Transcript
Page 1: How Secure are Secure Interdomain Routing Protocols?

1

How Secure are Secure Interdomain Routing

Protocols?

B96209044 大氣四 鍾岳霖B97703099 財金三 婁瀚升

Page 2: How Secure are Secure Interdomain Routing Protocols?

2

Outline• Introduction• Model and Methodology• Fooling BGP Security Protocols• Smart Attraction Attack• Smart Interception Attack• Smart Attack Are Not Optimal• Finding Optimal Attack is Hard• Implementation Issues• Conclusion

Page 3: How Secure are Secure Interdomain Routing Protocols?

3

Introduction

• BGP• Quantifying– Worst Case Comparison– Traffic Flow: Routing, Business, AS-path

• Thinking like a Manipulator• Finding and Recommendations

Page 4: How Secure are Secure Interdomain Routing Protocols?

4

Model and Methodology• Modeling Interdomain Routing– AS Graph– Establishing Path– Business Relationship: C > P2P > P

• Modeling Routing Policies– Ranking: LP, SP, TB– Local Preference: GR3 , C > P2P > P – Export Policy: GR2,at least 1 Customer

Page 5: How Secure are Secure Interdomain Routing Protocols?

5

Page 6: How Secure are Secure Interdomain Routing Protocols?

6

Model and Methodology• Threat Model– 1 Manipulator– Normal ASes, Normal Path– Attration and Interception– Fraction Attracted

• Attack Strategy:– Unavailable or Non-existent Path– Available but not Normal– Export Policies

Page 7: How Secure are Secure Interdomain Routing Protocols?

7

• Experiment on Empirical AS Graph– Average Case Analysis– Random Chosen Pairs– Multiple Dataset

Model and Methodology

Page 8: How Secure are Secure Interdomain Routing Protocols?

8

Fooling BGP Security Protocols

• BGP: No validation → False Path

• Origin Authentication: Prefix Owner → Clain to be the closest

• soBGP:OrAuth, Path Existence → Exist, Unavail.

Page 9: How Secure are Secure Interdomain Routing Protocols?

9

Fooling BGP Security Protocols

• S-BGP: Path Verification: abc if bc sent to a → Shorter Path

• Data Plane Verification → Also Forward

• Defensive Filter : No Stub

Page 10: How Secure are Secure Interdomain Routing Protocols?

10

Smart Attraction Attack• Shortest-Path Export All• Underestimation• Defensive Filtering : Crucial• Different Strategy to Different Protocols

Page 11: How Secure are Secure Interdomain Routing Protocols?

11

Page 12: How Secure are Secure Interdomain Routing Protocols?

12

Smart Attraction Attack• SBGP: Hard to find Shorter, Not Opt.• Export Policy Matters More• Different Sized Manipulator : Tier 2• Different Sized Victim : Tier 1 vs Tier2

Page 13: How Secure are Secure Interdomain Routing Protocols?

13

• A stub that creates a blackholeSmart Interception Attack

Page 14: How Secure are Secure Interdomain Routing Protocols?

14

Smart Interception Attack• Stub Make Blackhole : Failure

• Blackhole or Not

Page 15: How Secure are Secure Interdomain Routing Protocols?

15

Smart Interception Attack• 2 Strategies:– Shortest Available Path Export All– Hybrid Interception Attack Strategy

• Evaluation

Page 16: How Secure are Secure Interdomain Routing Protocols?

16

Smart Attack are Not Optimal• Longer Path might be better• Exporting less might be better• Gaming Loop Detection

Page 17: How Secure are Secure Interdomain Routing Protocols?

17

Page 18: How Secure are Secure Interdomain Routing Protocols?

18

Exporting less might be better

Page 19: How Secure are Secure Interdomain Routing Protocols?

19

Gaming Loop Detection

Page 20: How Secure are Secure Interdomain Routing Protocols?

20

But....• Finding Optimal Attack : NP-Hard• Realistic ?• Implementation Issues– OrAuth with RPKI/ROA– Defendive Filtering in Practice– Trust Model

Page 21: How Secure are Secure Interdomain Routing Protocols?

21

Conclusion• secure routing protocols (e.g., soBGP

and S-BGP) should be deployed in combination with mechanisms that police export policies (e.g., defensive filtering)

• defensive filtering to eliminate attacks by stub ASes, and secure routing protocols to blunt attacks launched by larger ASes

Page 22: How Secure are Secure Interdomain Routing Protocols?

22

Q&A


Top Related