Presentation is loading. Please wait.

Presentation is loading. Please wait.

CenterTrack An IP Overlay Network for Tracking Denial-of-Service Floods Robert Stone Internet Security Engineer UUNET Technologies NANOG17 October 5, 1999.

Similar presentations


Presentation on theme: "CenterTrack An IP Overlay Network for Tracking Denial-of-Service Floods Robert Stone Internet Security Engineer UUNET Technologies NANOG17 October 5, 1999."— Presentation transcript:

1 CenterTrack An IP Overlay Network for Tracking Denial-of-Service Floods Robert Stone Internet Security Engineer UUNET Technologies NANOG17 October 5, 1999

2 Copyright 1999, UUNET Technologies2 Problem s Malicious individuals frequently launch Denial-of- Service flood attacks, using bogus source addresses. s Ingress filtering is extremely difficult in large networks. s Tracking DoS attacks is difficult on large networks with high speed, cutting edge, very busy routers.

3 October 5, 1999Copyright 1999, UUNET Technologies3 Definitions s Input debugging is any feature that allows one to determine where packets matching a particular pattern were received as input to a router. s A tracking hop refers to an individual use of input debugging on a router.

4 October 5, 1999Copyright 1999, UUNET Technologies4 Possible Solutions s Hop-by-hop tracking Requires input debugging on every router.Requires input debugging on every router. At most, requires d tracking hops where d = maximum hop diameter of the backbone.At most, requires d tracking hops where d = maximum hop diameter of the backbone. Used by DoSTrackUsed by DoSTrack v a

5 October 5, 1999Copyright 1999, UUNET Technologies5 Possible Solutions s Per-interface traffic flow monitoring. Requires traffic flow monitoring feature at edge.Requires traffic flow monitoring feature at edge. For large networks, requires many data collectors in the field.For large networks, requires many data collectors in the field. LOTS of data!LOTS of data! No “hops”, but collectors must be queried.No “hops”, but collectors must be queried. a v c c c c

6 October 5, 1999Copyright 1999, UUNET Technologies6 Possible Solutions s Hop-by-hop using overlay network Requires input debugging and IP tunnel support on edge routers and special “CenterTrack” routers.Requires input debugging and IP tunnel support on edge routers and special “CenterTrack” routers. Traffic for victim is rerouted through the overlay network.Traffic for victim is rerouted through the overlay network. Never requires more than d t + 1 hops.Never requires more than d t + 1 hops. IP Tunnels v a

7 October 5, 1999Copyright 1999, UUNET Technologies7 Why CenterTrack? s Required features and resources exist today in commercially available router hardware and software. s Requires a relatively small amount of extra hardware. s Also allows for packet capture at smaller number of locations.

8 October 5, 1999Copyright 1999, UUNET Technologies8 Network Map TR1.HUB1TR1.HUB2 XR1.HUB1XR1.HUB2 GW1.HUB1GW2.HUB1GW1.HUB2GW2.HUB2 CT1.HUB1CT1.HUB2 AS 65445 AS 65444 Tunnels Layer 2

9 October 5, 1999Copyright 1999, UUNET Technologies9 Inter-CT Tunnels CT1.HUB1CT1.HUB2 AS 65445 Tunnels Layer 2 AS 65444 OL-Loopback Primary Loopback used for tunnel termination. P-Loopback Overlay Loopback used instead of tunnel interface address

10 October 5, 1999Copyright 1999, UUNET Technologies10 Inter-CT Tunnel Routing CT1.HUB1CT1.HUB2 AS 65445 Tunnels Layer 2 AS 65444 OL-Loopback IBGP IS-IS P-Loopback

11 October 5, 1999Copyright 1999, UUNET Technologies11 CT-to-Edge Tunnels GW1.HUB1 CT1.HUB1 AS 65445 AS 65444 Tunnel Layer 2 OL-Loopback P-Loopback Overlay Loopback Statically Routed Through Tunnel

12 October 5, 1999Copyright 1999, UUNET Technologies12 CT-to-Edge Tunnel Routing GW1.HUB1 CT1.HUB1 AS 65445 AS 65444 Tunnel Layer 2 OL-Loopback P-Loopback Deny all announcements from GW. Announce all local routes except Primary Loopbacks. Accept all routes from CT. Set local pref high. Don’t announce anything. EBGP Session

13 October 5, 1999Copyright 1999, UUNET Technologies13 Using CenterTrack GW1.HUB1GW2.HUB1GW1.HUB2GW2.HUB2 CT1.HUB1CT1.HUB2 AS 65445 AS 65444 Tunnels Layer 2 Victim Static Routes Added

14 October 5, 1999Copyright 1999, UUNET Technologies14 Using CenterTrack GW1.HUB1GW2.HUB1GW1.HUB2GW2.HUB2 CT1.HUB1CT1.HUB2 AS 65445 AS 65444 Tunnels Layer 2 Attacker Victim New Path Through CenterTrack

15 October 5, 1999Copyright 1999, UUNET Technologies15 CenterTrack Design Points s IP tunnels Unaffected by Layer 2 changes.Unaffected by Layer 2 changes. Dynamic routing more difficult.Dynamic routing more difficult. Lack of IP tunnel support on some routers.Lack of IP tunnel support on some routers. s BGP Better administrative control than IGP.Better administrative control than IGP. Less dangerous.Less dangerous.

16 October 5, 1999Copyright 1999, UUNET Technologies16 Scalability Issues 0 20 40 60 80 100 120 140 160 180 200 220 200400600800100012001400160018002000 CT Router Adjacencies Required Edge Routers 10 15 20 30 # of CT Routers 100 Full Mesh

17 October 5, 1999Copyright 1999, UUNET Technologies17 Scalability Issues 0 5000 10000 15000 20000 25000 30000 35000 40000 406080100120140160180200 Limit on # of Edge Routers CT Router Capacity (Adjacencies) Single Full Mesh 2 Level Hierarchy (Single Top Level Router)

18 October 5, 1999Copyright 1999, UUNET Technologies18 Conclusion s CenterTrack disadvantages Still requires input debugging at edge.Still requires input debugging at edge. Not free.Not free. Changes route. (Attackers might notice.)Changes route. (Attackers might notice.) s CenterTrack advantages Eliminates need for transit router input debugging.Eliminates need for transit router input debugging. Required features available.Required features available. Is not too expensive.Is not too expensive. Scales well.Scales well. Is vendor independent, other than input debugging.Is vendor independent, other than input debugging.

19 October 5, 1999Copyright 1999, UUNET Technologies19 Acknowledgements Contributors: Eric Brandwine Clarissa Cook Ken Dahl Vijay Gill Robert Noland Matthew Sibley


Download ppt "CenterTrack An IP Overlay Network for Tracking Denial-of-Service Floods Robert Stone Internet Security Engineer UUNET Technologies NANOG17 October 5, 1999."

Similar presentations


Ads by Google