artemis neutralizing bgp hijacking within a minute
play

ARTEMIS: Neutralizing BGP Hijacking within a Minute Alberto - PowerPoint PPT Presentation

ARTEMIS: Neutralizing BGP Hijacking within a Minute Alberto Dainotti alberto@caida.org Center for Applied Internet Data Analysis University of California, San Diego Joint work with: Pavlos Sermpezis, Vasileios Kotronis, Petros


  1. ARTEMIS: Neutralizing BGP 
 Hijacking within a Minute Alberto Dainotti 
 alberto@caida.org Center for Applied Internet Data Analysis University of California, San Diego Joint work with: 
 Pavlos Sermpezis, Vasileios Kotronis, 
 Petros Gigis, Xenofontas Dimitropoulos, 
 Danilo Cicalese, Alistair King w w w . cai da. or g

  2. BGP HIJACKING stealing/manipulating your routes oAS (your network) Other AS (remote users) Center for Applied Internet Data Analysis 
 Foundation for Research and Technology-Hellas 
 University of California San Diego University of Crete, 2 w w w . cai da. or g

  3. BGP HIJACKING stealing/manipulating your routes BAD_AS oAS (your network) simple hijack Polluted AS (remote users) Center for Applied Internet Data Analysis 
 Foundation for Research and Technology-Hellas 
 University of California San Diego University of Crete, 3 w w w . cai da. or g

  4. BGP HIJACKING stealing/manipulating your routes BAD_AS oAS (your network) man-in-the-middle Polluted AS (MITM) hijack (remote users) Center for Applied Internet Data Analysis 
 Foundation for Research and Technology-Hellas 
 University of California San Diego University of Crete, 4 w w w . cai da. or g

  5. MANDATORY SLIDE WITH NEWS HEADLINES, DATES, 
 BIG NAMES, … Place here your favorite recent headline Place here your favorite recent headline Place here your favorite recent headline Center for Applied Internet Data Analysis 
 Foundation for Research and Technology-Hellas 
 University of California San Diego University of Crete, 5 w w w . cai da. or g

  6. SOLUTIONS IN USE (1/2) Proactive: RPKI • Only 8% of prefixes covered by ROAs [1] 
 complexity / risk of failures 26.7% processing overhead 13.3% • Why? → limited adoption & 
 29.3% OPEX costs costs/complexity [2] 
 18.7% CAPEX costs little security benefit 21.3% • Does not protect the network against 
 not widely adopted 40% all attack types 
 0 10 20 30 40 50 percentage of answers % Reasons for not using RPKI [2] RPKI in your (b) Q12: If no (in Q11), what are the (c) [1] NIST. RPKI Monitor https://rpki-monitor.antd.nist.gov /. May 2018 [2] P. Sermpezis, et. al., " A survey among Network Operators on BGP Prefix Hijacking ", in ACM SIGCOMM CCR, Jan 2018. Center for Applied Internet Data Analysis 
 Foundation for Research and Technology-Hellas 
 University of California San Diego University of Crete, 6 w w w . cai da. or g

  7. 
 SOLUTIONS IN USE (2/2) Reactive: 3rd Party Services • Comprehensiveness : detect only 40 35 simple attacks 32.1% percentage of answers % 30 • Accuracy : prone to false positives (FP) & 25% 25 false negatives (FN) 20 • Speed : manual verification & then manual 14.3% 14.3% 14.3% 15 mitigation 10 • Privacy : need to share private info, 5 routing policies, etc. 0 <1m <15m <1h <24h >24h How much time an operational 
 (f) Q10: If your organization was a network was affected by a hijack [2] [2] P. Sermpezis, et. al., " A survey among Network Operators on BGP Prefix Hijacking ", in ACM SIGCOMM CCR, Jan 2018. Center for Applied Internet Data Analysis 
 Foundation for Research and Technology-Hellas 
 University of California San Diego University of Crete, 7 w w w . cai da. or g

  8. ARTEMIS self-managed detection & mitigation BGP Monitors: - RIPE RIS ARTEMIS - BGPStream -- Live ARTEMIS -- Historical - Local (exaBGP) MONITORING DETECTION MITIGATION Operator Configuration File your AS Center for Applied Internet Data Analysis 
 Foundation for Research and Technology-Hellas 
 University of California San Diego University of Crete, 8 w w w . cai da. or g

  9. A VIEW SHIFT.. ..and suddenly everything makes sense 3rd Party ARTEMIS • Evasion • Evasion • Covers all attack configurations • Detect only simple attacks • Accuracy • Accuracy • 0% FP, 0% FN: for most attacks • Potential for lots of FPs • 0% FN for the remaining ones • or alternatively lots of FNs • Speed (or manage FP-FN trade-off) • Speed • Manual verification & 
 • Automated mitigation: then manual mitigation • Privacy neutralize attacks in a minute • Privacy & Flexibility • Need to share private 
 • full privacy information Center for Applied Internet Data Analysis 
 Foundation for Research and Technology-Hellas 
 University of California San Diego University of Crete, 9 w w w . cai da. or g

  10. PUBLIC MONITORING INFRASTRUCTURE enables visibility of all significant events 1 type 0 type 1 type ≥ 2 Fraction of invisible events 0.8 0.6 0.4 • In the paper: 0.2 • by type of service • Impact 0 • Speed 0 − 1% 1 − 2% 2 − 100% Impact: Percentage of polluted ASes Center for Applied Internet Data Analysis 
 Foundation for Research and Technology-Hellas 
 University of California San Diego University of Crete, 10 w w w . cai da. or g

  11. BGP HIJACKING TAXONOMY 3 dimensions • 1) Based on how the “attacking” AS Path looks like • Type 0 hijack: <prefix: …, BAD_AS > (a.k.a. “prefix origin hijack”) • Type 1 hijack: <prefix: …, BAD_AS , oAS> • Type 2 hijack: <prefix: …, BAD_AS , AS1,oAS> • … • Type N hijack: <prefix: …, BAD_AS , … AS1, oAS> • Type U hijack: <prefix: unaltered_path> 
 • 2) Based on the prefix announced: exact , sub-prefix , or squatting 
 • 3) Based on what happens on the data-plane: Black Holing ( BH ), Imposture ( IM ), Man in the Middle ( MM ) Center for Applied Internet Data Analysis 
 Foundation for Research and Technology-Hellas 
 University of California San Diego University of Crete, 11 w w w . cai da. or g

  12. ATTACK COVERAGE ARTEMIS vs previous literature TABLE 1: Comparison of BGP prefix hijacking detection systems/services w.r.t. ability to detect different classes of attacks. Class of Hijacking Attack Control-plane System/Service Data-plane System/Service Hybrid System/Service Affected AS-PATH Data ARTEMIS Cyclops PHAS iSpy Zheng et al. HEAP Argus Hu et al. prefix (Type) plane (2008) [26] (2006) [41] (2008) [66] (2007) [67] (2016) [57] (2012) [61] (2007) [37] Sub U * � × × × × × × × Sub 0/1 BH � × � × × � � � Sub 0/1 IM � × � × × � × � Sub 0/1 MM � × � × × × × × Sub ≥ 2 BH � × × × × � � � Sub IM � � � ≥ 2 × × × × × Sub MM � ≥ 2 × × × × × × × Exact 0/1 BH � � � � � � × × Exact 0/1 IM � � � × � × × � Exact 0/1 MM � � � × � × × × Exact BH ≥ 2 � × × � × × � � Exact IM ≥ 2 � × × × � × × � Exact MM ≥ 2 � × × × � × × × Center for Applied Internet Data Analysis 
 Foundation for Research and Technology-Hellas 
 University of California San Diego University of Crete, 12 w w w . cai da. or g

  13. ACCURATE DETECTION becomes trivial in most of the cases Hijacking Attack ARTEMIS Detection Prefix AS-PATH Data False False Detection Needed Local Detection (Type) Plane Positives (FP) Negatives (FN) Rule Information Approach Sub-prefix * * None None Config. vs BGP updates Pfx. Sec. 5.2 Squatting * * None None Config. vs BGP updates Pfx. Sec. 5.2 Exact 0/1 * None None Config. vs BGP updates Pfx. + ASN Sec. 5.3 (+ neighbor ASN) Exact ≥ 2 * < 0 . 3 /day for None Past Data vs BGP updates Pfx.+ Past AS links Sec. 5.4 Center for Applied Internet Data Analysis 
 Foundation for Research and Technology-Hellas 
 University of California San Diego University of Crete, 13 w w w . cai da. or g

  14. ACCURATE DETECTION becomes trivial in most of the cases Hijacking Attack ARTEMIS Detection Prefix AS-PATH Data False False Detection Needed Local Detection (Type) Plane Positives (FP) Negatives (FN) Rule Information Approach Sub-prefix * * None None Config. vs BGP updates Pfx. Sec. 5.2 Squatting * * None None Config. vs BGP updates Pfx. Sec. 5.2 Exact 0/1 * None None Config. vs BGP updates Pfx. + ASN Sec. 5.3 (+ neighbor ASN) Exact ≥ 2 * < 0 . 3 /day for None Past Data vs BGP updates Pfx.+ Past AS links Sec. 5.4 > 73% of ASes (bidirectional link) Stage 1 Exact ≥ 2 * None for 63% of ASes < 4% BGP updates Pfx. Sec. 5.4 ( T s 2 = 5 min , (waiting interval, Stage 2 th s 2 > 1 monitors) bidirectional link) hard problem in remaining cases 
 (fake link 2 hops or more from origin 
 + exact prefix hijack) Center for Applied Internet Data Analysis 
 Foundation for Research and Technology-Hellas 
 University of California San Diego University of Crete, 14 w w w . cai da. or g

  15. FAKE LINK (TYPE ≥ 2) HIJACKS Detection: Stage 1 • Triggered when the AS-PATH of a BGP update (for a monitored prefix) contains a N-hop AS-link (N ≥ 2) that is not included in the previously verified AS-links list 
 • Legitimate if this link has been observed in the opposite direction in the AS-links list from monitors and local BGP routers (10 months history). NOW: <your prefix: …, ASX, ASY , oAS> announcement with new link 
 attached to 1-hop neighbor ASY HISTORY: <any prefix: …, ASY, ASX , …> reverse link exists; it was 
 announced by ASY Center for Applied Internet Data Analysis 
 Foundation for Research and Technology-Hellas 
 University of California San Diego University of Crete, 15 w w w . cai da. or g

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend