how secure are secure how secure are secure interdomain
play

How Secure are Secure How Secure are Secure Interdomain Routing - PowerPoint PPT Presentation

DIMACS Workshop On Secure Routing March 10, 2010 How Secure are Secure How Secure are Secure Interdomain Routing Protocols? Interdomain Routing Protocols? $ $ Sharon Goldberg Microsoft Research & Boston University y Michael Schapira


  1. DIMACS Workshop On Secure Routing March 10, 2010 How Secure are Secure How Secure are Secure Interdomain Routing Protocols? Interdomain Routing Protocols? $ $ Sharon Goldberg Microsoft Research & Boston University y Michael Schapira Pete Hummon Jennifer Rexford Princeton University Yale & Berkeley Princeton Princeton

  2. Overview Today Internet routing is surprisingly insecure Today Internet routing is surprisingly insecure Today, Internet routing is surprisingly insecure Today, Internet routing is surprisingly insecure Decade of research on secure routing protocols • Our Goal: Compare the effectiveness of these protocols. Our Goal: Compare the effectiveness of these protocols. Each has a different set of security properties Each has a different set of security properties. • • How well do they prevent traffic attraction attacks? • Our approach: Evaluate via simulation on real data. Our approach: Evaluate via simulation on real data. Data: Map of Internet & business relationships Data: Map of Internet & business relationships • • … both [CAIDA] and [UCLA Cyclops] • $ • We use a (standard) model of routing policies We use a (standard) model of routing policies • … based on the Gao-Rexford conditions

  3. BGP: The Internet’s Routing Protocol (1a) BGP The Border Gateway Protocol (BGP) sets up paths The Border Gateway Protocol (BGP) sets up paths from Autonomous Systems (ASes) to destination IP addresses. $ $ Init 7 AG Verizon peer UPC peer Zurich IP Prefix provider 43284 20984 Prefer customer paths customer $ over peer paths over provider paths p p A model of routing policies: A model of routing policies: • Prefer cheaper paths. Then, prefer shorter paths.

  4. BGP: The Internet’s Routing Protocol (1b) BGP The Border Gateway Protocol (BGP) sets up paths The Border Gateway Protocol (BGP) sets up paths from Autonomous Systems (ASes) to destination IP addresses. $ $ $ $ Init 7 AG Verizon UPC Zurich IP Prefix $ $ 43284 $ $ 20984 Prefer customer paths $ over peer paths over provider paths p p A model of routing policies: A model of routing policies: • Prefer cheaper paths. Then, prefer shorter paths.

  5. BGP BGP: The Internet’s Routing Protocol (2) The Border Gateway Protocol (BGP) sets up paths The Border Gateway Protocol (BGP) sets up paths from Autonomous Systems (ASes) to destination IP addresses. UPC, Prefix UPC, Prefix Init 7 AG Verizon UPC Zurich IP Prefix Init 7, UPC, Prefix $ $ 43284 Verizon, UPC, Prefix 20984 43284, Init 7, UPC, Prefix A model of routing decisions: A model of routing decisions: • Prefer cheaper paths. Then, prefer shorter paths.

  6. BGP: The Internet’s Routing Protocol (3) BGP The Border Gateway Protocol (BGP) sets up paths The Border Gateway Protocol (BGP) sets up paths from Autonomous Systems (ASes) to destination IP addresses. Init 7 AG Verizon UPC Zurich IP Prefix $ $ 43284 Losing $$ Losing $$ Losing $$ Losing $$ 20984 20984,Verizon, UPC, Prefix A model of routing decisions: A model of routing decisions: • Prefer cheaper paths. Then, prefer shorter paths. • Only carry traffic if it earns you money.

  7. This talk Part 1: A model of Part 1: A model of Interdomain Interdomain Routing Routing $ Part 2: Secure Routing Protocols and Attacks Part 2: Secure Routing Protocols and Attacks Plain BGP Plain BGP Origin Authentication Origin Authentication Secure BGP Secure BGP Interlude: Finding the Optimal Attack Interlude: Finding the Optimal Attack Defensive Defensive Filtering Defensive Defensive Filtering Filtering Filtering Interlude: Attract more by announcing less Interlude: Attract more by announcing less Part 3: Results and Implications Part 3: Results and Implications

  8. Traffic Attraction Attacks (1) Attacker wants max number of ASes to route thru its network. Attacker wants max number of ASes to route thru its network. (For eavesdropping, dropping, tampering, … ) UPC, Prefix Init 7 AG Verizon UPC Zurich $ $ ? ? IP Prefix $ $ 43284 20984, Prefix 20984 20984 A model of routing decisions: A model of routing decisions: • Prefer cheaper paths. Then, prefer shorter paths. • Only carry traffic if it earns you money.

  9. Traffic Attraction Attacks (2) Attacker wants max number of ASes to route thru its network. Attacker wants max number of ASes to route thru its network. (For eavesdropping, dropping, tampering, … ) UPC, Prefix Init 7 AG Verizon UPC Zurich $ $ ? ? IP Prefix $ $ 43284 20984, Prefix 20984 20984 A model of routing decisions: A model of routing decisions: • Prefer cheaper paths. Then, prefer shorter paths. • Only carry traffic if it earns you money.

  10. Traffic Attraction Attacks (3) Attacker wants max number of ASes to route thru its network. Attacker wants max number of ASes to route thru its network. (For eavesdropping, dropping, tampering, … ) UPC, Prefix UPC, Prefix Init 7 AG Verizon UPC Zurich $ $ ? ? 43284, 20984, IP Prefix Prefix $ $ 43284 20984, Prefix 20984 Prefix 20984, Prefix 20984 20984 A model of routing decisions: A model of routing decisions: • Prefer cheaper paths. Then, prefer shorter paths. • Only carry traffic if it earns you money.

  11. Traffic Attraction Attacks (4) Attacker wants max number of ASes to route thru its network. Attacker wants max number of ASes to route thru its network. (For eavesdropping, dropping, tampering, … ) UPC, Prefix UPC, Prefix Init 7 AG Verizon UPC Zurich ? ? 43284, 20984, IP Prefix Prefix 43284  20984, Prefix 20984 Prefix 20984, Prefix 20984 20984 A model of routing decisions: A model of routing decisions: • Prefer cheaper paths. Then, prefer shorter paths. • Only carry traffic if it earns you money.

  12. Traffic Attraction Attacks (5) Attacker wants max number of ASes to route thru its network. Attacker wants max number of ASes to route thru its network. (For eavesdropping, dropping, tampering, … ) UPC, Prefix UPC, Prefix Init 7 AG Verizon UPC Zurich IP Prefix Simulations Simulations 43284  show he show he attracts 62% attracts 62% attracts 62% attracts 62% 20984 20984 of Internet! of Internet! A model of routing decisions: A model of routing decisions: • Prefer cheaper paths. Then, prefer shorter paths. • Only carry traffic if it earns you money.

  13. Security Mechanism: Origin Origin Authentication Authentication (1) Origin Authentication: A secure database that maps g p IP Prefixes to their owner ASes. UPC, Prefix Init 7 AG Verizon UPC Zurich IP Prefix 43284 20984, UPC, Prefix 20984 20984 Smart Attack Strategy: Smart Attack Strategy: Announce the shortest path Announce the shortest path I can get away with to all my neighbors! I can get away with to all my neighbors!

  14. Security Mechanism: Origin Origin Authentication Authentication (2) Origin Authentication: A secure database that maps g p IP Prefixes to their owner ASes. UPC, Prefix Init 7 AG Verizon UPC Zurich $ $ ? ? IP Prefix $ $ 43284 20984, UPC, Prefix 20984 20984 Smart Attack Strategy: Smart Attack Strategy: Announce the shortest path Announce the shortest path I can get away with to all my neighbors! I can get away with to all my neighbors!

  15. Security Mechanism: Origin Origin Authentication Authentication (3) Origin Authentication: A secure database that maps g p IP Prefixes to their owner ASes. UPC, Prefix Init 7 AG Verizon UPC Zurich $ $ ? ? IP Prefix $ $ 43284 20984, UPC, Prefix 20984 20984 Smart Attack Strategy: Smart Attack Strategy: Announce the shortest path Announce the shortest path I can get away with to all my neighbors! I can get away with to all my neighbors!

  16. Security Mechanism: Origin Origin Authentication Authentication (4) Origin Authentication: A secure database that maps g p IP Prefixes to their owner ASes. UPC, Prefix UPC, Prefix Init 7 AG Verizon UPC Zurich 43284, 20984, IP Prefix UPC, Prefix 43284 20984, UPC, Prefix 20984 UPC Prefix 20984, UPC, Prefix 20984 20984 Smart Attack Strategy: Smart Attack Strategy: Announce the shortest path Announce the shortest path I can get away with to all my neighbors! I can get away with to all my neighbors!

  17. Security Mechanism: Origin Origin Authentication Authentication (5) Origin Authentication: A secure database that maps g p IP Prefixes to their owner ASes. UPC, Prefix UPC, Prefix Init 7 AG Verizon UPC Zurich 43284, 20984, IP Prefix UPC, Prefix 43284 20984, UPC, Prefix 20984 UPC Prefix 20984, UPC, Prefix 20984 20984 Smart Attack Strategy: Smart Attack Strategy: Announce the shortest path Announce the shortest path I can get away with to all my neighbors! I can get away with to all my neighbors!

  18. Security Mechanism: Origin Origin Authentication Authentication (6) Origin Authentication: A secure database that maps g p IP Prefixes to their owner ASes. Init 7 AG Verizon UPC Zurich IP Prefix Simulations Simulations 43284 show he show he attracts 58% attracts 58% attracts 58% attracts 58% 20984 20984 of Internet! of Internet! Smart Attack Strategy: Smart Attack Strategy: Announce the shortest path Announce the shortest path I can get away with to all my neighbors! I can get away with to all my neighbors!

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend