Incrementally Deployable Security for Interdomain Routing (TTA-4, Type-I) Jennifer Rexford, Princeton University Joan Feigenbaum, Yale University July.

Slides:



Advertisements
Similar presentations
Martin Suchara in collaboration with I. Avramopoulos and J. Rexford How Small Groups Can Secure Interdomain Routing.
Advertisements

Network Layer: Internet-Wide Routing & BGP Dina Katabi & Sam Madden.
Fundamentals of Computer Networks ECE 478/578 Lecture #18: Policy-Based Routing Instructor: Loukas Lazos Dept of Electrical and Computer Engineering University.
Lecture 6 Overlay Networks CPE 401/601 Computer Network Systems slides are modified from Jennifer Rexford.
1 Route Control Platform – IEEE CCW 2004 Route Control Platform Making an AS look and act like one router Aman Shaikh AT&T Labs - Research IEEE CCW 2004.
Neighbor-Specific BGP (NS-BGP): More Flexible Routing Policies While Improving Global Stability Yi Wang, Jennifer Rexford Princeton University Michael.
Putting BGP on the Right Path: A Case for Next-Hop Routing Michael Schapira (Yale University and UC Berkeley) Joint work with Yaping Zhu and Jennifer Rexford.
Incrementally Deployable Security for Interdomain Routing (TTA-4, Type-I) Jennifer Rexford, Princeton University Joan Feigenbaum, Yale University January.
1 In VINI Veritas: Realistic and Controlled Network Experimentation Jennifer Rexford with Andy Bavier, Nick Feamster, Mark Huang, and Larry Peterson
Traffic Engineering With Traditional IP Routing Protocols
Interdomain Routing Security COS 461: Computer Networks Michael Schapira.
1 Route Control Platform Making the Network Act Like One Big Router Jennifer Rexford Princeton University
Interdomain Routing and The Border Gateway Protocol (BGP) Courtesy of Timothy G. Griffin Intel Research, Cambridge UK
1 GENI: Global Environment for Network Innovations Jennifer Rexford Princeton University
A Routing Control Platform for Managing IP Networks Jennifer Rexford Computer Science Department Princeton University
New Routing Architectures Jennifer Rexford Advanced Computer Networks Tuesdays/Thursdays 1:30pm-2:50pm.
MIRED: Managing IP Routing is Extremely Difficult Jennifer Rexford Internet and Networking Systems AT&T Labs - Research; Florham Park, NJ
Stable Internet Routing Without Global Coordination Jennifer Rexford Princeton University Joint work with Lixin Gao (UMass-Amherst)
Incrementally Deployable Security for Interdomain Routing (TTA-4, Type-I) Jennifer Rexford, Princeton University Joan Feigenbaum, Yale University August,
1 Route Control Platform – IEEE CCW 2004 Route Control Platform Making an AS look and act like a router Aman Shaikh AT&T Labs - Research IEEE CCW 2004.
Wresting Control from BGP: Scalable Fine-grained Route Control UCSD / AT&T Research Usenix —June 22, 2007 Dan Pei, Tom Scholl, Aman Shaikh, Alex C. Snoeren,
Interdomain Routing Establish routes between autonomous systems (ASes). Currently done with the Border Gateway Protocol (BGP). AT&T Qwest Comcast Verizon.
Inherently Safe Backup Routing with BGP Lixin Gao (U. Mass Amherst) Timothy Griffin (AT&T Research) Jennifer Rexford (AT&T Research)
Interdomain Routing Security Jennifer Rexford Advanced Computer Networks Tuesdays/Thursdays.
1 Design and implementation of a Routing Control Platform Matthew Caesar, Donald Caldwell, Nick Feamster, Jennifer Rexford, Aman Shaikh, Jacobus van der.
A Routing Control Platform for Managing IP Networks Jennifer Rexford Princeton University
Internet Routing (COS 598A) Today: Telling Routers What to Do Jennifer Rexford Tuesdays/Thursdays.
Economic Incentives in Internet Routing Jennifer Rexford Princeton University
Network Monitoring for Internet Traffic Engineering Jennifer Rexford AT&T Labs – Research Florham Park, NJ 07932
Stable Internet Routing Without Global Coordination Jennifer Rexford AT&T Labs--Research
1 Interdomain Routing Policy Reading: Sections plus optional reading COS 461: Computer Networks Spring 2008 (MW 1:30-2:50 in COS 105) Jennifer Rexford.
A Routing Control Platform for Managing IP Networks Jennifer Rexford Princeton University
Backbone Networks Jennifer Rexford COS 461: Computer Networks Lectures: MW 10-10:50am in Architecture N101
Wen Xu and Jennifer Rexford Princeton University MIRO : Multi-path Interdomain ROuting.
A Routing Control Platform for Managing IP Networks Jennifer Rexford Princeton University
Stable Internet Routing Without Global Coordination Jennifer Rexford AT&T Labs--Research Joint work with Lixin Gao.
Internet Routing (COS 598A) Today: Router Software Jennifer Rexford Tuesdays/Thursdays 11:00am-12:20pm.
Building a Strong Foundation for a Future Internet Jennifer Rexford ’91 Computer Science Department (and Electrical Engineering and the Center for IT Policy)
Inter-domain Routing Outline Border Gateway Protocol.
Working Group #4: Network Security – Best Practices March 6, 2013 Presenters: Rod Rasmussen, Internet Identity Tony Tauber, Comcast WG #4.
1 Computer Communication & Networks Lecture 22 Network Layer: Delivery, Forwarding, Routing (contd.)
9/15/2015CS622 - MIRO Presentation1 Wen Xu and Jennifer Rexford Department of Computer Science Princeton University Chuck Short CS622 Dr. C. Edward Chow.
CS 3700 Networks and Distributed Systems Inter Domain Routing (It’s all about the Money) Revised 8/20/15.
Working Group 6: Secure BGP Deployment December 16, 2011 Andy Ogielski, Renesys Jennifer Rexford, Princeton U. WG 6 Co-Chairs.
How Secure are Secure Inter- Domain Routing Protocols? SIGCOMM 2010 Presenter: kcir.
Jennifer Rexford Fall 2014 (TTh 3:00-4:20 in CS 105) COS 561: Advanced Computer Networks BGP.
Interdomain Routing Security. How Secure are BGP Security Protocols? Some strange assumptions? – Focused on attracting traffic from as many Ases as possible.
A Firewall for Routers: Protecting Against Routing Misbehavior1 June 26, A Firewall for Routers: Protecting Against Routing Misbehavior Jia Wang.
A Light-Weight Distributed Scheme for Detecting IP Prefix Hijacks in Real-Time Lusheng Ji†, Joint work with Changxi Zheng‡, Dan Pei†, Jia Wang†, Paul Francis‡
Evolving Toward a Self-Managing Network Jennifer Rexford Princeton University
Evolving Toward a Self-Managing Network Jennifer Rexford Princeton University
1 Border Gateway Protocol (BGP) and BGP Security Jeff Gribschaw Sai Thwin ECE 4112 Final Project April 28, 2005.
Michael Schapira, Princeton University Fall 2010 (TTh 1:30-2:50 in COS 302) COS 561: Advanced Computer Networks
Inter-domain Routing Outline Border Gateway Protocol.
Incrementally Deployable Security for Interdomain Routing (TTA-4, Type-I) Elliott Karpilovsky, Princeton University on behalf of Jennifer Rexford, Princeton.
Separating Routing From Routers Jennifer Rexford Princeton University
1 Internet Routing: BGP Routing Convergence Jennifer Rexford Princeton University
1 Internet Routing 11/11/2009. Admin. r Assignment 3 2.
CS 3700 Networks and Distributed Systems
CS 3700 Networks and Distributed Systems
COS 561: Advanced Computer Networks
COS 561: Advanced Computer Networks
COS 561: Advanced Computer Networks
COS 561: Advanced Computer Networks
COS 561: Advanced Computer Networks
BGP Security Jennifer Rexford Fall 2018 (TTh 1:30-2:50 in Friend 006)
COS 461: Computer Networks
Fixing the Internet: Think Locally, Impact Globally
BGP Instability Jennifer Rexford
Presentation transcript:

Incrementally Deployable Security for Interdomain Routing (TTA-4, Type-I) Jennifer Rexford, Princeton University Joan Feigenbaum, Yale University July 11, 2005

2 Problem: Insecure Internet Infrastructure Border Gateway Protocol is important –BGP is the glue that holds the Internet together BGP is extremely vulnerable –Easy to inject false information –Easy to trigger routing instability Vulnerabilities are being exploited –Configuration errors and malicious attacks –Route hijacking, blackholes, denial-of-service, … Changing to a secure protocol is hard –Can’t have a flag day to reboot the Internet

3 Example: Route Hijacking /16 Consequences for the data traffic –Discarded: denial of service –Snooped: violating the user’s privacy –Redirected: identity theft, propagating false info, etc.

4 Solution: Incremental Deployability Backwards compatibility –Work with existing routers and protocols Incentive compatibility –Offer significant benefits, even to the first adopter AS 3 AS 2 AS 1 BGP Inter-AS Protocol RCP Routing Control Platform tells routers how to forward traffic Use BGP to communicate with the legacy routers Use RCP to simplify management and enable new servicesUse RCP to detect (and avoid) suspicious routes Other ASes can deploy an RCP independently ASes with RCPs can cooperate to detect suspicious routes ASes can upgrade to secure interdomain routing protocol … all while still using BGP to control the legacy routers Distributed detection

5 RCP System is Feasible Reliability –Problem: single point of failure –Solution: simple replication of RCP components Consistency –Problem: inconsistent decisions by replicas –Solution: consistency without inter-replica protocol Scalability –Problem: memory and processing demands –Solution: one copy per route; avoid recomputation Can build an RCP for a large ISP on a single high-end PC AT&T prototype:

6 Problem #1: BGP Anomaly Detection Avoid using suspicious/unstable routes –Data-streaming algorithms for anomaly detection –Single AS, and then distributed collection of ASes –Evaluation on data from AT&T and RouteViews –Initial work: detecting known anomalies; wavelets AS 3 AS 2 AS 1 RCP share diagnostic information

7 Problem #2: Routing Policy Management Centralize policy management in the RCP –Policies for filtering, selecting, & exporting routes –Build on a trust-management system Notation for precise policy specification Procedures for deciding an action complies –Initial work: survey study on ISP routing policies AS 1 RCP Filter: discard routes for small subnets; discard suspicious routes Select: prefer routes learned from customers; prefer closer egress points; prefer stable routes Export: do not export peer-learned routes to other peers; do not export infrastructure addresses

8 Problem #3: Secure Inter-AS Protocol Incremental deployment of secure protocol –Analysis of incentives for ASes to upgrade For customer-provider and peer-peer relationships –Analysis of incremental security gain End-to-end security for some traffic Security along a sub-path for the rest –Initial work: sBGP and soBGP as the protocol AS 3 AS 2 AS 1 secure protocol RCP regular BGP

9 Teaming Information: Two PIs Jennifer Rexford, Princeton University –Border Gateway Protocol (BGP) –Internet measurement –Systems and prototyping –Operational experience from AT&T Joan Feigenbaum, Yale University –Security and cryptography –Massive data streams –Trust-management systems –Economics and incentive analysis

10 Teaming Information: Deployment Strategies PlanetLab/Abilene –PlanetLab overlay, managed at Princeton –Nodes deployed in all Internet2 PoPs –Plan: build RCP prototype on XORP open-source router, to drive Click forwarder in PlanetLab nodes –Exploring: direct BGP sessions with other ISPs AT&T backbone –Tier-1 ISP backbone (AS 7018) –Initial RCP prototype built at AT&T –Plan: evaluate RCP applications on archive of AT&T routing and configuration data –Exploring: deployment on top of the AT&T RCP

11 Project Milestones: Three-Year Timeline RCP prototype, and API to data- analysis engine Offline algorithms and upper bounds Identify today’s policies and select notation RCP with API to trust-management system Online analysis algorithm to detect anomalies Integrate policy language in trust management Deployment of RCP in operational networks Deploy online algorithm; create distributed Deploy in trust management system RCP Prototype Anomaly Detection Routing Policy Evaluate incentive compatibility Quantify gains of a partial deployment Investigate new secure inter-AS protocols Secure Routing

12 Anticipated Deliverables Software –RCP prototype built on XORP –Anomaly detection algorithms –Routing-policy management Deployment platform –Integration of RCP in PlanetLab –Supported testbed in the Abilene backbone Analysis –Fundamental limits of anomaly detection –Security benefits of incremental deployment –Incentives for groups of ASes to cooperate

13 Technology Transition Plan Proof-of-concept on PlanetLab/Abilene –Open-source prototype based on XORP –Open interfaces for others to build applications –Large scale deployment as part of PlanetLab AT&T prototype –RCP prototype already built and tested –Evaluation of new RCP applications –Possible deployment in the AT&T backbone Other possibilities –Identifying partners for commercial development

14 Potential Impact: Secure Interdomain Routing Breaking the “flag day” stalemate –Viable approach to incremental deployment –Backwards compatible with the legacy routers –Incentive compatible with goals of each AS Immediate benefits to participating ASes –Avoiding anomalous and suspicious routes –Secure routing with participating neighbors Tipping point leads to ubiquitous deployment –Increasing incentives for ASes to participate –Ultimately, full deployment of secure protocol Insights for other protocols (such as DNSSEC)

15 DESCRIPTION / OBJECTIVES / METHODS Routing Control Platform (RCP) Selects routes on behalf of routers Possible today on high-end PC Incrementally-deployable security Speak BGP to the legacy routers Detect and avoid suspicious routes Update RCPs to use secure protocol DHS/Cyber Security IMPACT Internet routing system is vulnerable Core communication infrastructure Very vulnerable to cyber attacks Hard to have “flag day” for upgrades Phased deployment of secure routing Network manager deploys locally Participating domains detect attacks Neighbor domains upgrade protocol Cyber Security R&D Incrementally Deployable Security for Interdomain Routing Network A BGP RCP Network B Secure routing protocol BUDGET & SCHEDULE TASK FY05FY06FY07 RCP prototype Anomaly detection Policy manager Secure routing Total cost