1 SENSS Security Service for the Internet Jelena Mirkovic USC Information Sciences Institute Joint work with Minlan Yu (USC), Ying Zhang.

Slides:



Advertisements
Similar presentations
A Threat Model for BGPSEC
Advertisements

Secure Routing Panel FIND PI Meeting (June 27, 2007) Morley Mao, Jen Rexford, Xiaowei Yang.
A Threat Model for BGPSEC Steve Kent BBN Technologies.
Barracuda Link Balancer Link Reliability and Bandwidth Optimization.
1 Robert Lychev Sharon GoldbergMichael Schapira Georgia Tech Boston University Hebrew University.
1 Robert Lychev Sharon GoldbergMichael Schapira Georgia Tech Boston University Hebrew University.
Sign What You Really Care About - $ecure BGP AS Paths Efficiently Yang Xiang Zhiliang Wang Jianping Wu Xingang Shi Xia Yin Tsinghua University, Beijing.
Martin Suchara in collaboration with I. Avramopoulos and J. Rexford How Small Groups Can Secure Interdomain Routing.
Phalanx: Withstanding Multimillion-Node Botnets Colin Dixon Arvind Krishnamurthy Tom Anderson University of Washington NSDI 2008.
BGP Multiple Origin AS (MOAS) Conflict Analysis Xiaoliang Zhao, NCSU S. Felix Wu, UC Davis Allison Mankin, Dan Massey, USC/ISI Dan Pei, Lan Wang, Lixia.
Fundamentals of Computer Networks ECE 478/578 Lecture #18: Policy-Based Routing Instructor: Loukas Lazos Dept of Electrical and Computer Engineering University.
Consensus Routing: The Internet as a Distributed System John P. John, Ethan Katz-Bassett, Arvind Krishnamurthy, and Thomas Anderson Presented.
By Hitesh Ballani, Paul Francis, Xinyang Zhang Slides by Benson Luk for CS 217B.
Distributed Denial of Service Attacks: Characterization and Defense Will Lefevers CS522 UCCS.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim.
An Operational Perspective on BGP Security Geoff Huston GROW WG IETF 63 August 2005.
Interdomain Routing Security COS 461: Computer Networks Michael Schapira.
Practical and Configuration issues of BGP and Policy routing Cameron Harvey Simon Fraser University.
1 BGP Security -- Zhen Wu. 2 Schedule Tuesday –BGP Background –" Detection of Invalid Routing Announcement in the Internet" –Open Discussions Thursday.
© 2003 By Default! A Free sample background from Slide 1 SAVE: Source Address Validity Enforcement Protocol Authors: Li,
SAVE: Source Address Validity Enforcement Protocol Jun Li, Jelena Mirković, Mengqiu Wang, Peter Reiher and Lixia Zhang UCLA Computer Science Dept 10/04/2001.
1 TVA: A DoS-limiting Network Architecture Xiaowei Yang (UC Irvine) David Wetherall (Univ. of Washington) Thomas Anderson (Univ. of Washington)
COS 461: Computer Networks
DDoS Attack and Its Defense1 CSE 5473: Network Security Prof. Dong Xuan.
Sample Research Defenses Packetscore Pushback Traceback SOS Proof-of-work systems Human behavior modeling SENSS.
Lecture 22 Page 1 Advanced Network Security Other Types of DDoS Attacks Advanced Network Security Peter Reiher August, 2014.
Wolfgang Schneider NSI: A Client-Server-Model for PKI Services.
A LIGHT-WEIGHT DISTRIBUTED SCHEME FOR DETECTING IP PREFIX HIJACKS IN REAL TIME Changxi Zheng, Lusheng Ji, Dan Pei, Jia Wang and Paul Francis. Cornell University,
Brief Announcement: Spoofing Prevention Method Anat Bremler-Barr Hanoch Levy computer science computer science Interdisciplinary Center Herzliya Tel-Aviv.
Clouseau: A practical IP spoofing defense through route-based filtering Jelena Mirkovic, University of Delaware Nikola Jevtic,
Nodes Bearing Grudges: Towards Routing Security, Fairness, and Robustness in Mobile Ad Hoc Networks Sonja Buchegger Jean-Yves Le Boudec.
1 Controlling IP Spoofing via Inter-Domain Packet Filters Zhenhai Duan Department of Computer Science Florida State University.
How Secure are Secure Inter- Domain Routing Protocols? SIGCOMM 2010 Presenter: kcir.
Slide title 70 pt CAPITALS Slide subtitle minimum 30 pt SENSS: Software-defined Security Service Minlan Yu, Ying Zhang*, Jelena Mirkovic, Abdulla Alwabel.
Let’s ChronoSync: Decentralized Dataset State Synchronization in Named Data Networking Zhenkai Zhu Alexander Afanasyev (presenter) Tuesday, October 8,
David Wetherall Professor of Computer Science & Engineering Introduction to Computer Networks Hierarchical Routing (§5.2.6)
1 Countering DoS Through Filtering Omar Bashir Communications Enabling Technologies
Interdomain Routing Security. How Secure are BGP Security Protocols? Some strange assumptions? – Focused on attracting traffic from as many Ases as possible.
A Firewall for Routers: Protecting Against Routing Misbehavior1 June 26, A Firewall for Routers: Protecting Against Routing Misbehavior Jia Wang.
A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University.
Distributed Denial of Service Attacks
Content-oriented Networking Platform: A Focus on DDoS Countermeasure ( In incremental deployment perspective) Authors: Junho Suh, Hoon-gyu Choi, Wonjun.
A Light-Weight Distributed Scheme for Detecting IP Prefix Hijacks in Real-Time Lusheng Ji†, Joint work with Changxi Zheng‡, Dan Pei†, Jia Wang†, Paul Francis‡
Understanding the Network-Level Behavior of Spammers Author: Anirudh Ramachandran, Nick Feamster SIGCOMM ’ 06, September 11-16, 2006, Pisa, Italy Presenter:
Tiered Incentives for Integrity Based Queuing Fariba Khan, Carl A. Gunter University of Illinois at Urbana-Champaign.
1 A Framework for Measuring and Predicting the Impact of Routing Changes Ying Zhang Z. Morley Mao Jia Wang.
1 SOS: Secure Overlay Services A. D. Keromytis V. Misra D. Runbenstein Columbia University.
Detecting Selective Dropping Attacks in BGP Mooi Chuah Kun Huang November 2006.
Lecture 20 Page 1 Advanced Network Security Basic Approaches to DDoS Defense Advanced Network Security Peter Reiher August, 2014.
CS 4396 Computer Networks Lab BGP. Inter-AS routing in the Internet: (BGP)
CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 16 PHILLIPA GILL - STONY BROOK U.
SEMINAR ON IP SPOOFING. IP spoofing is the creation of IP packets using forged (spoofed) source IP address. In the April 1989, AT & T Bell a lab was among.
Securing BGP Bruce Maggs. BGP Primer AT&T /8 Sprint /16 CMU /16 bmm.pc.cs.cmu.edu Autonomous System Number Prefix.
1 Border Gateway Protocol (BGP) and BGP Security Jeff Gribschaw Sai Thwin ECE 4112 Final Project April 28, 2005.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—3-1 Route Selection Using Policy Controls Using Multihomed BGP Networks.
Grades update. Homework #1 Count35 Minimum Value47.00 Maximum Value Average
IPv6 Security Issues Georgios Koutepas, NTUA IPv6 Technology and Advanced Services Oct.19, 2004.
BGP security some slides borrowed from Jen Rexford (Princeton U)
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
One Hop for RPKI, One Giant Leap for BGP Security Yossi Gilad (Hebrew University) Joint work with Avichai Cohen (Hebrew University), Amir Herzberg (Bar.
1 SENSS Security Service for the Internet Jelena Mirkovic (USC/ISI), Minlan Yu (USC), Ying Zhang (HP Labs), Sivaram Ramanathan (USC)
Authors – Johannes Krupp, Michael Backes, and Christian Rossow(2016)
DNS security.
Are We There Yet? On RPKI Deployment and Security
COS 561: Advanced Computer Networks
BGP Multiple Origin AS (MOAS) Conflict Analysis
COS 561: Advanced Computer Networks
BGP Security Jennifer Rexford Fall 2018 (TTh 1:30-2:50 in Friend 006)
Presentation transcript:

1 SENSS Security Service for the Internet Jelena Mirkovic USC Information Sciences Institute Joint work with Minlan Yu (USC), Ying Zhang (HP Labs) and Abdulla Alwabel (USC)

Motivation and Insights 2

Growing DDoS Attacks* 3 2/3 rd of respondents have experienced at least one DDoS attack Frequent and large *source Arbor Networks

Growing BGP Prefix Hijacking* In 2013, hijacking affected 1,500 prefixes, in 150 cities Live interception attacks are on for more than 60 days Traffic from major companies, govs, ISPs diverted 4 *source Renesys

Attack Variants DDoS BGP prefix hijacking – Announce V’s prefix (origin) or short AS path (closeness) – Blackholing (drop traffic) or interception (sniff or modify then forward to V) 5 Direct floodReflectorCrossfire

Main Challenge The best locations for diagnosis and mitigation are often far from the victim – Victim cannot observe nor control traffic and routes at these locations Example: Reflector attack – Public servers see spoofed requests but don’t know/care that they are spoofed – Victim has a challenge to separate legitimate from attack traffic – Attack must be filtered upstream due to high volume Example: Prefix hijacking – Networks far from victim accept and propagate route Mitigation should involve remote ISPs – Today: sustaining attacks not fixing the problems 6

What If the Victim Could … … observe own traffic – Going to it – Carrying sources from its prefixes … observe own routes – For its prefixes … control own traffic – Filter, allow, request bw guarantee … control own routes – Demote a route that may contain a hijacker or correct it 7 In any willing ISP (even non-neighbor)! Aligns control with ownership of traffic/routes Must be able to verify ownership of prefix

SENSS 8

Operation Victim identifies ISPs to interact with using public SENSS directory – Sends to each a query – ISPs authenticate prefix ownership, process query, charge the victim and return replies Victim decides which control actions to apply and where – Sends messages about this to chosen ISPs – ISPs authenticate prefix ownership, charge the victim, implement requested actions 9

Key Design Decisions 1.Simple actions at ISPs, intelligence at victim 2.Direct victim-remote ISP communication Benefits – Incentives for ISPs (easy implementation) – Efficiency in sparse deployment – Robustness to misbehavior – Custom and evolvable attack handling 10

Comparison With State of Art 11

APIs at ISPs Exposed as Web services – Leverage existing functionalities for robustness (replication), security (HTTPS), charging (e-commerce) 12 Tag = neighbor’s AS number (+ geolocation)

Security RPKI to verify prefix ownership TLS for communication security Enabling communication during attacks – Victim may be flooded or its prefixes hijacked Cannot receive replies, may not be able to send messages – Offload victim functionality to a proxy in another network Use ROA to delegate prefix ownership May set up proxies as backup service Proxy monitors the victim operation, turns on 13

Using SENSS To Diagnose and Mitigate Attacks just examples victim can design custom programs 14

Direct Floods If there is TCP/IP signature – Send traffic filter messages to ISPs If there is no TCP/IP signature – Send traffic queries to ISPs with victim’s prefix (before and during attacks) – Identify AS-AS links from replies that Used to carry little or no traffic to the victim (threshold α) Now carry a lot of traffic to the victim – Send traffic filter messages to ISPs for these AS-AS links – Works for attacks that deploy IP spoofing Iteratively deploy filters until attack below goal 15

Direct Floods 16

Reflector Attacks NAT all outgoing requests for port S (e.g., 53) using a range of ports [a,b] Send two control messages to each ISP – Allow traffic to IP of NAT, from port S to ports [a,b] – Drop all other traffic from port S to victim’s prefixes Can change [a,b] dynamically 17

Interception RPKI takes care of origin attacks For closeness attacks – Find an affected source s – Ask s for its AS path to V - CPPS – Send traffic queries to ISPs on and off path – DPPS – Find segments that appear in CPPS but not in DPPS – Send demote or mod messages to polluted ISPs BGP realizes attack route is longer, reverts to good route 18

Interception 19

Evaluation 20

Simulation On AS topology – Using a month’s worth of data from RouteViews Several partial deployment scenarios – On small ISPs – On mix of small, tier 2 and tier 1 ISPs (70:25:5 ratio) – Up to 200 ASes (~ 0.5% of the Internet, 15x fewer than Ases currently deploying RPKI) Legitimate traffic (for DDoS w sig) – Edgecast (all POPs) Attacker distribution – UCSD (two attacks by Storm botnet in 2007) – BARS (sources of attacks from 8 months in 2013) 21

DDoS: Reflection and Flood with Signature 22

DDoS: Flood without Signature 23

Hijacking: Blackholing and Interception 24

Deployment Considerations 25

Privacy and Policy SENSS does not reveal sensitive info about ISP’s business Routing info is already public Traffic distribution per neighbor can be anonymized or aggregated – For DDoS w/o sig we need traffic volume but not AS identity in tags; tags can be anonymized – For blackholing/interception we need aggregate (IN/OUT) traffic and AS identities ISPs can refuse to render services at will – For policy reasons or if too many queries by the same customer 26

Charging Fixed price or per service rendered Each ISP can come up with their own price per service When under attack the victim can register for SENSS service with an ISP on demand – Our Web service implementation enables this – No prior trust needed 27

Misbehaving ISPs 28 For many scenarios the effect of lying is the same as if the liar is legacy AS Attacker can only delay detection and response but cannot subvert them ISP may charge for control actions and not perform them Victim can monitor for this; avoid non-performing ISPs

Conclusions 29

Conclusions Distributed attacks not handled well today – Redundancy to sustain attacks. Cost is still high and attack traffic still clogs the Internet – Smaller businesses can be affected for days SENSS can detect and mitigate distributed attacks in very sparse deployment – Good effectiveness, low cost, simple to deploy – Source of revenue for ISPs Ultimately it is about changing a culture – Adding APIs to ISPs can be useful for many purposes 30

Thanks for coming! Reach out if interested 31 Jelena MirkovicMinlan YuYing ZhangAbdulla Alwabel