Ngeugeneng at cs.rice.edu Rice University1 COMP/ELEC 429/556 Introduction to Computer Networks Inter-domain routing Some slides used with.
A Light-Weight Distributed Scheme for Detecting IP Prefix Hijacks in Real-Time Lusheng Ji†, Joint work with Changxi Zheng‡, Dan Pei†, Jia Wang†, Paul Francis‡
Detecting Selective Dropping Attacks in BGP Mooi Chuah Kun Huang November 2006.
Efficient Secure BGP AS Path using FS-BGP Xia Yin, Yang Xiang, Zhiliang Wang, Jianping Wu Tsinghua University, Beijing 81th Quebec.
CS 4396 Computer Networks Lab BGP. Inter-AS routing in the Internet: (BGP)
1 Robert Lychev Sharon GoldbergMichael Schapira Georgia Tech Boston University Hebrew University.
1 Border Gateway Protocol (BGP) and BGP Security Jeff Gribschaw Sai Thwin ECE 4112 Final Project April 28, 2005.
Michael Schapira, Princeton University Fall 2010 (TTh 1:30-2:50 in COS 302) COS 561: Advanced Computer Networks
Inter-domain Routing Outline Border Gateway Protocol.
Constructing Inter-Domain Packet Filters to Control IP Spoofing Based on BGP Updates Zhenhai Duan, Xin Yuan Department of Computer Science Florida State.
BGP security some slides borrowed from Jen Rexford (Princeton U)
1 Internet Routing 11/11/2009. Admin. r Assignment 3 2.
Border Gateway Protocol
COMP 3270 Computer Networks
No Direction Home: The True cost of Routing Around Decoys
COS 561: Advanced Computer Networks
COS 561: Advanced Computer Networks
COS 561: Advanced Computer Networks
COS 561: Advanced Computer Networks
COS 561: Advanced Computer Networks
BGP Security Jennifer Rexford Fall 2018 (TTh 1:30-2:50 in Friend 006)
COS 461: Computer Networks
Fixing the Internet: Think Locally, Impact Globally
Presentation transcript:

How Secure are Secure Inter- Domain Routing Protocols? SIGCOMM 2010 Presenter: kcir

Main Purpose Think like a normal node: Security analysis of nowadays inter-domain routing protocols Think like a malicious node: Strategy and impact analysis of 1) attraction and 2) interception attacks.

Some Preliminaries AS (Autonomous System) Collection of connected IP prefixes under the control of one or more network operators that presents a common, clearly defined routing policy to the Internet. BGP (Broadcast Gateway Protocol) Protocol used by ASes to find and announce paths.

I have xx x.xxx I know a path towards xxx. xxx

Outline Modeling BGP Protocols Attraction Attack Interception Attack Finding the Optimal Attack Conclusion

Outline Modeling - Inter-domain routing - Routing policies - Threat Models BGP Protocols Attraction Attack Interception Attack Finding the Optimal Attack Conclusion

Inter-Domain Routing Graph Dataset: Real world AS topologies measurement Graph is relative static to protocol execution. Nodes Routing policy 1: Path ranking Routing policy 2: Export policy Edges Customer-Provider link Peer-to-peer link

Routing Policy Policies are different from ASes, but there are some global iron rules. Path Ranking 1.Loop avoiding 2.Local preference: customer > peer > provider 3.Shortest path 4.Tie break

Routing Policy Export Policy -AS should only be willing to load his own network with transit traffic if he gets paid to do so. -AS b will only announce a path via AS c to AS a if at least one of a and c are customers of b.

Threat Models Single manipulator, single victim Attraction attack Interception attack (attraction attack without ‘blackhole’ effect) Quantifying the impact of attack Fraction of traffic attracted to the manipulator.

Outline Modeling BGP Protocols - BGP - Origin Authentication - soBGP - S-BGP - Defensive filtering Attraction Attack Interception Attack Finding the Optimal Attack Conclusion

BGP Broadcast Gateway Protocol No validating, just naively trusts every information. Attack: Prefix hijack Impact: 75% traffic attracted.

Origin Authentication Requires a trusted database to guarantee the righteousness of prefix owning. Blunt hijackers. Only guarantee the ‘origin,’ i.e. the end node of a path. Attack: false path announcement Impact: 25% traffic attracted.

soBGP Secure Origin BGP Requires a trusted database to guarantee that the path physically exists. Attack: announce paths that do not obey the preference (customer > peer > provider.) Impact: 10% traffic attracted.

S-BGP Secure BGP Using cryptographic signatures to guarantee that the path is righteously announced. Attack: announce paths that do not obey the business model. (Announce a shorter, expensive provider path, while actually forwarding traffic on the cheaper, longer customer path.) Impact: 1.7% traffic attracted.

Defensive Filtering This is not a protocol but rather a policy. Stub AS: AS that does not have any customers. Defensive filtering = Blocking stub announcements The usefulness of this policy will be shown later.

Outline Modeling BGP Protocols Attraction Attack - Strategy - Performance - Possible effecting factors Interception Attack Finding the Optimal Attack Conclusion

Strategy “Shortest-Path Export-All” Announce the shortest path that will not be detected as bogus. Exports the paths to every neighbor.

Performance DF is crucial (85% ASes are stubs) BGP: uniform dist. soBGP & S-BGP: identical. Probability Fraction of Attraction P(Finding shorter path)

Possible Effecting Factors Path length Export policy Shortest-All vs. Normal-All Normal-All vs. Normal-Normal Export policy dominates path length. Probability S-BGP

Outline Modeling BGP Protocols Attraction Attack Interception Attack - Avoiding blackhole effect - Strategy - Performance Finding the Optimal Attack Conclusion

Avoiding Blackhole Effect blackhole

Avoiding Blackhole Effect Taking the “Shortest -path, Export-all” strategy. Tier 1 AS: > 250 customers Tier 2 AS: > 25 customers The probabilities of blackhole effect on different types of manipulators are different. The result is supported by [Gao01]

Strategy “Shortest-Available-path, Export-all” Mimicking soBGP and S-BGP to only announce available paths. “Hybrid Interception“ 1.Run “Shortest-path, Export-all” 2.Check if an available path exists, if yes, announce; if no, continue. 3.Run “Shortest-Available-path, Export-all”

Performance Announce All: ignore blackhole effect. Hybrid Interception: > 10% attracted for more than half chance!

Outline Modeling BGP Protocols Attraction Attack Interception Attack Finding the Optimal Attack Strategy - Longer path announcement - Export to fewer neighbors - Exploiting loop detection - Finding the optimal attack is NP-Hard Conclusion

Finding The Optimal Attack Strategy So far, the strategies we introduced (for both attraction and interception attack) are still far from optimal but rather heuristic guesses. For some cases, strategies that are against our intuition may have more severe impact. -Longer path announcement -Fewer exporting -Exploiting the loop detection mechanism

Longer Path Announcement soBGP, S-BGP running Short: (m,a1,v,Prefix); Long: (m,a2,a3,v,Prefix) Customer edge is more preferred than peer 16% attraction -> 56% Short Long

Export to Fewer Neighbors soBGP, S-BGP running All: T1a,T2a,T2,v; Fewer: T1a,T2a,T2,v Forcing T2 to detour, making it unpopular. 40% attraction -> 50% Export All Export fewer

Exploiting Loop Detection BGP running (hijacking) Normal: (m,Prefix); Loop: (m,a2,Prefix) Paralyzing a2-a1, making T1a more popular attractions -> Normal Loop

Finding The Optimal Attack is NP-Hard [Goldberg10] and [Gao01] Sketch of proof The ‘DILEMMA’ pattern

Outline Modeling BGP Protocols Attraction Attack Interception Attack Finding the Optimal Attack Conclusion

Nowadays BGPs are still not capable with dealing Inter-domain traffic attacks. - Hard to detect - Hard to define This work only provides lower bounds of the impacts of attack, which is already concerning enough. The complexity of finding the optimal attack strategy is proofed to be NP-hard, which means that the competition between manipulators and defenders may never ends.