Akmal KhanAkmal Khan 08-27-2009fif.kr/fisc2009/doc/08.pdf · Table 1 : Prefix Hijacking Solutions...
Transcript of Akmal KhanAkmal Khan 08-27-2009fif.kr/fisc2009/doc/08.pdf · Table 1 : Prefix Hijacking Solutions...
Akmal KhanAkmal Khan08-27-2009
OutlineOutlineIntroductionIntroduction
Related WorkRelated Work
Proposed Solutionp
Experimental Results
Conclusion
2
Internet AbstractionsInternet Abstractions
Collection of Hosts, Routers,Point of Presence(PoP’s) orAutonomous System(AS)
An AS is a connected group of one or moreAn AS is a connected group of one or more IP prefixes run by one or more network operators which has a SINGLE andoperators which has a SINGLE and CLEARLY DEFINED routing policy(RFC 1930))
3
Border Gateway Protocol (BGP)Border Gateway Protocol (BGP)Inter-domain routing protocol(Inter AS)○ Critical Communications and Business
Infrastructure!Vulnerable to different threatsVulnerable to different threats○ Configuration/Human Errors▫ “Patches” applied as threats are exploded pp p▫ E2E solutions require collaboration
1 2 0 0/16
(AS_PATH, prefix)
1.2.0.0/164
{1} p {2 1} p
p
1 2 3
{1}, p {2, 1}, p5
{3, 2, 1}, p
4
Prefix Hijacking 101Announce someone else's prefixAnnounce a more specific of a someone else's prefixSynopsis: You are trying to “steal” someone else’s traffic by getting itsomeone else s traffic by getting it routed to you.C t iff di t i l t t ffiCapture, sniff, redirect, manipulate traffic as you wish.
5
P fi Hij ki i lPrefix Hijacking…simple case
AS 4Prefix Path
1.2.0.0/16 2, 11.2.0.0/16 path: 5
Prefix Path
1.2.0.0/16 5Advertise 1.2.0.0/16
AS 3AS 5
,5 1.2.0.0/16 51.2.0.0/16
AS 3
Prefix Path
1 2 0 0/16 2 1
Prefix Path
1 2 0 0/16 4 5MOAS (Multiple Origin AS)
1.2.0.0/16 path: 4, 5
1.2.0.0/16 2, 11.2.0.0/16 4, 5( p g )
Advertise 1.2.0.0/16
Prefix Path
1.2.0.0/16 1AS 1 AS 2
6
Types of Prefix hijacking(PH)Types of Prefix hijacking(PH)[Type1]Prefix hijacking /Duplicate PH[ yp ] j g p
AS1 owns 1.2.0.0/16 but advertised by AS2[Type2]Sub prefix hijacking[Type2]Sub prefix hijacking
AS2 advertises 1.2.3.0/24[Type3]AS Path Spoofing[Type3]AS Path Spoofing
AS5 announce [5 1] without having peering with AS1[Type4]Independent PH[Type4]Independent PH
AS2 use Bogons (unused address space) [T 5]M i th iddl (MITM) Att k[Type5]Man in the middle (MITM) Attacks
7
BGP Prefix hijacking Incidentsj gDid AS13214 really hijack the Internet?• http://bgpmon net/blog/?p=80http://bgpmon.net/blog/?p 80
• Cyclops detects global routing leak by AS13214AS13214
• Don’t be afraid of AS3130..April 2009• http://cyclops cs ucla edu/• http://cyclops.cs.ucla.edu/
• WorldofWarcraft.com and WoWarmory.com sub-prefix hijacked (July 2008)sub-prefix hijacked (July 2008)
• YouTube’s prefix hijacked by Pakistan Telecom February 2008Telecom February 2008
8
O tlineOutline
IntroductionIntroduction
Related WorkRelated Work
Proposed Solutionp
Experimental Results
Conclusion
9
Major Research GroupsMajor Research GroupsUniversity of California Los Angeles(LixiaZhang)
Internet Research Lab(irl)CAIDAColorodo State University (Dan Massey)Colorodo State University (Dan Massey)
Network Security Research GroupUniversity of Princeton(Jennifer Rexford)University of Princeton(Jennifer Rexford)
Incrementally Deployable Secure Interdomain RoutingUniversity of Michigan(Z.Morley Mao)
RobustNet Group
Major Research GroupsMajor Research GroupsN ti l I tit t f St d d dNational Institute of Standards and Technology(Advanced Network Technologies Division)Technologies Division)
Trustworthy NetworkingBGP Security and Routing Robustnesshttp://w3.antd.nist.gov/
University of Swinburne (Geoff Huston)CAIACAIA
UCL,Loouvain-la-Neuve,Belgium(Olivier Bonaventure)Bonaventure)
INL:IP Networking Lab
BGP Solutions CategoriesBGP Solutions CategoriesPreventione e o
S-BGP,SO-BGP,SPVMitigationMitigation
Wang et.al,PG-BGP,Zhang et al.AnycastR tiRouting
Detect & AlertmyASN,IAR,Phas->Cyclops,BGPmon.net
Detect & RecoverDetect & RecoverProbabilistic IP Prefix Hijacking(PIPA)
Table 1 : Prefix Hijacking Solutions
Detectio Alarm Prefix/ Subpref Super/ Path MITMDetectionSystem
AlarmType
Prefix/Duplicate PH
Subprefix PH
Super/Independent PH
PathSpoofing
MITM
PHAS [ hit H Origin Y Y N limited NPHAS [mohitet al]
H Origin,Last Hop,SubAllocation
Y Y N limited N
PG BGP H Prefix Sub Y Y N Y limitedPG-BGP[J.Karlin et al]
H Prefix, SubPrefix
Y Y N Y limited
K.Sriram etal [
H+R N Y Y N Y Nal. [
Nemecis R N Y Y N N N
Hu et al. H N Y Y N Y N
13
Table 1 : Taxonomy of Prefix Hijacking Solutions (PH: Prefix Hijacking, Y: yes, N: No, H: History, R: Registry, Un: Unreachability, MITM: Man In The Middle)
Cyclops..AS-Centric Visualization tool
Data sourcesBGP routing tables + updates: Route Views, RIPE, Abilene, CERNET BGP View Route Servers: Packet Clearing House, UCR, t t R t S Wikitraceroute.org, Route Server Wiki Looking Glasses: traceroute.org, NANOG, Looking Glass WikiLooking Glass Wiki
OthersMapnet,Otter,HERMES,VAST,FixedOrbit
htt // l l d /http://cyclops.cs.ucla.edu/
Some More toolsSome More tools
PCH-Prefix Sanity CheckerRIPE-MyASN ServiceyBGPPlayBGP tBGPmon.net
15
Tools to use & get inspirationTools to use & get inspirationLinux Distribution(Ubuntu),Java,C/C++,Perl,Python, mySQL,…
Quagga 0 99 14Quagga 0.99.14IRRd - Internet Routing Registry 2.3.9Irrtoolset 4.8.5I P T lIrrPowerToolsStraighRVMRT dump file manipulation toolkit(MDFMT) version 0.2p p ( )
BGP4MPTableDump V2
PrefixanalyzeryPybgpdumpDpkt 1.6LinkRank Beta 02LinkRank Beta 02
....
O tlineOutline
IntroductionIntroduction
Related WorkRelated Work
Proposed Solutionp
Partial Experimental Results
Conclusion
17
PIPA Data SourcesPIPA Data SourcesRIR/Internet Route Registry(IRR)
Registration information/Policy Information○ RADb,RIPE,ARIN,APNIC
BGP Data CollectorsRouteViews(240) RIPE-RIS(>600)RouteViews(240), RIPE-RIS(>600)○ No. of BGP collector deployed around the world
New Data Source [unreachability information]• New Data Source [unreachability information]Hubble Project/iPlane[Ethan K.et al]
18
How is Unreachability helpful?Internet Goals : Global ReachabilityPrefix hijacking can affect some of the AsesPrefix hijacking can affect some of the Ases.
E.g. AS5 hijacked the Prefix of AS1 and black h l ll th t ffihole all the trafficApplications in some AS will observe U h bilitUnreachability
There are projects like Hubble/iPlane which provides information about the blackholes & unreachabilities duration
Help detecting prefix hijackingPinpointing the location of hijackerPinpointing the location of hijacker
19
Probabilistic IP Prefix Authentication (PIPA)
Continuously update theContinuously update the Probability of prefix hijack based on its reach ability information around theinformation around the world
Possible promotionPossible promotion /demotion of historically best BGP Path of certain prefixprefix
20
Hijack Probability AssignmentHijack Probability AssignmentEvery Prefix can be assigned a Hijack y g jProbability based on it’s conformance with
Historical StandingsgRegistry StandingsReal time Unreachability statisticsReal time Unreachability statistics
Non conformance with History/Registry can raise early Alarms and Recovery process canraise early Alarms and Recovery process can be started.
Probability score can be continuously updated basedProbability score can be continuously updated based on real time statistics i.e. BGP updates, etc.
21
P fi Hij k D i Ch llPrefix Hijack Detection ChallengeHow to differentiate between differentHow to differentiate between different unreachability
Unreachability due to equipment failures , line cuts,Unreachability due to equipment failures , line cuts, etc.
MITM: When there are no un-reachabilitiesHow to detect MOAS conflicts
○ Registry data if accurately updatedg y y p○ Maintaining knows AS home Set
IP Prefix: 1.2.0.0/16Owner AS: AS1Owner AS: AS1IP Prefix Homes : AS1,…
22
Prefix Hijack RecoveryPrefix Hijack RecoveryN t k t ifi fiNetwork operator announces more specific prefixto recover from Prefix hijack situation
Longest Prefi Matching Wins○ Longest Prefix Matching Wins○ But what if that is the one already hijacked.
Contact the malicious/misconfigured party or its providerContact the malicious/misconfigured party or its provider
PIPA based on its results can suggest toparticular AS to use Previous used route which itparticular AS to use Previous used route which itwas using before the introduction of newmalicious or erroneous prefixmalicious or erroneous prefix
23
Prefix Hijack Recovery 1 2 3 0/24 i Prefix Hijack RecoveryAttacker is able to attract all traffic
1.2.3.0/24 is a hijacked route
PIPAAttacker is able to attract all traffic
AS 4
Pefix Path
1.2.3.0/24 5Advertise1 2 3 0/24
AS 3AS 5
1.2.0.0/16 2, 11.2.3.0/24
AS 3
Prefix Path
1.2.0.0/16 2, 1
Prefix Path
1.2.3.0/24 4,5Send packet to 1.2.3.4 in AS 1 ,1.2.3.0/24 4,5
1.2.0.0/16 2, 1
L P f
Advertise 1.2.0.0/16
Prefix Path
1.2.0.0/16 1
AS 1 AS 2 Prefix Path
1.2.3.0/24 4,5
1.2.0.0/16 1
Longest Prefix Matching
24
1.2.0.0/16 1
O tlineOutline
IntroductionIntroduction
Related WorkRelated Work
Proposed Solutionp
Experimental Results
Conclusion
25
No.of Hrs Passed100
Ases Reachability
40
45
50
80
90
100
25
30
35
rs P
asse
d
50
60
70
each
abili
ty
15
20
25
NO
. of H
r
30
40
50
Perc
enta
ge R
e
0
5
10
0
10
20
1 23 45 67 89 111
133
155
177
199
221
243
265
287
309
331
353
375
397
419
441
463
No. of Ases
0
1 20 39 58 77 96 115
134
153
172
191
210
229
248
267
286
305
324
343
362
381
400
419
438
457
No.of ASes
26
Experimental MethodologyExperimental Methodology
Initial experimental ResultsComparison of False Alarms with PGBGPData collectedPGBGP suspicious Announcements(5/2006-3/2009)
Provided by Josh Karlin○ Public RIR/IRR data
H bbl h bilit t ti ti○ Hubble unreachability statisticsRun checks to see whether routes are suspicious as announced by PGBGP IARannounced by PGBGP IAR.Result: Too much suspicion is not good
27
PG BGP Alerts 5/2006 3/2009PG-BGP Alerts 5/2006-3/2009
261387
90564119734
59277
/2006 /2007 /2008 /2009
28
60000
PG-BGP Susipicouson over the years month wise50000
p y
40000
30000
20000
10000
0
2006
/520
06/6
2006
/720
06/8
2006
/920
06/1
020
06/1
120
06/1
220
07/1
2007
/220
07/3
2007
/420
07/5
2007
/620
07/7
2007
/820
07/9
2007
/10
2007
/11
2007
/12
2008
/120
08/2
2008
/320
08/4
2008
/520
08/6
2008
/720
08/8
2008
/920
08/1
020
08/1
120
08/1
220
09/1
2009
/220
09/3
29
Comparison with PGBGPComparison with PGBGPPGBGP-marks new routes suspicious if they ydo not conform to the History BGP[24 hrs]PIPA—Let them work but observer theirPIPA Let them work but observer their performance (unreachabilities)
False Alarms
60
70
80
90
ctio
n
30
40
50
60
se H
ijack
Det
ec
0
10
20
PIPA PGBGP
Fals
30
PIPA PGBGP
C l i & F t W kConclusion & Future WorkExtensive Review of existing solutionsExtensive Review of existing solutionsInclusion of New data source for PH detectiondetection
“unreachability” data collected in real time.C I t t S lf f PH?Can Internet Self recover from PH?
Proposed PH recovery mechanism Where can we find self healing property of Internet?
W ki th f ll l lWe are working on the full level implementation and experimental results of PIPAPIPA
31
C l i & F t W kConclusion & Future WorkExtensive Review of existing solutionsExtensive Review of existing solutionsInclusion of New data source for PH detectiondetection
“unreachability” data collected in real time.C I t t S lf f PH?Can Internet Self recover from PH?
Proposed PH recovery mechanism Where can we find self healing property of Internet?
W ki th f ll l lWe are working on the full level implementation and experimental results of PIPAPIPA
32
Some ? To myselfSome ? To myself
What about the current state of implementation of PKI for DNSSEC/Who IS.
How can we include/adopt that?pHow to deploy PIPA?H PIPA d t t MITM?How PIPA detects MITM???
ReferencesReferences[Ethan K. et al]Studying Black holes in the Internet with Hubble http://hubble.cs.washington.edu p g[M. Lad et.al] PHAS: A Prefix Hijack Alert System, in USENIX Security Symposium 2006. [Hu et al ] Accurate Real time Identification of IP Prefix Hijacking I[Hu et al.] Accurate Real-time Identification of IP Prefix Hijacking,IEEE Security and Privacy, Oakland, 2007 [J. Karlin, et al.] Pretty Good BGP: Improving BGP by Cautiously Adopting Routes,IEEE ICNP 2006, Santa Barbara, CA, USA, Nov. 2006 • Internet Alert Registry[http://iar cs unm edu]• Internet Alert Registry[http://iar.cs.unm.edu][G. Siganos et al.],A Blueprint for Improving the Robustness of Internet Routing,Security ‘06, 2006.
34