Loca%ngPrefixHijackersusing LOCK TongqingQiu + ,LushengJi * - - PowerPoint PPT Presentation

loca ng prefix hijackers using lock
SMART_READER_LITE
LIVE PREVIEW

Loca%ngPrefixHijackersusing LOCK TongqingQiu + ,LushengJi * - - PowerPoint PPT Presentation

Loca%ngPrefixHijackersusing LOCK TongqingQiu + ,LushengJi * ,DanPei * JiaWang * ,Jun(Jim)Xu + ,HiteshBallani ++ + CollegeofCompu%ng,GeorgiaTech *


slide-1
SLIDE 1

Loca%ng
Prefix
Hijackers
using
 LOCK



Tongqing
Qiu+,
Lusheng
Ji*,
Dan
Pei*
 Jia
Wang*,
Jun
(Jim)
Xu+,
Hitesh
Ballani++


+
 
College
of
Compu%ng,
Georgia
Tech
 * 
AT&T
Lab
–
Research
 ++
 
Department
of
Computer
Science,
Cornell
University



1


slide-2
SLIDE 2

Outline



  • Background
&
Mo%va%on

  • System
Architecture

  • Basic
algorithm
and
improvements

  • Evalua%on

  • Conclusion


2


slide-3
SLIDE 3

Background


3


  • Autonomous


System
(AS)


  • Border
Gateway


Protocol
(BGP)


  • Profit‐driven


policy


AS
B

 AS
E
 AS
D
 AS
A
 AS
C
 I
own
prefix
p!
 AS
Path:
BE
 AS
Path:
ABE
 AS
Path:
DE
 AS
Path:
CBE
 Peer‐Peer
 Customer‐provider
 AS
update
message
 CBE
or
CDE?


slide-4
SLIDE 4

Background
(cont.)


4
 4


AS
B

 AS
E
 AS
D
 AS
A
 AS
C
 AS
Path:
CBE
 Peer‐Peer
 Customer‐provider
 AS
update
message
 I
own
prefix
p!
 AS
Path:
CBA
 AS
Path:
BA


  • BGP
lacks


authen%ca%on


  • Fabricated
AS


announcement


  • Prefix
hijacking

  • blackholing

  • imposture

  • intercep%on


p


slide-5
SLIDE 5

State
of
Art


  • Proac%ve



– Prevent
the
happenings
of
hijacks


  • e.g.
[Kent
et
al.
JSAC
00]
[Aiello
et
al.
CCS
03],
[Subramanian
et
al.


NSDI
04],
[Karlin
et
al.
ICNP
06],
etc.



– Deployment
issues:


  • Rou%ng
infrastructure
modifica%on

  • Difficul%es
of
incremental
deployment

  • PKI
requirement

  • Reac%ve



– Detec%on



  • e.g.
[Lad
et
al.
Usenix
Secuirty
06],
[
Ballani
et
al.
Sigcomm
07],
[
Zheng
et


al.
Sigcomm

07],
[Hu
et
al.
IEEE
S&P
07],
[
Zhang
et
al.
Sigcomm
08],
etc.



– Recovery


  • e.g.
[
Zhang
et
al.
CoNext
07]


5


slide-6
SLIDE 6

A
Complete
and
Automated
Solu%on?


  • Loca%ng
is
important


– Provide
key
informa%on
for
recovery/mi%ga%on


  • Loca%ng
is
not
trivial



– Current
prac%ce


  • Inden%fy
newly
appeared


  • rigin
AS
of
prefix

p


6


Detect 

 Recover
 Locate 

 C
 D
 E
 A
 B
 BA
 CBA
 BAE
 CBAE
 announce
AE
 
p


slide-7
SLIDE 7

System
Architecture
of
LOCK



7


AS
B

 AS
E
 AS
D
 AS
A
 AS
C
 Peer‐Peer
 Customer‐provider
 Input:
Target
prefix
p
 Output:
A
is
the
hijacker!
 p


slide-8
SLIDE 8

Key
Components
of
LOCK


  • Monitor
Selec%on
(from
candidates)


– Maximize
the
likelihood
of
observing
hijacking
 events
on
the
target
prefix
 – Maximize
the
diversity
of
paths
from
monitors
to
 the
target
prefix


  • Loca%ng
Scheme


– Using
AS
path
informa%on
 – Infer
the
hijacker
loca%on
(how?)


8


slide-9
SLIDE 9

Two
key
observa%ons


  • Countermeasure
ability


– The
hijacker
cannot
manipulate
the
por%on
of
AS
path
 from
a
polluted
vantage
point
to
the
upstream
neighbor
AS


  • f
the
hijacker
AS


9


M1
 M2
 M3
 A
 B
 C
 H
 X
 Y
 Z
 T
 D
 T
owns
prefix
p
 AH
 BH
 H

 H

 AX
 BX
 X

 X



slide-10
SLIDE 10

Two
key
observa%ons


  • Convergence:
The
trustworthy
por%on
of

polluted
AS
paths


from
mul%ple
vantage
points
to
a
hijacked
vic%m
AS
prefix
 converge
around
the
hijacker
AS
(based
on
real
AS
topology).



10


M1
 M2
 M3
 A
 B
 C
 H
 X
 Y
 Z
 T
 D
 AH
 BH
 H

 H

 AX
 BX
 X

 X

 converge
at
H
 converge
at
X?
 p


slide-11
SLIDE 11

Basic
Loca%ng
Algorithm


  • Inden%fying
hijacker
search
space


– Neighborset
of
one
AS:
ASes
one‐hop
away
(include
itself)

 – Based
on
exis%ng
AS
topology

 – The
union
of
neighborset
of
all
ASes
on
all
polluted
paths
(why?)
 – The
hijacker
should
be
in
the
space
(based
on
observa%on
1)


  • Ranking
all
ASes
in
the
search
space


– Based
on
observa%on
2
 – The
more
frequently
an
AS
appears,
the
higher
its
ranking
is

 – Tie
breaker:
The
closer
an
AS
to
the
monitors,
the
higher
its
ranking
is



11


slide-12
SLIDE 12

Basic
Loca%ng
Algorithm
Example


12


M1
 M2
 M3
 A
 B
 C
 H
 X
 Y
 Z
 T
 D
 Monitors
 Polluted
AS
PATH
 Neighbor
Set
 Hijacker
List
 M1
 A
X
 (A
H)
(
H
X
Y)
 H

>
(
4
%mes)

 X
>
Y
>
(2
%mes)
 A
=
B
>
C
(once)
 M2
 B
X
 (B
H
C)
(H
X
Y)
 AX
 BX
 X
 X

 p


slide-13
SLIDE 13

Improvements 



  • Search
space
of
basic
algorithm


– Trim
the
suspect
list



  • Improvement
I:
AS
rela%onship



– Basic
algorithm
neighborset

 – Valley
free
 – Trim
the
neighorset
on
“trustworthy”
ASes


  • Improvement
II:
excluding
“innocent”
ASes

  • Two
improvements
may
introduce
false


nega%ve


13


slide-14
SLIDE 14

Evalua%on 



  • Three
sets
of
experiments:


– Simula%ng
synthe%c
prefix
hijacking
events
 – Reconstructed
previous
known
hijacking
events
 – Real
prefix
hijacking
events


14


slide-15
SLIDE 15

Simula%ng
Synthe%c
Prefix
Hijacking
 Events


  • Hijacker
h
and
source
s
from
73
Planetlab
nodes




– hup://www.planet‐lab.org/


  • 451
Target
prefix
t


– Mul%ple
Origin
ASes
(MOAS)
prefix
 – Single
Origin
Ases
with
large
traffic
 – Popular
website
(based
on
Alexa
ranking)


  • Emulate
all
possible
hijacking
events


– Based
on
the
combina%on
of
(s,
h,
t)
 – Imposture,
intercep%on,
and
malicious
(countermeasure)
cases


  • Monitor
selec%on


– From
Planetlab
nodes
 – Based
on
the
target
prefix


15


slide-16
SLIDE 16

Effec%veness
and
Improvement


  • The
accuracy
of
basic
algorithm
is
85%+

  • Combine
both
improvements,
the
accuracy
is


up
to
94.3%


  • False
nega%ve
ra%o
is
rela%vely
low.



16


slide-17
SLIDE 17

Reconstruct
Previously‐known
 Hijacking
Events


7
hijacking
events
 Locate
all
hijackers


17


slide-18
SLIDE 18

Real
Hijacking
Events


18


Internet
 Seaule
 Berkeley
 Piusburgh
 Cornell
 Prefix:
204.9.168.0/22
 vic%m

 hijacker


slide-19
SLIDE 19

Real
Hijacking
Events
(cont.)


19


slide-20
SLIDE 20

Conclusion


  • LOCK
to
locate
prefix
hijacker
ASes


– First
study
of
hijacker
loca%on
problem
 – Locate
the
hijacker
even
when
countermeasures
 are
engaged

 – Extensively
evalua%on
illustrates
high
loca%on
 accuracy
 



20


slide-21
SLIDE 21

Acknowledgement


  • Authors
Tongqing
Qiu
and
Jun
(Jim)
Xu
would


like
to
acknowledge
the
generous
support
 from
the
NSF
CyberTrust
program
(specifically
 CNS
0716423)


21


slide-22
SLIDE 22
  • Thanks
You!

  • Ques%ons


22