Internet Control Plane Security Yongdae Kim KAIST Two Planes Data - - PowerPoint PPT Presentation

internet control plane security
SMART_READER_LITE
LIVE PREVIEW

Internet Control Plane Security Yongdae Kim KAIST Two Planes Data - - PowerPoint PPT Presentation

Internet Control Plane Security Yongdae Kim KAIST Two Planes Data Plane: Actual data delivery Control Plane To support data delivery (efficiently, reliably, and etc.) Routing information exchange In some sense, every protocol


slide-1
SLIDE 1

Internet Control Plane Security

Yongdae Kim KAIST

slide-2
SLIDE 2

Two Planes

Data Plane: Actual data delivery Control Plane

▹To support data delivery (efficiently, reliably, and

etc.)

▹Routing information exchange ▹In some sense, every protocol except data delivery is

considered to be control plane protocols

Example network

▹Peer-to-peer network, Cellular network, Internet, …

2

slide-3
SLIDE 3

Historical List of Botnet

Cr Creat ation Na Name # of

  • f Bot

Bots Spam am Cont Control 2004 Bagle 230K 5.7 B/day Centralized 2007 Storm > 1,000K 3 B/day P2P 2008 Mariposa 12,000K ? Centralized 2008 Waledac 80K ? Centralized 2008 Conficker >10,000K 10 B/day Ctrlzd/P2P 2009? Mega-D 4,500K 10 B/day Centralized 2009? Zeus >3,600K ? 2009 BredoLab 30,000K 3.6 B/day Centralized 2010 TDL4 4,500K ? P2P

slide-4
SLIDE 4

Misconfigurations and Redirection

 1997: AS7007

▹ Claimed shortest path to the whole

Internet

▹ Causing Internet Black hole

 2004: TTNet (AS9121)

▹ Claimed shortest path to the whole

Internet

▹ Lasted for several hours

 2006: AS27056

▹ "stole" several important prefixes on

the Internet

▹ From Martha Stewart Living to The

New York Daily News

 2008: Pakistan Youtube

▹ decided to block Youtube ▹ One ISP advertised a small part of

YouTube's (AS 36561) network

 2010: China

▹ 15% of whole Internet traffic was routed

through China for 18 minutes

▹ including .mil and .gov domain

 2011: China

▹ All traffic from US iPhone to Facebook ▹ routed through China and Korea

slide-5
SLIDE 5

3ooGbps DDoS

300 Gbps DDoS against Spamhous from Stophous Mitigation by CloudFlare using anycast Stophous turn targets to IX (Internet Exchange) Korea – World IX Bandwidth

▹KT: 560 Gbps, SKB: 235 Gbps, LGU+: 145 Gbps, SKT: 100

Gbps

▹Total: 1 Tbps

5

slide-6
SLIDE 6

How to Crash (or Save) the Internet?

Max Schuchard, Eugene Vasserman, Abedelaziz Mohaisen, Denis Foo Kune, Nicholas Hopper, Yongdae Kim

slide-7
SLIDE 7

Hi His thes thesis: : How How to to cra rash the the Inte nternet – St

Star ar Tri Tribune

The The cyb yberweapo pon that that could ld take take dow

  • wn the

the inte nternet et – New

New Sc Scien entis ist

Boff

  • ffin

ins devi evise 'cy cyberweapo pon' ' to to take take dow

  • wn int

nternet – The

The Reg egis ister

Pro

  • Prof. Say

Says New New Cyb Cyberweapo pon Coul uld d Take Take Down the the Inte ternet – CBS Ho How to to cras rash the the Inte nternet et – ZD

ZDNe Net

Losing Control l of the In Internet

  • Usin

ing the Data Pla lane to Attack the Control l Pla lane –

Net etwork and d Di Dist stributed Sy Syst stem Se Securit ity (N (NDSS) ) 2011 011

slide-8
SLIDE 8

Shutting Down the Internet

Fast propagating worm

▹CodeRed, Slammer Worm

Router misconfiguration

▹AS7007

2011

▹Egypt, Libya: Internet Kill Switch ▹US government discussing Internet Kill Switch Bill in

emergency situation

slide-9
SLIDE 9

Other Internet Control Plane News

 April 2008: Whole youtube traffic directed to Pakistan  April 2010: 15% of whole Internet traffic was routed

through China for 18 minutes (including .mil and .gov domain)

 March 2011: All traffic from US iPhone to Facebook was

routed through China and Korea

slide-10
SLIDE 10

Losing Control

Attack on the Internet's control plane Overwhelm routers with BGP updates Launched using only a botnet Defenses are non trivial Different from DDoS on web servers

slide-11
SLIDE 11

Attack Model

No router compromise or misconfiguration

▹BGPSEC or similar technologies

Our attack model: Unprivileged adversary

▹can generate only data plane events ▹does not control any BGP speakers ▹botnet of a reasonable size

»50, 100, 250, 500k nodes

11

slide-12
SLIDE 12

Can we shut down the Internet only using data plane events?

How much control plane events can be generated by data plane events caused by coordinated set of compromised computers?

slide-13
SLIDE 13

AS, BGP and the Internet

 AS (Autonomous System)

▹ Core AS: High degree of connectivity ▹ Fringe AS: very low degrees of connectivity, sitting at the outskirts of

the Internet

▹ Transit AS: core ASes, which agree to forward traffic to and from other

Ases

 BGP (Border Gateway Protocol)

▹ the de facto standard routing protocol spoken by routers connecting

different ASes.

▹ BGP is a path vector routing algorithm, allowing routers to maintain a

table of AS paths to every destination.

▹ uses policies to preferentially use certain AS paths in favor.

slide-14
SLIDE 14

1.0.0.0/8

DST: 1.0.0.0/8 Path: A DST: 1.0.0.0/8 Path: B, A DST: 1.0.0.0/8 Path: C, A A B C D E DST: 1.0.0.0/8 Path: D, B, A DST: 1.0.0.0/8 Path: E, C, A

slide-15
SLIDE 15

1.0.0.0/8

A B C D E DST: 1.0.0.0/8 Path: B, A DST: 1.0.0.0/8 Path: C, A DST: 1.0.0.0/8 Path: D, B, A DST: 1.0.0.0/8 Path: E, B, A DST: 1.0.0.0/8 Path: B, C, A DST: 1.0.0.0/8 Path: D, C, A DST: 1.0.0.0/8 Path: E, C, A

slide-16
SLIDE 16

1.0.0.0/8

A B C D E DST: 1.0.0.0/8 Path: B, A DST: 1.0.0.0/8 Path: C, A DST: 1.0.0.0/8 Path: D, B, A DST: 1.0.0.0/8 Path: E, B, A DST: 1.0.0.0/8 Path: B, C, A DST: 1.0.0.0/8 Path: D, C, A DST: 1.0.0.0/8 Path: E, C, A

slide-17
SLIDE 17

B C D E UPD PDATE! UPD PDATE! UPD PDATE! UPD PDATE!

How does the attacker pick links? How does the attacker direct traffic?

slide-18
SLIDE 18

A B C D E {DB, DBA, DBAC, DBE} {EB, EBA, EBAC, EBD} {CA, CB, CD, CE} {AB, AC, ABE, ABD} {BA, BC, BD, BE} CB BC

8 7 7 2 4 1 1

CB(e) = sst(e) sst

s¹tÎV

å

CB(e) = pathst(e)

s¹tÎV

å

slide-19
SLIDE 19

A B C D E {DB, DBA, DBAC, DBE} {EB, EBA, EBAC, EBD} {CA, CB, CD, CE} {AB, AC, ABE, ABD} {BA, BC, BD, BE}

8 7 7 2 4 1 1

slide-20
SLIDE 20

A B C D E

Sp Spread attack flow lows! s!

slide-21
SLIDE 21

A B C

slide-22
SLIDE 22

A B C

One e Targe get per er Attack Flow low!

slide-23
SLIDE 23

Simulation Overview

Simulator to model network dynamics

▹Topology generated from the Internet

Routers fully functional BGP speakers Bot distribution from Waledac Bandwidth model worst case for attacker

slide-24
SLIDE 24

10 20 30 40 50 60 70 80 90 100 Targeted Last mile Critical Percent of failed links

Targeted link: Any link selected for disruption Last mile links: un-targeted links that connect fringe ASes to the rest of the network Transit link: Any link that does not fit the other two

slide-25
SLIDE 25

Factors of Normal Load

0.0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1.0 500 1000 1500 2000 2500 3000 CDF Factors of normal load 64k Nodes 125k Nodes 250k Nodes 500k Nodes

slide-26
SLIDE 26

0.0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1.0 200 400 600 800 1000 1200 CDF 1000’s of messages per 5-seconds 64k Nodes 125k Nodes 250k Nodes 500k Nodes

90th percentile of of message loads experienced by routers under attack

slide-27
SLIDE 27

Core Routers Update Time

0.0 20.0 40.0 60.0 80.0 100.0 120.0 140.0 160.0 180.0 200.0 200 400 600 800 1000 1200 Average Time to Process BGP Updates (mins) Simulated Time (secs) 64k bots 125k bots 250k bots 500k bots

slide-28
SLIDE 28

Possible Defenses

Short Term

Hold ld Tim ime e = Max axIn Int

Long Term

Pe Perfect QOS

slide-29
SLIDE 29

HoldTime = MaxInt

0.0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1.0 500 1000 1500 2000 CDF Factors of normal load 0% 10% 25% 50%

slide-30
SLIDE 30

HoldTime = MaxInt

0.0 20.0 40.0 60.0 80.0 100.0 120.0 200 400 600 800 1000 1200 Average Time to Process BGP Updates (mins) Simulated Time (secs) 0% 10%

slide-31
SLIDE 31

Perfect QoS

Needs to guarantee control packets must be sent

▹Does not guarantee they will be processed due to

  • versubscription

Recommendation

▹(Virtually) Separating control and data plane ▹Sender sides QoS ▹Receiving nodes must process packets in line speed

slide-32
SLIDE 32

Conclusion

Adversarial route flapping on an Internet scale Implemented using only a modest botnet Defenses are non-trivial, but incrementally

deployable

slide-33
SLIDE 33

Future Work (in progress)

Cascaded failure

▹Router failure modeling

Attacks using remote compromised routers

▹Targeted Attack: Internet Kill Switch

Router Design for the Future Internet

▹Software router?

33

slide-34
SLIDE 34

BGP Stress Test

 Routers placed in certain states fail to provide the functionality

they should.

 Unexpected but perfectly legal BGP messages can place routers

into those states

 Any assumptions about the likelyhood of encountering these

messages do not apply under adversarial conditions.

Peer Pressure: Exerting Malicious Influence on Routers at a Distance, Max Schuchard, Christopher Thompson, Nicholas Hopper and Yongdae Kim, ICDCS 2013

slide-35
SLIDE 35

Attacking Neighborhood (Memory)

 How many BGP updates needed to consume 1GB memory?

About 2,000,000 BGP updates is needed to succeed this attack

slide-36
SLIDE 36

Attacking Neighborhood (Memory)

 Distinct/long length AS paths and community attribute

300,000 BGP updates is enough for this attack

slide-37
SLIDE 37

Attacking Neighborhood (CPU)

 Hash collision makes router spend more processing time

slide-38
SLIDE 38

Back Pressure

slide-39
SLIDE 39

Questions?

Yongdae Kim

▹ email: yongdaek@kaist.ac.kr ▹ Home: http://syssec.kaist.ac.kr/~yongdaek ▹ Facebook: https://www.facebook.com/y0ngdaek ▹ Twitter: https://twitter.com/yongdaek ▹ Google “Yongdae Kim”

39