how secure are secure interdomain routing protocols?

22
How Secure are Secure Interdomain Routing Protocols? B96209044 大大大 大大大 B97703099 大大大 大大大 1

Upload: marek

Post on 22-Feb-2016

55 views

Category:

Documents


0 download

DESCRIPTION

How Secure are Secure Interdomain Routing Protocols?. B96209044 大氣四 鍾岳霖 B97703099 財金三 婁瀚升. Outline. Introduction Model and Methodology Fooling BGP Security Protocols Smart Attraction Attack Smart Interception Attack Smart Attack Are Not Optimal Finding Optimal Attack is Hard - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: How Secure are Secure Interdomain Routing Protocols?

1

How Secure are Secure Interdomain Routing

Protocols?

B96209044 大氣四 鍾岳霖B97703099 財金三 婁瀚升

Page 2: How Secure are Secure Interdomain Routing Protocols?

2

Outline• Introduction• Model and Methodology• Fooling BGP Security Protocols• Smart Attraction Attack• Smart Interception Attack• Smart Attack Are Not Optimal• Finding Optimal Attack is Hard• Implementation Issues• Conclusion

Page 3: How Secure are Secure Interdomain Routing Protocols?

3

Introduction

• BGP• Quantifying– Worst Case Comparison– Traffic Flow: Routing, Business, AS-path

• Thinking like a Manipulator• Finding and Recommendations

Page 4: How Secure are Secure Interdomain Routing Protocols?

4

Model and Methodology• Modeling Interdomain Routing– AS Graph– Establishing Path– Business Relationship: C > P2P > P

• Modeling Routing Policies– Ranking: LP, SP, TB– Local Preference: GR3 , C > P2P > P – Export Policy: GR2,at least 1 Customer

Page 5: How Secure are Secure Interdomain Routing Protocols?

5

Page 6: How Secure are Secure Interdomain Routing Protocols?

6

Model and Methodology• Threat Model– 1 Manipulator– Normal ASes, Normal Path– Attration and Interception– Fraction Attracted

• Attack Strategy:– Unavailable or Non-existent Path– Available but not Normal– Export Policies

Page 7: How Secure are Secure Interdomain Routing Protocols?

7

• Experiment on Empirical AS Graph– Average Case Analysis– Random Chosen Pairs– Multiple Dataset

Model and Methodology

Page 8: How Secure are Secure Interdomain Routing Protocols?

8

Fooling BGP Security Protocols

• BGP: No validation → False Path

• Origin Authentication: Prefix Owner → Clain to be the closest

• soBGP:OrAuth, Path Existence → Exist, Unavail.

Page 9: How Secure are Secure Interdomain Routing Protocols?

9

Fooling BGP Security Protocols

• S-BGP: Path Verification: abc if bc sent to a → Shorter Path

• Data Plane Verification → Also Forward

• Defensive Filter : No Stub

Page 10: How Secure are Secure Interdomain Routing Protocols?

10

Smart Attraction Attack• Shortest-Path Export All• Underestimation• Defensive Filtering : Crucial• Different Strategy to Different Protocols

Page 11: How Secure are Secure Interdomain Routing Protocols?

11

Page 12: How Secure are Secure Interdomain Routing Protocols?

12

Smart Attraction Attack• SBGP: Hard to find Shorter, Not Opt.• Export Policy Matters More• Different Sized Manipulator : Tier 2• Different Sized Victim : Tier 1 vs Tier2

Page 13: How Secure are Secure Interdomain Routing Protocols?

13

• A stub that creates a blackholeSmart Interception Attack

Page 14: How Secure are Secure Interdomain Routing Protocols?

14

Smart Interception Attack• Stub Make Blackhole : Failure

• Blackhole or Not

Page 15: How Secure are Secure Interdomain Routing Protocols?

15

Smart Interception Attack• 2 Strategies:– Shortest Available Path Export All– Hybrid Interception Attack Strategy

• Evaluation

Page 16: How Secure are Secure Interdomain Routing Protocols?

16

Smart Attack are Not Optimal• Longer Path might be better• Exporting less might be better• Gaming Loop Detection

Page 17: How Secure are Secure Interdomain Routing Protocols?

17

Page 18: How Secure are Secure Interdomain Routing Protocols?

18

Exporting less might be better

Page 19: How Secure are Secure Interdomain Routing Protocols?

19

Gaming Loop Detection

Page 20: How Secure are Secure Interdomain Routing Protocols?

20

But....• Finding Optimal Attack : NP-Hard• Realistic ?• Implementation Issues– OrAuth with RPKI/ROA– Defendive Filtering in Practice– Trust Model

Page 21: How Secure are Secure Interdomain Routing Protocols?

21

Conclusion• secure routing protocols (e.g., soBGP

and S-BGP) should be deployed in combination with mechanisms that police export policies (e.g., defensive filtering)

• defensive filtering to eliminate attacks by stub ASes, and secure routing protocols to blunt attacks launched by larger ASes

Page 22: How Secure are Secure Interdomain Routing Protocols?

22

Q&A