Security implications of source- controlled routes Xiaowei Yang UC Irvine NSF FIND PI meeting, June 27 2007.

Slides:



Advertisements
Similar presentations
The role of network capabilities Xiaowei Yang UC Irvine NSF FIND PI meeting, June
Advertisements

Secure Routing Panel FIND PI Meeting (June 27, 2007) Morley Mao, Jen Rexford, Xiaowei Yang.
Enable User Choice in Routing Xiaowei Yang UC Irvine NSF FIND PI meeting, June
June 27, 2007 FIND Meeting, From Packet-Switching to Contract- Switching Aparna Gupta Shivkumar Kalyanaraman Rensselaer Polytechnic Institute Troy,
A CGA based Source Address Authentication Method in IPv6 Access Network(CSA) Guang Yao, Jun Bi and Pingping Lin Tsinghua University APAN26 Queenstown,
Security Issues In Mobile IP
Network Support for Sharing. 2 CABO: Concurrent Architectures are Better than One No single set of protocols or functions –Different applications with.
IP security over ATM CS 329 Hwajung Lee Computer and Communications Security The George Washington University.
Floating Cloud Tiered Internet Architecture Current: Rochester Institute of Technology, Rensselaer Polytechnic Institute, University of Nevada, Reno Level.
IP Router Architectures. Outline Basic IP Router Functionalities IP Router Architectures.
Security in Mobile Ad Hoc Networks
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 EN0129 PC AND NETWORK TECHNOLOGY I NETWORK LAYER AND IP Derived From CCNA Network Fundamentals.
© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—2-1 Extending Switched Networks with Virtual LANs Introducing VLAN Operations.
Dual Homing Experiment Christian Huitema Architect Windows Networking & Communications Microsoft Corporation.
Internetworking II: MPLS, Security, and Traffic Engineering
Transitioning to IPv6 April 15,2005 Presented By: Richard Moore PBS Enterprise Technology.
IP Version 6 Next generation IP Prof. P Venkataram ECE Dept. IISc.
Restoration by Path Concatenation: Fast Recovery of MPLS Paths Anat Bremler-Barr Yehuda Afek Haim Kaplan Tel-Aviv University Edith Cohen Michael Merritt.
Denial of Service in Sensor Networks Anthony D. Wood and John A. Stankovic.
Modelling and Analysing of Security Protocol: Lecture 10 Anonymity: Systems.
NPLA: Network Prefix Level Authentication Ming Li,Yong Cui,Matti Siekkinen,Antti Ylä-Jääski Aalto University, Finland Tsinghua University, China.
Overview of Distributed Denial of Service (DDoS) Wei Zhou.
Distributed Denial of Service Attacks: Characterization and Defense Will Lefevers CS522 UCCS.
Lab Practical 2 Study about different types of Networking Device
Internet Protocol Security An Overview of IPSec. Outline:  What Security Problem?  Understanding TCP/IP.  Security at What Level?  IP Security. 
1 IP Security Outline of the session –IP Security Overview –IP Security Architecture –Key Management Based on slides by Dr. Lawrie Brown of the Australian.
Self-Citation More than 7 papers at places of least relevance Nothing new except for the problem We stress however that our proposal is somewhat motivated.
ATM Networks An Engineering Approach to Computer Networking.
1 TVA: A DoS-limiting Network Architecture Xiaowei Yang (UC Irvine) David Wetherall (Univ. of Washington) Thomas Anderson (Univ. of Washington)
ITIS 6167/8167: Network and Information Security Weichao Wang.
Using Prices to Allocate Resources at Access Points Jimmy Shih, Randy Katz, Anthony Joseph One Administrative Domain Access Point A Access Point B Network.
Postmodern Internet Architecture Defense Zhaosheng Zhu Kevin Tan.
Using Prices to Allocate Resources at Access Points Jimmy Shih, Randy Katz, Anthony Joseph One Administrative Domain Access Point A Access Point B Network.
Building a Strong Foundation for a Future Internet Jennifer Rexford ’91 Computer Science Department (and Electrical Engineering and the Center for IT Policy)
Bandwidth DoS Attacks and Defenses Robert Morris Frans Kaashoek, Hari Balakrishnan, Students MIT LCS.
An Overview Zhang Fu Outline What is DDoS ? How it can be done? Different types of DDoS attacks. Reactive VS Proactive Defence.
DDoS Attack and Its Defense1 CSE 5473: Network Security Prof. Dong Xuan.
InterVLAN Routing Design and Implementation. What Routers Do Intelligent, dynamic routing protocols for packet transport Packet filtering capabilities.
Brief Announcement: Spoofing Prevention Method Anat Bremler-Barr Hanoch Levy computer science computer science Interdisciplinary Center Herzliya Tel-Aviv.
Distributed Denial of Service CRyptography Applications Bistro Presented by Lingxuan Hu April 15, 2004.
Module 4: Designing Routing and Switching Requirements.
Architecting for Innovation ACM SIGCOMM Computer Communication Review 2011 July Presenter :許耀中
Establishing Connections Networking Modes: When you are evaluating a network, you concentrate on circuit switching versus packet switching. But it's also.
Network Presence, LLC SM Innovative Security Solutions SM Understanding, Planning For, and Responding To Denial of Service Attacks SANS 2001.
Network Architecture: Design Philosophies IS250 Spring 2010 John Chuang
Security Issues in Control, Management and Routing Protocols M.Baltatu, A.Lioy, F.Maino, D.Mazzocchi Computer and Network Security Group Politecnico di.
1 Countering DoS Through Filtering Omar Bashir Communications Enabling Technologies
Universal, Ubiquitous, Unfettered Internet © ui.com Pte Ltd Mobile Internet Protocol under IPv6 Amlan Saha 3UI.COM Global IPv6 Summit,
10 Semester 1 JEOPARDY Frank Mann LayersPathsPathsSubnetsSubnetsClassesClassesReservedReserved
Lecture 6 Page 1 Advanced Network Security Review of Networking Basics Advanced Network Security Peter Reiher August, 2014.
Packet switching network Data is divided into packets. Transfer of information as payload in data packets Packets undergo random delays & possible loss.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNP 1 v3.0 Module 1 Overview of Scalable Internetworks.
Denial of Service DoS attacks try to deny legimate users access to services, networks, systems or to other resources. There are DoS tools available, thus.
Introducing a New Concept in Networking Fluid Networking S. Wood Nov Copyright 2006 Modern Systems Research.
science/internet-intro
ReSerVation Protocol (RSVP) Presented by Sundar P Subramani UMBC.
Chapter 10 Switching and Routing Cisco Learning Institute Network+ Fundamentals and Certification Copyright ©2005 by Pearson Education, Inc. Upper Saddle.
Jia Uddin Embedded System Lab.  MPLS  IMANET  IMANET network model  Proposed model of IMANET with MPLS  Conclusion.
RMTP-II Security Considerations Brian Whetten GlobalCast Communications.
Computer Network Architecture Lecture 7: OSI Model Layers Examples II 1 26/12/2012.
© ITT Educational Services, Inc. All rights reserved. IS3120 Network Communications Infrastructure Unit 7 Layer 3 Networking, Campus Backbones, WANs, and.
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
Comparison of Network Attacks COSC 356 Kyler Rhoades.
Network Layer COMPUTER NETWORKS Networking Standards (Network LAYER)
Virtual Private Network (VPN)
Planning and Troubleshooting Routing and Switching
CSE 4905 Network Security Overview
Virtual Private Network (VPN)
1 Multi-Protocol Label Switching (MPLS). 2 MPLS Overview A forwarding scheme designed to speed up IP packet forwarding (RFC 3031) Idea: use a fixed length.
Presentation transcript:

Security implications of source- controlled routes Xiaowei Yang UC Irvine NSF FIND PI meeting, June

Source-controlled routing is controversial Secure routing depends on source routes Security is the #1 reason to disable source routes Why we can reconcile these two ISP1 ISP4 ISP3 ISP2

Byzantine-tolerant routing [Perlman88] [Wendlandt06] A discriminatory/nosy ISP, a hostile country ISP1 ISP3 ISP2

Accountable routing Accountability is key to innovation [Laskowski06] User knows the path responsible for the performance [Goldberg07] ISP1 ISP4 ISP3 ISP2

Symmetric return path DDoS defense Network capabilities [Yang05] Private path-based addressing [Handley04] Accountability ISP1 ISP4 ISP3 ISP2 token

Source-controlled routing is controversial Secure routing depends on source routes Security is the #1 reason to disable source routes Why we can reconcile these two ISP1 ISP4 ISP3 ISP2

Source routing breaks address- based authentication attackerIP attackerIP Source routing in IPv4 is largely disabled Without source routing, packets will not return to spoofed addresses

Bandwidth amplification attack IPv6 makes it worse Allows 44 intermediate nodes [BIONDI07] ( CanSecWest 2007 ) Source: [Biondi07] R1 R2 R1 R2 R1 R2….

Increased power to DDoS ISP1 ISP3 ISP2 … Targeted link flooding Multi-path flooding

Forced path oscillation ISP1 ISP4 ISP3 ISP2 …

Interfere with ISP policies Make your ISP broke ISP1 ISP4 ISP3 ISP2 $$$ $ ISP Source

Slow down the routers

Can we make source- controlled routes innocuous?

Main causes of the security issues Control and exposure Source-controlled routing Source routing option in IPv4 or Routing header in IPv6 A set of design goals: Security, accountability, economic incentives, overhead A variety of mechanisms Amplified security issues Lack of mechanisms Explicitly list the routers Deflect without Knowing the paths Choose paths Knowing entities on the paths No control

Bandwidth amplification attacks Select paths, not arbitrary waypoints Path 1 Path 2 Path 3 Source: [Biondi07]

Interfere with ISP policies Provide policy-allowed paths Pricing Inter-domain choices ISP1 ISP4 ISP3 ISP2 $$$ $ Path 1: $$$ Path 2: $

Source routing breaks address- based authentication Light-weight network-layer authentication Unspoofable source identifiers [Liu06] attackerIP X

Increased power to DDoS ISP1 ISP3 ISP2 … A DoS-defense system that cuts off attack traffic at its source

Forced path oscillation ISP1 ISP4 ISP3 ISP2 … Stable path selection protocol Do not switch all at once Use multiple paths [He06] Admission control and resource reservation

Slow down routers Fix the routers Do not let the present hardware implementation limit future innovations Encapsulation/decapsulation at line speed

Conclusion The desirable goals Byzantine-tolerant, accountability, availability, economic incentives, overhead, QoS, manageability… The right balance of control and exposure Source-controlled routing Source routing option in IPv4 or Routing header in IPv6 Deflect without Knowing the paths Choose paths knowing entities on the paths Explicitly list the routers No control