security mechanisms
play

Security Mechanisms Rahul Hiran , Niklas Carlsson, Nahid Shahmehri - PowerPoint PPT Presentation

Does Scale, Size, and Locality Matter? Evaluation of Collaborative BGP Security Mechanisms Rahul Hiran , Niklas Carlsson, Nahid Shahmehri Linkping University, Sweden 1 Routing attacks increasingly common Each day there are large numbers of


  1. Does Scale, Size, and Locality Matter? Evaluation of Collaborative BGP Security Mechanisms Rahul Hiran , Niklas Carlsson, Nahid Shahmehri Linköping University, Sweden 1

  2. Routing attacks increasingly common Each day there are large numbers of bogus route announcements - e.g., cidr-report.org Among these we have seen many serious attacks ... 2

  3. Routing attacks increasingly common Each day there are large numbers of bogus route announcements - e.g., cidr-report.org Among these we have seen many serious attacks ... 3

  4. Routing attacks increasingly common • List of Bogus route announcements as listed on www.cidr- report.org. Each day there are large numbers of bogus route announcements - e.g., cidr-report.org Among these we have seen many serious attacks ... 4

  5. Routing attacks increasingly common • List of Bogus route announcements as listed on www.cidr- report.org. Each day there are large numbers of bogus route announcements - e.g., cidr-report.org Among these we have seen many serious attacks ... 5

  6. Routing attacks increasingly common • List of Bogus route announcements as listed on www.cidr- report.org. Each day there are large numbers of bogus route announcements - e.g., cidr-report.org Among these we have seen many serious attacks ... 6

  7. BGP refresher AS 7

  8. BGP refresher AS 22394 AS 7

  9. BGP refresher AS 22394 AS 66.174.0.0/16 7

  10. BGP refresher ISP 1 Level 3 Verizon Wireless AS 22394 66.174.0.0/16 8

  11. BGP refresher ISP 1 Level 3 Verizon Wireless 22394 66.174.0.0/16 Normal operation: • AS 22394 Origin AS announces prefix • Route announcements propagate between ASes • Helps ASes learn about “good” paths to reach prefix 66.174.0.0/16 8

  12. BGP refresher ISP 1 VZW, 22394 66.174.0.0/16 Level 3 Verizon Wireless 22394 66.174.0.0/16 Normal operation: • AS 22394 Origin AS announces prefix • Route announcements propagate between ASes • Helps ASes learn about “good” paths to reach prefix 66.174.0.0/16 8

  13. BGP refresher Level3, VZW, 22394 66.174.0.0/16 ISP 1 VZW, 22394 66.174.0.0/16 Level 3 Verizon Wireless 22394 66.174.0.0/16 Normal operation: • AS 22394 Origin AS announces prefix • Route announcements propagate between ASes • Helps ASes learn about “good” paths to reach prefix 66.174.0.0/16 8

  14. BGP refresher Level3, VZW, 22394 66.174.0.0/16 ISP 1 VZW, 22394 66.174.0.0/16 Level 3 Verizon Wireless 22394 66.174.0.0/16 Normal operation: • AS 22394 Origin AS announces prefix • Route announcements propagate between ASes • Helps ASes learn about “good” paths to reach prefix 66.174.0.0/16 12

  15. BGP refresher Level3, VZW, 22394 66.174.0.0/16 ISP 1 Level 3 Verizon Wireless AS 22394 66.174.0.0/16 12

  16. BGP refresher Level3, VZW, 22394 66.174.0.0/16 ISP 1 Level 3 Verizon Attacker Wireless AS 22394 66.174.0.0/16 12

  17. Prefix hijack attack Level3, VZW, 22394 66.174.0.0/16 ISP 1 Level 3 Verizon Attacker Wireless AS 22394 66.174.0.0/16 13

  18. Prefix hijack attack Level3, VZW, 22394 Attacker 66.174.0.0/16 66.174.0.0/ 16 ISP 1 Level 3 Verizon Attacker Wireless AS 22394 66.174.0.0/16 13

  19. Prefix hijack attack Level3, VZW, 22394 Attacker 66.174.0.0/16 66.174.0.0/ 16 ISP 1 Level 3 Verizon Attacker Wireless AS relationships: AS 22394 • Customer-provider • Peer-peer 66.174.0.0/16 13

  20. Prefix hijack attack Customer path? ? Level3, VZW, 22394 Attacker 66.174.0.0/16 66.174.0.0/ 16 ISP 1 Level 3 Verizon Attacker Wireless AS relationships: AS 22394 • Customer-provider • Peer-peer 66.174.0.0/16 14

  21. Prefix hijack attack Level3, VZW, 22394 Attacker 66.174.0.0/16 66.174.0.0/ 16 ISP 1 Level 3 Verizon Attacker Wireless AS 22394 66.174.0.0/16 15

  22. Prefix hijack attack Attacker path is shorter ? Level3, VZW, 22394 Attacker 66.174.0.0/16 66.174.0.0/ 16 ISP 1 Level 3 Verizon Attacker Wireless AS 22394 66.174.0.0/16 15

  23. Subprefix hijack attack Level3, VZW, 22394 Attacker 66.174.0.0/16 66.174.161.0/ 24 ISP 1 Level 3 Verizon Attacker Wireless AS 22394 66.174.0.0/16 16

  24. Subprefix hijack attack Attacker prefix is more specific ? Level3, VZW, 22394 Attacker 66.174.0.0/16 66.174.161.0/ 24 ISP 1 Level 3 Verizon Attacker Wireless AS 22394 66.174.0.0/16 16

  25. Imposture attack Level3, VZW, 22394 Attacker 66.174.0.0/16 66.174.161.0/ 24 ISP 1 Level 3 Verizon Attacker Wireless AS 22394 66.174.0.0/16 17

  26. Interception attack Level3, VZW, 22394 Attacker 66.174.0.0/16 66.174.161.0/ 24 ISP 1 Level 3 Verizon Attacker Wireless AS 22394 66.174.0.0/16 18

  27. Interception attack Level3, VZW, 22394 Attacker 66.174.0.0/16 66.174.161.0/ 24 ISP 1 Level 3 Verizon Attacker Wireless AS 22394 66.174.0.0/16 18

  28. Examples of systems to secure BGP Information Prefix Subprefix Interception Imposture Example shared hijack hijack solutions Prefix origin Route (Hijack filtering, prevention) RPKI, ROVER Route path PHAS, updates PrefiSec, (Hijack PG/BGP detection) Passive CrowdSec measurements Active Zheng at. al., measurements PrefiSec 19

  29. Security gain when large ASes collaborate 20

  30. Security gain when large ASes collaborate • Several ASes with few large size AS gives good security • Locality aspects often not considered 20

  31. AS Relationship issues • In October, 2010, Sprint severed its connection with Cogent • These two ASes had issues with peering relationship that allowed them to exchange traffic at no cost • ASes do not agree with each other 22

  32. AS Relationship issues • In October, 2010, Sprint severed its connection with Cogent • These two ASes had issues with peering relationship that allowed them to exchange traffic at no cost • ASes do not agree with each other 22

  33. AS Relationship issues • In October, 2010, Sprint severed its connection with Cogent • These two ASes had issues with peering relationship that allowed them to exchange traffic at no cost • ASes do not agree with each other • Global collaboration not practical • Collaboration among networks within same region plausible, for example, through legislation 22

  34. Research questions • How are attack prevention/detection rates affected – When location of participant ASes is considered? – When size of participant ASes is considered? – When number of ASes participating in the collaboration is considered? • In the context of last two questions, we consider the locality aspects 23

  35. Research questions • How are attack prevention/detection rates affected – When location of participant ASes is Vs considered? – When size of participant ASes is considered? – When number of ASes participating in the collaboration is considered? • In the context of last two questions, we consider the locality aspects 23

  36. Research questions • How are attack prevention/detection rates affected – When location of participant ASes is Vs considered? – When size of participant ASes is considered? Vs – When number of ASes participating in the collaboration is considered? • In the context of last two questions, we consider the locality aspects 23

  37. Research questions • How are attack prevention/detection rates affected – When location of participant ASes is Vs considered? – When size of participant ASes is considered? Vs – When number of ASes participating in the collaboration is considered? • In the context of last two questions, Vs we consider the locality aspects 23

  38. Contributions • Systematic data-driven evaluation • Using real world topologies and routing information we evaluate the impact of: – Locality – Scale – Size • The research questions are evaluated for three different techniques that are based on sharing – Prefix origin – Route path updates – Passively collected RTT 24

  39. Examples of systems to secure BGP Information Prefix Subprefix Interception Imposture Example shared hijack hijack solutions Prefix origin Route filtering, RPKI, ROVER Route path PHAS, updates PrefiSec, PG/BGP Passive CrowdSec measurements Active Zheng at. al., measurements PrefiSec 25

  40. Examples of systems to secure BGP Information Prefix Subprefix Interception Imposture Example shared hijack hijack solutions Prefix origin Route filtering, RPKI, ROVER Route path PHAS, updates PrefiSec, PG/BGP Passive CrowdSec measurements Active Zheng at. al., measurements PrefiSec 25

  41. Contributions • Systematic data-driven evaluation • Using real world topologies and routing information we evaluate the impact of: – Locality – Scale – Size • The research questions are evaluated for three different techniques that share: – Prefix origin  hijack prevention mechanisms – Route path updates  hijack detection mechanisms – Passively collected RTT 26

  42. Hijack prevention technique evaluation • Simulation based evaluation • Simulate route propagation using standard routing policy used over the Internet • Modified and used BSIM tool • AS-level topology and AS relationship information that has 51,507 ASes and 199,540 relationships 27

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend