Constructing Inter-Domain Packet Filters to Control IP Spoofing Based on BGP Updates Zhenhai Duan, Xin Yuan Department of Computer Science Florida State.

Slides:



Advertisements
Similar presentations
Martin Suchara in collaboration with I. Avramopoulos and J. Rexford How Small Groups Can Secure Interdomain Routing.
Advertisements

CS540/TE630 Computer Network Architecture Spring 2009 Tu/Th 10:30am-Noon Sue Moon.
© J. Liebeherr, All rights reserved 1 Border Gateway Protocol This lecture is largely based on a BGP tutorial by T. Griffin from AT&T Research.
Fundamentals of Computer Networks ECE 478/578 Lecture #18: Policy-Based Routing Instructor: Loukas Lazos Dept of Electrical and Computer Engineering University.
Computer Networks Zhenhai Duan Department of Computer Science 9/15/2011.
1 Interdomain Routing Protocols. 2 Autonomous Systems An autonomous system (AS) is a region of the Internet that is administered by a single entity and.
Inferring Autonomous System Relationships in the Internet Lixin Gao Dept. of Electrical and Computer Engineering University of Massachusetts, Amherst
Inferring Autonomous System Relationships in the Internet Lixin Gao.
Announcement  Slides and reference materials available at  Slides and reference materials available.
1 Internet Path Inflation Xenofontas Dimitropoulos.
Part II: Inter-domain Routing Policies. March 8, What is routing policy? ISP1 ISP4ISP3 Cust1Cust2 ISP2 traffic Connectivity DOES NOT imply reachability!
Hash-Based IP Traceback Best Student Paper ACM SIGCOMM’01.
1 Tutorial 5 Safe “Peering Backup” Routing With BGP Based on:
1 BGP Security -- Zhen Wu. 2 Schedule Tuesday –BGP Background –" Detection of Invalid Routing Announcement in the Internet" –Open Discussions Thursday.
Mini Introduction to BGP Michalis Faloutsos. What Is BGP?  Border Gateway Protocol BGP-4  The de-facto interdomain routing protocol  BGP enables policy.
Interdomain Routing and The Border Gateway Protocol (BGP) Courtesy of Timothy G. Griffin Intel Research, Cambridge UK
© 2003 By Default! A Free sample background from Slide 1 SAVE: Source Address Validity Enforcement Protocol Authors: Li,
Internet Networking Spring 2004 Tutorial 5 Safe “Peering Backup” Routing With BGP.
Stable Internet Routing Without Global Coordination Jennifer Rexford Princeton University Joint work with Lixin Gao (UMass-Amherst)
On Power-Law Relationships of the Internet Topology CSCI 780, Fall 2005.
Inherently Safe Backup Routing with BGP Lixin Gao (U. Mass Amherst) Timothy Griffin (AT&T Research) Jennifer Rexford (AT&T Research)
On the Effectiveness of Route- Based Packet Filtering for Distributed DoS Attack Prevention in Power-Law Internets Kihong Park and Heejo Lee Network Systems.
Economic Incentives in Internet Routing Jennifer Rexford Princeton University
CSEE W4140 Networking Laboratory Lecture 5: IP Routing (OSPF and BGP) Jong Yul Kim
Stable Internet Routing Without Global Coordination Jennifer Rexford AT&T Labs--Research
Stable Internet Routing Without Global Coordination Jennifer Rexford AT&T Labs--Research
Stable Internet Routing Without Global Coordination Jennifer Rexford AT&T Labs--Research Joint work with Lixin Gao.
1 Pertemuan 20 Teknik Routing Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
Constructing Inter-Domain Packet Filters to Control IP Spoofing Based on BGP Updates Zhenhai Duan, Xin Yuan Department of Computer Science Florida State.
1 Computer Communication & Networks Lecture 22 Network Layer: Delivery, Forwarding, Routing (contd.)
Information-Centric Networks04a-1 Week 4 / Paper 1 Open issues in Interdomain Routing: a survey –Marcelo Yannuzzi, Xavier Masip-Bruin, Olivier Bonaventure.
Introduction to BGP.
9/15/2015CS622 - MIRO Presentation1 Wen Xu and Jennifer Rexford Department of Computer Science Princeton University Chuck Short CS622 Dr. C. Edward Chow.
1 Controlling IP Spoofing via Inter-Domain Packet Filters Zhenhai Duan Department of Computer Science Florida State University.
Computer Networks Zhenhai Duan Department of Computer Science 09/03/2015.
IDRM: Inter-Domain Routing Protocol for Mobile Ad Hoc Networks C.-K. Chau, J. Crowcroft, K.-W. Lee, S. H.Y. Wong.
How Secure are Secure Inter- Domain Routing Protocols? SIGCOMM 2010 Presenter: kcir.
1 GIRO: Geographically Informed Inter-domain Routing Ricardo Oliveira, Mohit Lad, Beichuan Zhang, Lixia Zhang.
Jennifer Rexford Fall 2014 (TTh 3:00-4:20 in CS 105) COS 561: Advanced Computer Networks BGP.
Finding Vulnerable Network Gadgets in the Internet Topology Author: Nir Amar Supervisor: Dr. Gabi Nakibly Author: Nir Amar Supervisor: Dr. Gabi Nakibly.
A Firewall for Routers: Protecting Against Routing Misbehavior1 June 26, A Firewall for Routers: Protecting Against Routing Misbehavior Jia Wang.
More on Internet Routing A large portion of this lecture material comes from BGP tutorial given by Philip Smith from Cisco (ftp://ftp- eng.cisco.com/pfs/seminars/APRICOT2004.
SDX: A Software-Defined Internet eXchange Jennifer Rexford Princeton University
Packet-Marking Scheme for DDoS Attack Prevention
Detecting Selective Dropping Attacks in BGP Mooi Chuah Kun Huang November 2006.
CS 4396 Computer Networks Lab BGP. Inter-AS routing in the Internet: (BGP)
Information-Centric Networks Section # 4.1: Routing Issues Instructor: George Xylomenos Department: Informatics.
Routing in the Inernet Outcomes: –What are routing protocols used for Intra-ASs Routing in the Internet? –The Working Principle of RIP and OSPF –What is.
1 Agenda for Today’s Lecture The rationale for BGP’s design –What is interdomain routing and why do we need it? –Why does BGP look the way it does? How.
7/11/0666th IETF1 QoS Enhancements to BGP in Support of Multiple Classes of Service Andreas Terzis Computer Science Department Johns Hopkins University.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—3-1 Route Selection Using Policy Controls Using Multihomed BGP Networks.
1 Chapter 4: Internetworking (IP Routing) Dr. Rocky K. C. Chang 16 March 2004.
Michael Schapira, Princeton University Fall 2010 (TTh 1:30-2:50 in COS 302) COS 561: Advanced Computer Networks
Traffic-aware Inter-Domain Routing for Improved Internet Routing Stability Zhenhai Duan Florida State University 1.
IP Spoofing. What Is IP Spoofing Putting a fake IP address in the IP header field for source address (requires root)
1 Internet Routing: BGP Routing Convergence Jennifer Rexford Princeton University
Preliminaries: EE807 Software-defined Networked Computing KyoungSoo Park Department of Electrical Engineering KAIST.
1 Internet Routing 11/11/2009. Admin. r Assignment 3 2.
Border Gateway Protocol
COMP 3270 Computer Networks
Defending Against DDoS
COS 561: Advanced Computer Networks
BGP supplement Abhigyan Sharma.
No Direction Home: The True cost of Routing Around Decoys
COS 561: Advanced Computer Networks
IP Traceback Problem: How do we determine where malicious packet came from ? It’s a problem because attacker can spoof source IP address If we know where.
COS 561: Advanced Computer Networks
COS 461: Computer Networks Spring 2014
BGP Instability Jennifer Rexford
Computer Networks Protocols
Presentation transcript:

Constructing Inter-Domain Packet Filters to Control IP Spoofing Based on BGP Updates Zhenhai Duan, Xin Yuan Department of Computer Science Florida State University Jaideep Chandrashekar Department of Computer Science University of Minnesota

Outline: –Background IP spoofing Route based packet filtering –Related BGP concepts –Inter-domain Packet Filters (IDPF) General idea Assumptions Technique to compute the filters –Performance –Conclusion

IP spoofing: –Forging the source address –Used by many popular DDOS attacks –Making it difficulty to defend again attacks. A D C B Y X

Route based packet filtering [K. Park, SIGCOMM 2001] –One can fake the identity, but not the route. –A router can decide whether it is in the path from the source to the destination and drop packets that are not supposed to be there. A D C B Y X

Route based packet filtering Requirement: –The router must know the route between any pair of source and destination addresses. Global topology information Not available in BGP. Is it possible to build route based packet filters from BGP updates? If it is possible, what is the performance?

BGP: –Autonomous Systems (ASes) are the basic units The network can be modeled as an AS graph Nodes are ASes and edges are BGP sessions Nodes own network prefixes and exchange BGP route updates to learn the reachability of prefixes Attributes associated with routes: AS path, prefix. –Policy based routing: Import Route selection Export

BGP: –Routing policies are usually decided by the AS relation Provider-customer Peer-peer Sibling-sibling

Inter Domain Packet Filters (IDPF): –IDPF decides feasible routes under BGP –Feasible routes in BGP are constrained by routing policies (AS relation)

–Path constrained by the routing policies

Assumptions in our scheme: Export rules: MUST export Import rules:

Inferring the feasible paths: –If u is a feasible upstream neighbor of v for packet M(s, d), node u must have exported to v its best route to reach s.

Building IDPF: –Node v accepts packet M(s, d) forwarded by node u if and only if –IDPFs allow traffic to go through any feasible route May affect the performance No problem in the path exploration phase.

Routing policy complication: –Selective announcements: –r5: restricted conditional advertisement

Performance: –IDPF has two effects Reducing the number of prefixes that can be spoofed Localizing the source of spoofed packets –IDPF finds a set of feasible paths instead of one best route, its performance will not be as good as the ideal route based packet filters [Park 2001]

Performance metrics [Park 2001]: – : the proportion of ASes that if attacked by an attacker, the attacker can at most spoof ASes. – : the proportion of ASes from which an attacker can forge addresses of at most ASes. – : the proportion of ASes being attacked that can localize the true origin within ASes.

Data Set: –4 AS graphs from the BGP data achieved by the Oregon Route Views Project.

Experimental setting –Determine the feasible paths based on update logs. –Use shortest path as the route (add if the shortest path is not a feasible path) –Selecting nodes that deploy IDPF Random (rnd30/rnd50) Vertex cover If not mentioned specifically, IDPF nodes also have network ingress filtering.

Conclusion: –We proposed an Inter-domain Packet Filters architecture (IDPF) and studied it performance. –IDPF can limit the spoofing capability of attackers even when partially deployed and improves the accuracy of IP traceback. –IDPF provides local incentives for deployment.