Performing BGP Experiments on a Semi-Realistic Internet Testbed Environment The 2nd International Workshop on Security in Distributed Computing Systems,

Slides:



Advertisements
Similar presentations
Routing Basics.
Advertisements

Delayed Internet Routing Convergence due to Flap Dampening Z. Morley Mao Ramesh Govindan, Randy Katz, George Varghese
Advanced Computer Networks cs538, Fall UIUC Klara Nahrstedt Lecture 7, September 16, 2014 Based on M. Caesar, J. Rexford, “BGP Routing Policies.
Lecture 9 Overview. Hierarchical Routing scale – with 200 million destinations – can’t store all dests in routing tables! – routing table exchange would.
© J. Liebeherr, All rights reserved 1 Border Gateway Protocol This lecture is largely based on a BGP tutorial by T. Griffin from AT&T Research.
Design Deployment and Use of the DETER Testbed Terry Benzel, Robert Braden, Dongho Kim, Clifford Informatino Sciences Institute
Fundamentals of Computer Networks ECE 478/578 Lecture #18: Policy-Based Routing Instructor: Loukas Lazos Dept of Electrical and Computer Engineering University.
Consensus Routing: The Internet as a Distributed System John P. John, Ethan Katz-Bassett, Arvind Krishnamurthy, and Thomas Anderson Presented.
Courtesy: Nick McKeown, Stanford
1 Interdomain Routing Protocols. 2 Autonomous Systems An autonomous system (AS) is a region of the Internet that is administered by a single entity and.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 Routing Working at a Small-to-Medium Business or ISP – Chapter 6.
1 Measurement of Highly Active Prefixes in BGP Ricardo V. Oliveira, Rafit Izhak-Ratzin, Beichuan Zhang, Lixia Zhang GLOBECOM’05.
1 Towards Secure Interdomain Routing For Dr. Aggarwal Win 2004.
1 BGP Security -- Zhen Wu. 2 Schedule Tuesday –BGP Background –" Detection of Invalid Routing Announcement in the Internet" –Open Discussions Thursday.
Interdomain Routing and The Border Gateway Protocol (BGP) Courtesy of Timothy G. Griffin Intel Research, Cambridge UK
Improving BGP Convergence Through Consistency Assertions Dan Pei, Lan Wang, Lixia Zhang UCLA Xiaoliang Zhao, Daniel Massey, Allison Mankin, USC/ISI S.
Slide -1- February, 2006 Interdomain Routing Gordon Wilfong Distinguished Member of Technical Staff Algorithms Research Department Mathematical and Algorithmic.
More on BGP Check out the links on politics: ICANN and net neutrality To read for next time Path selection big example Scaling of BGP.
Inherently Safe Backup Routing with BGP Lixin Gao (U. Mass Amherst) Timothy Griffin (AT&T Research) Jennifer Rexford (AT&T Research)
02/06/2006ecs236 winter Intrusion Detection ecs236 Winter 2006: Intrusion Detection #4: Anomaly Detection for Internet Routing Dr. S. Felix Wu Computer.
Network Monitoring for Internet Traffic Engineering Jennifer Rexford AT&T Labs – Research Florham Park, NJ 07932
Routing.
14 – Inter/Intra-AS Routing
Feb 12, 2008CS573: Network Protocols and Standards1 Border Gateway Protocol (BGP) Network Protocols and Standards Winter
1 Autonomous Systems An autonomous system is a region of the Internet that is administered by a single entity. Examples of autonomous regions are: UVA’s.
Border Gateway Protocol (BGP4) Rizwan Rehman, CCS, DU.
1 ECE453 – Introduction to Computer Networks Lecture 10 – Network Layer (Routing II)
Inter-domain Routing Outline Border Gateway Protocol.
1 Chapter 27 Internetwork Routing (Static and automatic routing; route propagation; BGP, RIP, OSPF; multicast routing)
Dr. John P. Abraham Professor University of Texas Pan American Internet Routing and Routing Protocols.
Lecture 8 Page 1 Advanced Network Security Review of Networking Basics: Internet Architecture, Routing, and Naming Advanced Network Security Peter Reiher.
Impact of Prefix Hijacking on Payments of Providers Pradeep Bangera and Sergey Gorinsky Institute IMDEA Networks, Madrid, Spain Developing the Science.
IP is a Network Layer Protocol Physical 1 Network DataLink 1 Transport Application Session Presentation Network Physical 1 DataLink 1 Physical 2 DataLink.
1 Interdomain Routing (BGP) By Behzad Akbari Fall 2008 These slides are based on the slides of Ion Stoica (UCB) and Shivkumar (RPI)
1 Chapter 27 Internetwork Routing (Static and automatic routing; route propagation; BGP, RIP, OSPF; multicast routing)
1 Routing. 2 Routing is the act of deciding how each individual datagram finds its way through the multiple different paths to its destination. Routing.
CS 3700 Networks and Distributed Systems Inter Domain Routing (It’s all about the Money) Revised 8/20/15.
Border Gateway Protocol Presented BY Jay Purohit & Rupal Jaiswal GROUP 9.
Network Layer r Introduction r Datagram networks r IP: Internet Protocol m Datagram format m IPv4 addressing m ICMP r What’s inside a router r Routing.
David Wetherall Professor of Computer Science & Engineering Introduction to Computer Networks Hierarchical Routing (§5.2.6)
A Visual Exploration Process for the Analysis of Internet Routing Data Soon Tee Teoh Kwan-Liu Ma S. Felix Wu Presented by Zhenzhen Yan April. 11, 2007.
1 Internet Routing. 2 Terminology Forwarding –Refers to datagram transfer –Performed by host or router –Uses routing table Routing –Refers to propagation.
A Firewall for Routers: Protecting Against Routing Misbehavior1 June 26, A Firewall for Routers: Protecting Against Routing Misbehavior Jia Wang.
T. S. Eugene Ngeugeneng at cs.rice.edu Rice University1 COMP/ELEC 429/556 Introduction to Computer Networks Inter-domain routing Some slides used with.
A Light-Weight Distributed Scheme for Detecting IP Prefix Hijacks in Real-Time Lusheng Ji†, Joint work with Changxi Zheng‡, Dan Pei†, Jia Wang†, Paul Francis‡
Network Layer4-1 Intra-AS Routing r Also known as Interior Gateway Protocols (IGP) r Most common Intra-AS routing protocols: m RIP: Routing Information.
By, Matt Guidry Yashas Shankar.  Analyze BGP beacons which are announced and withdrawn, usually within two hour intervals.  The withdraws have an effect.
Detecting Selective Dropping Attacks in BGP Mooi Chuah Kun Huang November 2006.
02/01/2006USC/ISI1 Updates on Routing Experiments Cyber DEfense Technology Experimental Research (DETER) Network Evaluation Methods for Internet Security.
CS 4396 Computer Networks Lab BGP. Inter-AS routing in the Internet: (BGP)
An internet is a combination of networks connected by routers. When a datagram goes from a source to a destination, it will probably pass through many.
Chapter 20 Unicast Routing Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 Border Gateway Protocol (BGP) and BGP Security Jeff Gribschaw Sai Thwin ECE 4112 Final Project April 28, 2005.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—3-1 Route Selection Using Policy Controls Using Multihomed BGP Networks.
Chapter 25 Internet Routing. Static Routing manually configured routes that do not change Used by hosts whose routing table contains one static route.
Michael Schapira, Princeton University Fall 2010 (TTh 1:30-2:50 in COS 302) COS 561: Advanced Computer Networks
Inter-domain Routing Outline Border Gateway Protocol.
Border Gateway Protocol. Intra-AS v.s. Inter-AS Intra-AS Inter-AS.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 Routing Working at a Small-to-Medium Business or ISP – Chapter 6.
Working at a Small-to-Medium Business or ISP – Chapter 6
Border Gateway Protocol
BGP supplement Abhigyan Sharma.
Introduction to Internet Routing
Department of Computer and IT Engineering University of Kurdistan
COS 561: Advanced Computer Networks
COS 561: Advanced Computer Networks
COS 561: Advanced Computer Networks
Working at a Small-to-Medium Business or ISP – Chapter 6
Routing Experiments Chen-Nee Chuah, Sonia Fahmy, Denys Ma,
Computer Networks Protocols
Presentation transcript:

Performing BGP Experiments on a Semi-Realistic Internet Testbed Environment The 2nd International Workshop on Security in Distributed Computing Systems, 2005 Ke Zhang, Soon-Tee Teoh, Shih-Ming Tseng, Rattapon Limprasitipom, Kwan-Liu Ma, S. Felix Wu

Outline  Introduction  Testbed Topology  MOAS Attack Experiment  BGP Route Flap Damping(RFD)  Attack Scenario in Routing Testbed  Conclusion

Introduction  BGP become a critical component For BGP wide deployment and significant role of connecting various networks. BGP may cause world-wide connectivity loss. In 1997, a small ISP incorrectly announced all prefixes as its own prefixes.  many routers affected, crashed, and whole Internet unstable for hours  Apply cryptography to improve BGP security S-BGP(Secure Border Gateway Protocol), SoBGP(Secure Origin BGP), Listen and Whisper(Security Mechanisms for BGP) AS BGP IGP

Introduction  DETER / EMIST  Evaluation Methods for Internet Security Technology (EMIST)  DETER--A software system provides a time- and space-shared platform for experiment in distributed systems and networks.  In BGP, the major obstacle is the lack of experimental infrastructure.  DETER / EMIST group build a 72-node experimental network and emulated DDOS, worm and routing attacks.  BGP simulator BGP++, NS-2, SSFNet EMIST Penn State UC Davis Purdue SRI ICSI Sparta NSF DHS Founded 72-node 5 commercial routers 12 zebra routers DETER / EMIST UC- Davis, CA IPsec / VPN connection

Testbed Topology  5-layer AS hierarchical structure  Tier-1 ASes : The major ISPs formed the back-bone of the Internet. (Sprint, AT&T, UUNet etc.)  Tier-2 ~ Tier-4 ASes : the regional ISPs or transit ASes to provide transit service for smaller or customer networks  Tier-5 ASes: campus networks or company networks (stub ASes)  Experiment (three-level hierarchical topology in DeterLab)  3 Tier-1 ASes: fully-connected Zebra routers (full mesh)  4 Tier-2 ASes: 2 AS(multi-home ASes), 2 ASes(single-home AS)  Tier-3 AS: stub ASes. Tire-2 ~ Tire-4 AS Tire-1 AS Origin AS prefix Tire-5 AS Campus or company network

MOAS Attack Experiment  Original AS  A BGP prefix is announced by a single AS, called the original AS. Tire-2 AS Tire-1 AS Origin AS prefix AS Tire-1 AS Origin AS prefix AS Tire-1 AS Origin AS prefix Campus networks No mechanism to prevent the origin AS conflict

MOAS Attack Experiment  An attacker originates the same prefix as the victim AS with shorter AS path.  Since the shorter AS path is perfered in BGP route selection process, some Ases may choose the fake routes.  An attacker originates the prefix that is the subnetwork of the victim AS network.  For BGP always chooses the more specific route, the traffic destined to the subnetwork will go to the attacker. AS Attacker AS victim AS AS subnetwork attacker

BGP Route Flap Damping(RFD) A mechanism to reduce the amount of update messages in the Internet caused by instability. Crash restart

BGP Route Flap Damping(RFD) A mechanism to reduce the amout of update messates in the Internet caused by instability. Po: current penalty value H: half-life time Each router configures two thresholds:  Suppression The penalty value is increased to be greater than the suppression threshold, the route is suppressed.  Reuse if the route is stable, the penalty value decays exponentially with the configured half-life value. The penalty value under the reuse threshold  The route is reused again.

Attack Scenario in Routing Testbed Figure 3. network topology in differential damping attack S: the prefix originator D: the router of the victim network M: an attacker The best path(D to S): D-A-M-S P(A, M): A’s damping penalty for the route heard from M. P(D, A): D’s damping penalty for the route heard from A

Attack Scenario in Routing Testbed Figure 3. network topology in differential damping attack 1. M sends withdraw message to A. ♣ using the path D-A-B-C-S ♣ P(A, M) = M waits until the previous P(A, M) decays to a small value. ♣ P(A, M) = small value 3.S sends the attribute change update; M does not propagate to A. ♣ the porpagate path = D-A-B-C-S, not D-A-M-S ♣ P(D, A) = 500, P(A, M) = small value 4.M sends the re-announcement to A. ♣ A informs D to change path from A-B-C-S to A-M-S. ♣ P(D, A) = = 1000

Attack Scenario in Routing Testbed Figure 3. network topology in differential damping attack 5.0 M sends the new path A-M-M-M-S to A. ♣ A informs D to change path from A-M-S to A-B-C-S. ♣ P(D, A) = = 1500, P(A, M) = M sends M-S to A. ♣ A informs D to change path from A-B-C-S to A-M-S. ♣ P(D, A) = = 2000, P(A, M) = = M sends the new path A-M-M-M-S to A. ♣ A informs D to change path from A-M-S to A-B-C-S. ♣ P(D, A) = = 2500, P(A, M) = =1500 ♣ M isolates D from S successfully. 6 M repeat 5.0 and 5.1 step every 400 seconds. ♣ P(D, A) above the reuse threshold and P(A, M) below the suppression threshold P(D, A) P(A, M) P(D, A)

Attack Scenario in Routing Testbed Figure 3. network topology in differential damping attack P(D, A) P(A, M) P(D, A) The attacker maintains the P(A, M) above reuse threshold, D will suppress the route forever.

Attack Scenario in Routing Testbed

Conclusion  describe the design and implementation of a BGP routing testbed.  implement the BGP data analysis engine and visualization engine to analyze and display BGP traffic.  conduct two BGP attacks in the testbed – MOAS attack and the differential damping penalty attack  discover the subtle implementation difference between zebra router and Cisco router, which yield different attack effects

BGP AS BGP IGP Real internet simulation Internet Testbed Environment 72-node 5 commercial routers 12 zebra routers DETER / EMIST Real routing data (background traffic) inject  The testbed architecture includes four components: Routing topology, background traffic, data analysis and visualization  This paper describes two specific BGP attacks: (a) Multiple Origin AS (b) route flap damping attacks ASes 100 BGP routers Large AS

BGP  AS(Autonomous System) A set of routers with a single routing policy, running under a single technical administration.  IGP (Interior Gateway Protocol a protocol for exchanging routing information between gateways (hosts with routers) within an autonomous network  BGP(Border Gateway Protocol) discovery and maintenance of paths between distant ASes in the Internet AS BGP IGP

terminology UUNet: Short for UNIX to UNIX Network, the first commercial Internet service provider, headquartered in Fairfax, VA. The company was founded in 1987 by Rick Adams, one of the original developers of ARPAnet, the precursor to the Internet. In 1996, UUNET merged with MFS Communications, Inc., and later that year, WorldCom acquired both MFS and UUNET. UUNET is now a full-service provider.NetInternet service provider developersARPAnetthe InternetCommunications NSF(National Science Foundation) PHS(Department of Homeland Security): Governmental agency works to prevent terrorist attacks within the United States, reduce America’s vulnerability to terrorism, and minimize the damage from potential attacks and natural disastors.