artemis neutralizing bgp hijacking within a minute
play

ARTEMIS: Neutralizing BGP Hijacking within a Minute Alberto - PowerPoint PPT Presentation

ARTEMIS: Neutralizing BGP Hijacking within a Minute Alberto Dainotti alberto@caida.org Center for Applied Internet Data Analysis University of California, San Diego Joint work with: Pavlos Sermpezis, Vasileios Kotronis, Petros


  1. ARTEMIS: Neutralizing BGP 
 Hijacking within a Minute Alberto Dainotti 
 alberto@caida.org Center for Applied Internet Data Analysis University of California, San Diego Joint work with: 
 Pavlos Sermpezis, Vasileios Kotronis, 
 Petros Gigis, Xenofontas Dimitropoulos, 
 Danilo Cicalese, Alistair King w w w . cai da. or g

  2. BGP HIJACKING stealing/manipulating your routes oAS (your network) Other AS (remote users) Center for Applied Internet Data Analysis 
 Foundation for Research and Technology-Hellas 
 University of California San Diego University of Crete, 2 w w w . cai da. or g

  3. BGP HIJACKING stealing/manipulating your routes BAD_AS oAS (your network) simple hijack Polluted AS (remote users) Center for Applied Internet Data Analysis 
 Foundation for Research and Technology-Hellas 
 University of California San Diego University of Crete, 3 w w w . cai da. or g

  4. BGP HIJACKING stealing/manipulating your routes BAD_AS oAS (your network) man-in-the-middle Polluted AS (MITM) hijack (remote users) Center for Applied Internet Data Analysis 
 Foundation for Research and Technology-Hellas 
 University of California San Diego University of Crete, 4 w w w . cai da. or g

  5. MANDATORY SLIDE WITH NEWS HEADLINES, DATES, 
 BIG NAMES, … Place here your favorite recent headline Place here your favorite recent headline Place here your favorite recent headline Center for Applied Internet Data Analysis 
 Foundation for Research and Technology-Hellas 
 University of California San Diego University of Crete, 5 w w w . cai da. or g

  6. SOLUTIONS IN USE (1/2) Proactive: RPKI • Only 8% of prefixes covered by ROAs [1] 
 complexity / risk of failures 26.7% processing overhead 13.3% • Why? → limited adoption & 
 29.3% OPEX costs costs/complexity [2] 
 18.7% CAPEX costs little security benefit 21.3% • Does not protect the network against 
 not widely adopted 40% all attack types 
 0 10 20 30 40 50 percentage of answers % Reasons for not using RPKI [2] RPKI in your (b) Q12: If no (in Q11), what are the (c) [1] NIST. RPKI Monitor https://rpki-monitor.antd.nist.gov /. May 2018 [2] P. Sermpezis, et. al., " A survey among Network Operators on BGP Prefix Hijacking ", in ACM SIGCOMM CCR, Jan 2018. Center for Applied Internet Data Analysis 
 Foundation for Research and Technology-Hellas 
 University of California San Diego University of Crete, 6 w w w . cai da. or g

  7. 
 SOLUTIONS IN USE (2/2) Reactive: 3rd Party Services • Comprehensiveness : detect only 40 35 simple attacks 32.1% percentage of answers % 30 • Accuracy : prone to false positives (FP) & 25% 25 false negatives (FN) 20 • Speed : manual verification & then manual 14.3% 14.3% 14.3% 15 mitigation 10 • Privacy : need to share private info, 5 routing policies, etc. 0 <1m <15m <1h <24h >24h How much time an operational 
 (f) Q10: If your organization was a network was affected by a hijack [2] [2] P. Sermpezis, et. al., " A survey among Network Operators on BGP Prefix Hijacking ", in ACM SIGCOMM CCR, Jan 2018. Center for Applied Internet Data Analysis 
 Foundation for Research and Technology-Hellas 
 University of California San Diego University of Crete, 7 w w w . cai da. or g

  8. ARTEMIS self-managed detection & mitigation BGP Monitors: - RIPE RIS ARTEMIS - BGPStream -- Live ARTEMIS -- Historical - Local (exaBGP) MONITORING DETECTION MITIGATION Operator Configuration File your AS Center for Applied Internet Data Analysis 
 Foundation for Research and Technology-Hellas 
 University of California San Diego University of Crete, 8 w w w . cai da. or g

  9. A VIEW SHIFT.. ..and suddenly everything makes sense 3rd Party ARTEMIS • Evasion • Evasion • Covers all attack configurations • Detect only simple attacks • Accuracy • Accuracy • 0% FP, 0% FN: for most attacks • Potential for lots of FPs • 0% FN for the remaining ones • or alternatively lots of FNs • Speed (or manage FP-FN trade-off) • Speed • Manual verification & 
 • Automated mitigation: then manual mitigation • Privacy neutralize attacks in a minute • Privacy & Flexibility • Need to share private 
 • full privacy information Center for Applied Internet Data Analysis 
 Foundation for Research and Technology-Hellas 
 University of California San Diego University of Crete, 9 w w w . cai da. or g

  10. PUBLIC MONITORING INFRASTRUCTURE enables visibility of all significant events 1 type 0 type 1 type ≥ 2 Fraction of invisible events 0.8 0.6 0.4 • In the paper: 0.2 • by type of service • Impact 0 • Speed 0 − 1% 1 − 2% 2 − 100% Impact: Percentage of polluted ASes Center for Applied Internet Data Analysis 
 Foundation for Research and Technology-Hellas 
 University of California San Diego University of Crete, 10 w w w . cai da. or g

  11. BGP HIJACKING TAXONOMY 3 dimensions • 1) Based on how the “attacking” AS Path looks like • Type 0 hijack: <prefix: …, BAD_AS > (a.k.a. “prefix origin hijack”) • Type 1 hijack: <prefix: …, BAD_AS , oAS> • Type 2 hijack: <prefix: …, BAD_AS , AS1,oAS> • … • Type N hijack: <prefix: …, BAD_AS , … AS1, oAS> • Type U hijack: <prefix: unaltered_path> 
 • 2) Based on the prefix announced: exact , sub-prefix , or squatting 
 • 3) Based on what happens on the data-plane: Black Holing ( BH ), Imposture ( IM ), Man in the Middle ( MM ) Center for Applied Internet Data Analysis 
 Foundation for Research and Technology-Hellas 
 University of California San Diego University of Crete, 11 w w w . cai da. or g

  12. ATTACK COVERAGE ARTEMIS vs previous literature TABLE 1: Comparison of BGP prefix hijacking detection systems/services w.r.t. ability to detect different classes of attacks. Class of Hijacking Attack Control-plane System/Service Data-plane System/Service Hybrid System/Service Affected AS-PATH Data ARTEMIS Cyclops PHAS iSpy Zheng et al. HEAP Argus Hu et al. prefix (Type) plane (2008) [26] (2006) [41] (2008) [66] (2007) [67] (2016) [57] (2012) [61] (2007) [37] Sub U * � × × × × × × × Sub 0/1 BH � × � × × � � � Sub 0/1 IM � × � × × � × � Sub 0/1 MM � × � × × × × × Sub ≥ 2 BH � × × × × � � � Sub IM � � � ≥ 2 × × × × × Sub MM � ≥ 2 × × × × × × × Exact 0/1 BH � � � � � � × × Exact 0/1 IM � � � × � × × � Exact 0/1 MM � � � × � × × × Exact BH ≥ 2 � × × � × × � � Exact IM ≥ 2 � × × × � × × � Exact MM ≥ 2 � × × × � × × × Center for Applied Internet Data Analysis 
 Foundation for Research and Technology-Hellas 
 University of California San Diego University of Crete, 12 w w w . cai da. or g

  13. ACCURATE DETECTION becomes trivial in most of the cases Hijacking Attack ARTEMIS Detection Prefix AS-PATH Data False False Detection Needed Local Detection (Type) Plane Positives (FP) Negatives (FN) Rule Information Approach Sub-prefix * * None None Config. vs BGP updates Pfx. Sec. 5.2 Squatting * * None None Config. vs BGP updates Pfx. Sec. 5.2 Exact 0/1 * None None Config. vs BGP updates Pfx. + ASN Sec. 5.3 (+ neighbor ASN) Exact ≥ 2 * < 0 . 3 /day for None Past Data vs BGP updates Pfx.+ Past AS links Sec. 5.4 Center for Applied Internet Data Analysis 
 Foundation for Research and Technology-Hellas 
 University of California San Diego University of Crete, 13 w w w . cai da. or g

  14. ACCURATE DETECTION becomes trivial in most of the cases Hijacking Attack ARTEMIS Detection Prefix AS-PATH Data False False Detection Needed Local Detection (Type) Plane Positives (FP) Negatives (FN) Rule Information Approach Sub-prefix * * None None Config. vs BGP updates Pfx. Sec. 5.2 Squatting * * None None Config. vs BGP updates Pfx. Sec. 5.2 Exact 0/1 * None None Config. vs BGP updates Pfx. + ASN Sec. 5.3 (+ neighbor ASN) Exact ≥ 2 * < 0 . 3 /day for None Past Data vs BGP updates Pfx.+ Past AS links Sec. 5.4 > 73% of ASes (bidirectional link) Stage 1 Exact ≥ 2 * None for 63% of ASes < 4% BGP updates Pfx. Sec. 5.4 ( T s 2 = 5 min , (waiting interval, Stage 2 th s 2 > 1 monitors) bidirectional link) hard problem in remaining cases 
 (fake link 2 hops or more from origin 
 + exact prefix hijack) Center for Applied Internet Data Analysis 
 Foundation for Research and Technology-Hellas 
 University of California San Diego University of Crete, 14 w w w . cai da. or g

  15. FAKE LINK (TYPE ≥ 2) HIJACKS Detection: Stage 1 • Triggered when the AS-PATH of a BGP update (for a monitored prefix) contains a N-hop AS-link (N ≥ 2) that is not included in the previously verified AS-links list 
 • Legitimate if this link has been observed in the opposite direction in the AS-links list from monitors and local BGP routers (10 months history). NOW: <your prefix: …, ASX, ASY , oAS> announcement with new link 
 attached to 1-hop neighbor ASY HISTORY: <any prefix: …, ASY, ASX , …> reverse link exists; it was 
 announced by ASY Center for Applied Internet Data Analysis 
 Foundation for Research and Technology-Hellas 
 University of California San Diego University of Crete, 15 w w w . cai da. or g

Recommend


More recommend