lightningfilter traffic filtering at 100 gbps
play

LightningFilter: Traffic Filtering at 100 Gbps Presented by: - PowerPoint PPT Presentation

LightningFilter: Traffic Filtering at 100 Gbps Presented by: Benjamin Rothenberger In collaboration with: Prof. Adrian Perrig, Juan Garca Pardo, Dominik Roos, Jonas Gude, Pascal Sprenger, Florian Jacky Project Goals High-speed packet


  1. LightningFilter: Traffic Filtering at 100 Gbps Presented by: Benjamin Rothenberger In collaboration with: Prof. Adrian Perrig, Juan Garcìa Pardo, Dominik Roos, Jonas Gude, Pascal Sprenger, Florian Jacky

  2. Project Goals • High-speed packet processing requires nanosecond operations Example: 64-byte packets @ 100Gbps: ~5ns processing time • • Nanosecond scale key establishment • Nanosecond scale packet authentication • Trivia: how “long” is a nanosecond? Answer: light travels about 30cm in 1ns •

  3. Use Case: Network Error Message Authentication Internet AS A AS B BR BR ! C Client BR ! X Problem: only short time frame AS C BR à Only possible using symmetric cryptography Server S Solution: DRKey!

  4. DRKey • Novel protocol based on symmetric cryptography • Intel AES-NI instructions enable key derivation within ~50 cycles à Nanosecond scale! • Key computation is up to 3 times faster than DRAM lookup! à Computing the key is faster than storing it in memory! à Foundation for many DDOS defense mechanisms

  5. DRKey Performance Factor: ~ 1450x

  6. Lightning Filter Traffic Filtering at 100 Gbps

  7. Overview Internet Border Router normal traffic SCION traffic $$$ Lightning Firewall traffic Standard Firewall Filter Invalid traffic Authenticated traffic

  8. System Design System Metric Exporter Prometheus Control Plane Data Plane Metrics Traffic Source Class. Auth. ............ ............ CONFIG FILE ............ ............ CLI L Administrator Duplicate Rate Supp. Limiting DRKey Mgmt Certificate Server Lightning Filter

  9. Demo Outline 1. Attack scenario Attacker located anywhere in Internet à Source authentication • 2. Bandwidth capacity 120 Gbps traffic volumne • 3. Filtering based on source authentication Alternate between filtering and bypass every 30s • 4. Duplicate suppression 80 Gbps duplicates traffic, 40 Gbps legitimate traffic •

  10. Attack Scenario: Internet Attacker AS A 100 Mbps Internet 100 Mbps 120 Gbps

  11. Attack Scenario: Internet Attacker AS A 100 Mbps Internet LF 100 Mbps X 120 Gbps

  12. Questions?

  13. Backup Slides

  14. DRKey Scenario • Communication between clients and server is authenticated using DRKey • Key derivation for L2 keys is delegated to server Server AS Clients Internet AS AS

  15. DRKey Exchange Demo 1. Client requests the L2 key to communicate to the server from its local CS 2. L1 key has not been prefetched à L1 key exchange 3. Server fetches the derivation secret for its delegation from CS 4. Server then derives the same L2 key locally 5. Do 100 runs and calculate average execution time

  16. DRKey Hierarchy • Key establishment using a multi-level key hierarchy • L0 : per-AS local secret key & per-AS public/private key pair • L1 : AS-level key establishment (typically prefetched!) • L2 : locally derive symmetric keys for end hosts

  17. DRKey Key Exchange L1 key exchange CS CS Fetch Fetch L2 DS Internet key AS A AS B BR BR C S C C 1 Server Clients Locally derive L2 Key

  18. Key Rollover Key Rollover Grace Period Grace Period t + 2 t + 1 t Active Key 𝐸𝑇 # Fetching Key 𝐸𝑇 #$& 0x0: Fetching Key 𝐸𝑇 #$( Key 𝐸𝑇 #$% Active Key 𝐸𝑇 #$% Key 𝐸𝑇 #$% 0x1: Fetching Key 𝐸𝑇 #$' Active Key 𝐸𝑇 #$' Key 𝐸𝑇 #$' 0x2:

  19. Rate Limiting Refill rate Used tokens in last slice allocation for next silce I) aggregate III) distribute II) recompute c0 c2 c3 c1 c0 c1 c2 c3 Data Plane a) Packet processing c0 c2 c3 c1

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend