30
Stealth Probing: Efficient Data-Plane Security for IP Routing Ioannis Avramopoulos Princeton University Joint work with Jennifer Rexford

Stealth Probing: Efficient Data-Plane Security for IP Routing

  • Upload
    senwe

  • View
    38

  • Download
    0

Embed Size (px)

DESCRIPTION

Stealth Probing: Efficient Data-Plane Security for IP Routing. Ioannis Avramopoulos Princeton University Joint work with Jennifer Rexford. Hosts vis-à-vis Routers (Attacks against Availability). Routing Fabric (Routing Protocols). Routing Fabric (Data Forwarding). AS: Autonomous System. - PowerPoint PPT Presentation

Citation preview

Page 1: Stealth Probing: Efficient Data-Plane Security for IP Routing

Stealth Probing: Efficient Data-Plane Security for IP Routing

Ioannis AvramopoulosPrinceton University

Joint work with Jennifer Rexford

Page 2: Stealth Probing: Efficient Data-Plane Security for IP Routing

Hosts vis-à-vis Routers(Attacks against Availability)

Page 3: Stealth Probing: Efficient Data-Plane Security for IP Routing

Routing Fabric(Routing Protocols)

Page 4: Stealth Probing: Efficient Data-Plane Security for IP Routing

Routing Fabric(Data Forwarding)

Page 5: Stealth Probing: Efficient Data-Plane Security for IP Routing

Attacks against the Routing Fabric(Breaking Perimeter Defense)

AS0

AS3

AS4

AS1 AS2

AS: Autonomous System

AS0

AS3

AS4

AS1 AS2

AS: Autonomous System

AS0

AS3

AS4

AS1 AS2

AS: Autonomous System

Perimeters can be broken because of:

Disgruntled network operators

Password guessing

Exploits of the OS

Page 6: Stealth Probing: Efficient Data-Plane Security for IP Routing

Attacks against the Routing Fabric(Routing Protocol Attacks and Defenses)

• These attacks game the routing state by falsifying routing protocol messages

• Falsifications come in two flavors:– Modification of en-route protocol messages– Collusion (or wormhole) attacks

• Secure routing protocols protect from the modification of protocols messages– They do not protect from wormholes– They do not verify forwarding behavior

Page 7: Stealth Probing: Efficient Data-Plane Security for IP Routing

Limitation of Secure Routing Protocols(Data-Plane Adversary)

DATA DATA DATA

Page 8: Stealth Probing: Efficient Data-Plane Security for IP Routing

Attacks against the Routing Fabric (Data-Plane Attacks)

• Link layer disruption– Physical layer attacks– Medium access control layer attacks

• Network layer disruption– Packet loss– Packet modification– Packet delay– Packet deflection

• Transport layer disruption – Attacks against the congestion control mechanism

Page 9: Stealth Probing: Efficient Data-Plane Security for IP Routing

Securing the Routing Fabric(Defending against Data-Plane Attacks)

• Availability monitoring– Easy for the traffic source– Difficult from within the network

• Fault localization– Beaconing and traceroute egregiously fail in

adversarial networks– In adversarial networks, fault localization is

difficult but necessary

Page 10: Stealth Probing: Efficient Data-Plane Security for IP Routing

Overview

• Introduction

• Stealth Probing

• Intradomain Deployment -- Byzantine Tomography

• Interdomain Deployment -- Secure Route Control

• Related Work

• Conclusion

Page 11: Stealth Probing: Efficient Data-Plane Security for IP Routing

Availability Monitoring(Problem Formulation)

Page 12: Stealth Probing: Efficient Data-Plane Security for IP Routing

Naïve Solutions

• Probing (e.g., ping)

• Cumulative network-layer ACKs

• Transport-layer ACKs

ingress egress

Page 13: Stealth Probing: Efficient Data-Plane Security for IP Routing

Stealth Probing(Approach)

• Prevent the adversary from preferentially treating probing traffic by making data and probing traffic indistinguishable

• Three steps1. Create an encrypted tunnel and divert both data

and probing traffic in the tunnel

2. Match the size of probing traffic with that of the data traffic

3. Obscure the timing of probes

Page 14: Stealth Probing: Efficient Data-Plane Security for IP Routing

ingress router egress router

Stealth Probing(Approach---continued)

Page 15: Stealth Probing: Efficient Data-Plane Security for IP Routing

ingress router egress router

Stealth Probing(Approach---continued)

Page 16: Stealth Probing: Efficient Data-Plane Security for IP Routing

Stealth Probing(Primary Benefits)

• Non-intrusive (low overhead)• Detects “delay attacks” (by measuring the

round-trip-times of probing traffic)• Prevents selective low-rate attacks that

target individual IP addresses (by hiding the source and destination IP addresses of data traffic)

• Mitigates attacks that exploit TCP (by making the TCP mechanism “opaque”)

Page 17: Stealth Probing: Efficient Data-Plane Security for IP Routing

Stealth Probing(Secondary Benefits)

• Encryption protects unencrypted host-to-host communications

• Fate-sharing between data traffic and probes is broadly useful in network troubleshooting

• Tunnels are useful in traffic engineering

Page 18: Stealth Probing: Efficient Data-Plane Security for IP Routing

Overview

• Introduction

• Stealth Probing

• Intradomain Deployment -- Byzantine Tomography

• Interdomain Deployment -- Secure Route Control

• Related Work

• Conclusion

Page 19: Stealth Probing: Efficient Data-Plane Security for IP Routing

Basic idea

• Fault localization without overburdening the data plane:– Terminal nodes monitor path availability– Terminal nodes disclose faulty paths to a

designated network entity – This entity “triangulates” adversarial nodes

and links from the collection of faulty paths

Page 20: Stealth Probing: Efficient Data-Plane Security for IP Routing

Byzantine Tomography(Model)

Page 21: Stealth Probing: Efficient Data-Plane Security for IP Routing

Byzantine Tomography(Approach)

Solves Minimum Hitting Set

Page 22: Stealth Probing: Efficient Data-Plane Security for IP Routing

Byzantine Tomography(Basic Property)

• Output from Byzantine tomography is not always accurate

• However, accuracy increases as fault knowledge expands

• Therefore, the higher the adversary’s impact, the more likely it is that the adversary will be correctly detected

Page 23: Stealth Probing: Efficient Data-Plane Security for IP Routing

Overview

• Introduction

• Stealth Probing

• Intradomain Deployment -- Byzantine Tomography

• Interdomain Deployment -- Secure Route Control

• Related Work

• Conclusion

Page 24: Stealth Probing: Efficient Data-Plane Security for IP Routing

Secure Route Control

AS A (Stub)

AS B (Stub)

Provider Provider

ProviderProvider

Provider

Page 25: Stealth Probing: Efficient Data-Plane Security for IP Routing

Secure Route Control (cont.)

AS A (Stub)

AS B (Stub)

Provider Provider

ProviderProvider

Provider

Page 26: Stealth Probing: Efficient Data-Plane Security for IP Routing

Overview

• Introduction

• Stealth Probing

• Intradomain Deployment -- Byzantine Tomography

• Interdomain Deployment -- Secure Route Control

• Related Work

• Conclusion

Page 27: Stealth Probing: Efficient Data-Plane Security for IP Routing

Related Work

• Perlman proposed encryption to make data and control traffic indistinguishable – Perlman proposed encryption at network links– We extend this idea to network paths

• Mizrak et al. proposed Fatih as a secure data-plane availability monitor– Fatih requires clock synchronization– Stealth probing does not rely on clock synchronization

• Several researchers have proposed data-plane mechanisms for secure fault localization– Byzantine tomography is a management-plane technique

Page 28: Stealth Probing: Efficient Data-Plane Security for IP Routing

Conclusion (1)

• Resilience was a top priority in the design of the operational Internet but the threat model was naïve (vis-à-vis today’s attacks)

• In future networks, we should expect to see– better perimeter defense and– in-depth defense

• secure routing protocols• secure data forwarding

• Stealth probing is a secure availability monitor that works by concealing probing traffic

Page 29: Stealth Probing: Efficient Data-Plane Security for IP Routing

Conclusion (2)

• We presented deployment scenarios of this monitor in– Intradomain routing and– Interdomain routing

• Our ongoing work focuses on … :– Intradomain case: … improving the accuracy of

Byzantine tomography– Interdomain case: … investigating the benefits of

more flexible interdomain path selection schemes

Page 30: Stealth Probing: Efficient Data-Plane Security for IP Routing

Thank you

Questions