challenges in inferring spoofed traffic at ixps
play

Challenges in Inferring Spoofed Traffic at IXPs Matthew Luckie - PowerPoint PPT Presentation

Challenges in Inferring Spoofed Traffic at IXPs Matthew Luckie Bradley Huffaker Lucas Mller University of Waikato CAIDA/UC San Diego UFRGS/CAIDA Kc Claffy Marinho Barcellos CAIDA/UC San Diego UFRGS/University of Waikato ACM CoNEXT


  1. Challenges in Inferring Spoofed Traffic at IXPs Matthew Luckie Bradley Huffaker Lucas Müller 
 University of Waikato CAIDA/UC San Diego UFRGS/CAIDA Kc Claffy Marinho Barcellos CAIDA/UC San Diego UFRGS/University of Waikato ACM CoNEXT 2019 — Orlando, Florida, U.S.A. December 9-12, 2019

  2. Broader visibility of networks that 
 do not filter spoofed packets 2

  3. Consequences: 
 spoofed denial-of-service (DoS) attacks 3

  4. Consequences: 
 spoofed denial-of-service (DoS) attacks 3

  5. Consequences: 
 spoofed denial-of-service (DoS) attacks 3

  6. Consequences: 
 spoofed denial-of-service (DoS) attacks 3

  7. IP Spoofing Architectural limitation that provides an attacker with the ability to send packets using spoofed source IP addresses IPv4 header 4

  8. IP Spoofing Architectural limitation that provides an attacker with the ability to send packets using spoofed source IP addresses IPv4 header IETF introduced Best Current Practices (BCPs) recommending that networks block these packets — i.e., implement 
 Source Address Validation (SAV) 4

  9. IP Spoofing Architectural limitation that provides an attacker with the ability to send packets using spoofed source IP addresses IPv4 header IETF introduced Best Current Practices • Compliance with these filtering practices (BCPs) recommending that networks has misaligned incentives block these packets — i.e., implement 
 • Deploying SAV is primarily for the benefit Source Address Validation (SAV) of other networks 4

  10. Remediation and Policy Interventions 5

  11. Remediation and Policy Interventions We need to identify networks lacking SAV deployment, but doing this is challenging at Internet scale 5

  12. Remediation and Policy Interventions We need to identify networks lacking SAV deployment, but doing this is challenging at Internet scale • Definitive method requires an active probing vantage point in each network being tested 5

  13. Remediation and Policy Interventions We need to identify networks lacking SAV deployment, but doing this is challenging at Internet scale • Definitive method requires an active probing vantage point in each network being tested • ~65K independently routed networks CAIDA's 2017 visualization of IPv4 Internet topology at the Autonomous System (AS) level 5

  14. Remediation and Policy Interventions We need to identify networks lacking SAV deployment, but doing this is challenging at Internet scale • Definitive method requires an active probing vantage point in each network being tested • ~65K independently routed networks • Limited feasibility for a comprehensive assessment of Internet spoofing CAIDA's 2017 visualization of IPv4 Internet topology at the Autonomous System (AS) level 5

  15. Remediation and Policy Interventions We need to identify networks lacking SAV deployment, but doing this is challenging at Internet scale • Definitive method requires an active probing vantage point in each network being tested • ~65K independently routed networks • Limited feasibility for a comprehensive assessment of Internet spoofing 700+ Internet Exchange Points (IXP) [PeeringDB, 2019] Broader visibility may lie in the capability to infer lack of SAV compliance from aggregated Internet traffic data 6

  16. our goal design and develop a methodology 
 to identify spoofed traffic crossing an IXP and infer lack of SAV 7

  17. 8

  18. Contributions 9

  19. Contributions 1. Challenges Provide detailed analysis of methodological challenges for inferring spoofed packets at IXPs 9

  20. Contributions 1. Challenges 2. Methodology Provide detailed analysis of Developed a methodology methodological challenges to classify flows, navigating for inferring spoofed through all challenges packets at IXPs identified 9

  21. Contributions 3. Observations 
 1. Challenges 2. Methodology and Lessons Provide detailed analysis of Developed a methodology Used our methodology and methodological challenges to classify flows, navigating compare it with the 
 for inferring spoofed through all challenges state-of-the-art[1] at 
 packets at IXPs identified an IXP in Brazil, 
 reporting our findings [1] Lichtblau et al. Detection, Classification, and Analysis of Inter-domain Traffic with Spoofed Source IP Addresses. In: ACM IMC, 2017. 9

  22. Bird’s Eye View 10

  23. Bird’s Eye View IXP traffic flow data and topology information 10

  24. Bird’s Eye View IXP traffic flow data and valid IP address space topology information per Autonomous System (AS) 10

  25. Bird’s Eye View IXP traffic flow data and valid IP address space topology information per Autonomous System (AS) Classification Pipeline Methodology list of networks with and without SAV, with evidence to support 10

  26. Challenges: Pieces of the Puzzle 11

  27. Challenges: Pieces of the Puzzle 1. Identify Valid Source Address Space 11

  28. Challenges: Pieces of the Puzzle 1. Identify Valid Source Address Space - there is no global registry that contains ground truth 11

  29. Challenges: Pieces of the Puzzle 1. Identify Valid Source Address Space - there is no global registry that contains ground truth - need to infer the set of valid source addresses 
 11

  30. Challenges: Pieces of the Puzzle 1. Identify Valid Source Address Space - there is no global registry that contains ground truth - need to infer the set of valid source addresses 
 2. Tackle IXP Topology and Traffic Visibility Properties 11

  31. Challenges: Pieces of the Puzzle 1. Identify Valid Source Address Space - there is no global registry that contains ground truth - need to infer the set of valid source addresses 
 2. Tackle IXP Topology and Traffic Visibility Properties - understand modern IXP interconnection practices 11

  32. Challenges: Pieces of the Puzzle 1. Identify Valid Source Address Space - there is no global registry that contains ground truth - need to infer the set of valid source addresses 
 2. Tackle IXP Topology and Traffic Visibility Properties - understand modern IXP interconnection practices - implications on visibility of both topology and traffic 11

  33. 1. Identify Valid Source Address Space IP Address 
 Space 12

  34. 1. Identify Valid Source Address Space IP Address 
 Space IETF Reserved 
 Usable Bogons 12

  35. 1. Identify Valid Source Address Space IP Address 
 Space IETF Reserved 
 Usable Bogons Routed Unassigned 12

  36. 1. Identify Valid Source Address Space IP Address 
 Space IETF Reserved 
 Usable Bogons Routed Unassigned Inferred based on BGP data and 
 the links established by each AS 12

  37. 1. Identify Valid Source Address Space IP Address 
 Space IETF Reserved 
 Usable Bogons Routed Unassigned Inferred based on BGP data and 
 Customer Cones the links established by each AS Define the set of ASes a given AS can reach through its customers 12

  38. 2. Tackle IXP Topology and Traffic Visibility Properties Focus on understanding operational complexities of the vantage point AS64505 Prefix-level Customer Cone 168.228.252.0/22 200.17.80.0/20 200.132.59.0/24 200.236.32.0/19 200.19.0.0/21 200.238.0.0/18 IXP … 13.32.136.2/23 52.216.180/24 75.2.82.0/24 161.38.206.0/23 216.137.62.0/24 … Amazon’s AS Prefix-level Customer Cone 13

  39. 2. Tackle IXP Topology and Traffic Visibility Properties Focus on understanding operational complexities of the vantage point AS64505 Prefix-level Customer Cone 168.228.252.0/22 200.17.80.0/20 200.132.59.0/24 200.236.32.0/19 200.19.0.0/21 200.238.0.0/18 IXP … 13.32.136.2/23 52.216.180/24 75.2.82.0/24 161.38.206.0/23 216.137.62.0/24 … Amazon’s AS Prefix-level Customer Cone 13

  40. 2. Tackle IXP Topology and Traffic Visibility Properties IXP switching fabric #X Legend: Core Switch Switch 14

  41. 2. Tackle IXP Topology and Traffic Visibility Properties IXP switching fabric #X Legend: CF #1 Core Switch CF #2 Switch Physical connection CF: Colocation Facility CF #3 CF #4 15

  42. 2. Tackle IXP Topology and Traffic Visibility Properties IXP switching fabric #X Legend: CF #1 Core Switch CF #2 Switch AS A AS B Physical connection AS C AS D Physical connection and VLAN configured to neighbor CF: Colocation Facility Autonomous AS Z System CF #3 CF #4 16

  43. 2. Tackle IXP Topology and Traffic Visibility Properties IXP switching fabric #X Legend: CF #1 Core Switch CF #2 Switch AS A AS B Physical connection AS C AS D Physical connection and VLAN configured AS E to neighbor AS F Res J CF: Colocation Facility AS G AS H Autonomous AS Z Res Z Reseller System CF #3 CF #4 Reseller-Tag: Stacked VLAN (IEEE 802.1q, QinQ) IXP-Tag: 17

  44. 2. Tackle IXP Topology and Traffic Visibility Properties IXP switching fabric #X Legend: CF #1 Core Switch CF #2 Switch AS A AS B Physical connection AS C AS D Physical connection and VLAN configured AS E to neighbor AS F Res J CF: Colocation Facility AS G AS H Autonomous AS Z Res Z Reseller System CF #3 CF #4 Reseller-Tag: Stacked VLAN (IEEE 802.1q, QinQ) IXP-Tag: IXP switching fabric #Y CF #5 Core Switch CF #6 AS E 18

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend