Does Scale, Size, and Locality Matter? Evaluation of Collaborative BGP Security Mechanisms
Rahul Hiran, Niklas Carlsson, Nahid Shahmehri
Linköping University, Sweden
1
Security Mechanisms Rahul Hiran , Niklas Carlsson, Nahid Shahmehri - - PowerPoint PPT Presentation
Does Scale, Size, and Locality Matter? Evaluation of Collaborative BGP Security Mechanisms Rahul Hiran , Niklas Carlsson, Nahid Shahmehri Linkping University, Sweden 1 Routing attacks increasingly common Each day there are large numbers of
Linköping University, Sweden
1
Each day there are large numbers of bogus route announcements
Among these we have seen many serious attacks ...
2
Each day there are large numbers of bogus route announcements
Among these we have seen many serious attacks ...
3
announcements as listed on www.cidr- report.org.
Each day there are large numbers of bogus route announcements
Among these we have seen many serious attacks ...
4
announcements as listed on www.cidr- report.org.
Each day there are large numbers of bogus route announcements
Among these we have seen many serious attacks ...
5
announcements as listed on www.cidr- report.org.
Each day there are large numbers of bogus route announcements
Among these we have seen many serious attacks ...
6
AS
7
AS
7
AS 22394
AS
66.174.0.0/16
7
AS 22394
ISP 1 Verizon Wireless Level 3 AS 22394
66.174.0.0/16
8
ISP 1 Verizon Wireless Level 3 AS 22394
66.174.0.0/16
22394
66.174.0.0/16
8
Normal operation:
ISP 1 Verizon Wireless Level 3 AS 22394
66.174.0.0/16
VZW, 22394
66.174.0.0/16
22394
66.174.0.0/16
8
Normal operation:
ISP 1 Verizon Wireless Level 3
Level3, VZW, 22394
66.174.0.0/16
AS 22394
66.174.0.0/16
VZW, 22394
66.174.0.0/16
22394
66.174.0.0/16
8
Normal operation:
ISP 1 Verizon Wireless Level 3
Level3, VZW, 22394
66.174.0.0/16
AS 22394
66.174.0.0/16
VZW, 22394
66.174.0.0/16
22394
66.174.0.0/16
12
Normal operation:
ISP 1 Verizon Wireless Level 3
Level3, VZW, 22394
66.174.0.0/16
AS 22394
66.174.0.0/16
12
ISP 1 Verizon Wireless Level 3
Level3, VZW, 22394
66.174.0.0/16
AS 22394
66.174.0.0/16
12
Attacker
Attacker ISP 1 Verizon Wireless Level 3
Level3, VZW, 22394
66.174.0.0/16
AS 22394
66.174.0.0/16
13
Attacker ISP 1 Verizon Wireless Level 3
Level3, VZW, 22394
66.174.0.0/16
AS 22394
66.174.0.0/16
Attacker
66.174.0.0/16
13
Attacker ISP 1 Verizon Wireless Level 3
Level3, VZW, 22394
66.174.0.0/16
AS 22394
66.174.0.0/16
Attacker
66.174.0.0/16
13
Customer path?
Attacker ISP 1 Verizon Wireless Level 3
Level3, VZW, 22394
66.174.0.0/16
AS 22394
66.174.0.0/16
Attacker
66.174.0.0/16
14
Attacker ISP 1 Verizon Wireless Level 3
Level3, VZW, 22394
66.174.0.0/16
AS 22394
66.174.0.0/16
Attacker
66.174.0.0/16
15
Attacker path is shorter
Attacker ISP 1 Verizon Wireless Level 3
Level3, VZW, 22394
66.174.0.0/16
AS 22394
66.174.0.0/16
Attacker
66.174.0.0/16
15
Attacker ISP 1 Verizon Wireless Level 3
Level3, VZW, 22394
66.174.0.0/16
AS 22394
66.174.0.0/16
Attacker
66.174.161.0/24
16
Attacker prefix is more specific
Attacker ISP 1 Verizon Wireless Level 3
Level3, VZW, 22394
66.174.0.0/16
AS 22394
66.174.0.0/16
Attacker
66.174.161.0/24
16
Attacker ISP 1 Verizon Wireless Level 3
Level3, VZW, 22394
66.174.0.0/16
AS 22394
66.174.0.0/16
Attacker
66.174.161.0/24
17
Attacker ISP 1 Verizon Wireless Level 3
Level3, VZW, 22394
66.174.0.0/16
AS 22394
66.174.0.0/16
Attacker
66.174.161.0/24
18
Attacker ISP 1 Verizon Wireless Level 3
Level3, VZW, 22394
66.174.0.0/16
AS 22394
66.174.0.0/16
Attacker
66.174.161.0/24
18
Information shared Prefix hijack Subprefix hijack Interception Imposture Example solutions Prefix origin (Hijack prevention) Route filtering, RPKI, ROVER Route path updates (Hijack detection) PHAS, PrefiSec, PG/BGP Passive measurements CrowdSec Active measurements Zheng at. al., PrefiSec
19
20
20
connection with Cogent
peering relationship that allowed them to exchange traffic at no cost
22
connection with Cogent
peering relationship that allowed them to exchange traffic at no cost
22
connection with Cogent
peering relationship that allowed them to exchange traffic at no cost
22
within same region plausible, for example, through legislation
prevention/detection rates affected
– When location of participant ASes is considered? – When size of participant ASes is considered? – When number of ASes participating in the collaboration is considered?
we consider the locality aspects
23
prevention/detection rates affected
– When location of participant ASes is considered? – When size of participant ASes is considered? – When number of ASes participating in the collaboration is considered?
we consider the locality aspects
23
prevention/detection rates affected
– When location of participant ASes is considered? – When size of participant ASes is considered? – When number of ASes participating in the collaboration is considered?
we consider the locality aspects
23
prevention/detection rates affected
– When location of participant ASes is considered? – When size of participant ASes is considered? – When number of ASes participating in the collaboration is considered?
we consider the locality aspects
23
– Locality – Scale – Size
– Prefix origin – Route path updates – Passively collected RTT
24
Information shared Prefix hijack Subprefix hijack Interception Imposture Example solutions Prefix origin Route filtering, RPKI, ROVER Route path updates PHAS, PrefiSec, PG/BGP Passive measurements CrowdSec Active measurements Zheng at. al., PrefiSec
25
Information shared Prefix hijack Subprefix hijack Interception Imposture Example solutions Prefix origin Route filtering, RPKI, ROVER Route path updates PHAS, PrefiSec, PG/BGP Passive measurements CrowdSec Active measurements Zheng at. al., PrefiSec
25
– Locality – Scale – Size
– Prefix origin hijack prevention mechanisms – Route path updates hijack detection mechanisms – Passively collected RTT
26
27
and absent
28
and absent
29
collaborate increases, the protection to ASes increases
gain of 15% across attacker-victim pairs
ASes with node degree >= 20 deploy the prevention mechanism
vs
30
Global
vs
31
Global
vs
vs
32
Global North America (NA) European Union (EU)
vs
33
vs
North America (NA) Global
– Locality – Scale – Size
– Prefix origin hijack prevention mechanisms – Route path updates hijack detection mechanisms – Passively collected RTT
34
– Locality – Scale – Size
– Prefix origin hijack prevention mechanisms – Route path updates hijack detection mechanisms – Passively collected RTT
35
36
37
vs
Global
37
vs
vs
Global NA Rest of the world
vs
38
Global
vs
38
vs
Global North America (NA) European Union (EU)
– Locality – Scale – Size
– Prefix origin – Route path updates – Passively collected RTT
39
40
37