rover: a dns-based method to detect and prevent ip hijacksgersch/cs457/rover.pdf · ip hijacking...

50
ROVER: A DNS-Based method to Detect and Prevent IP Hijacks Joseph Gersch CSU Department of Computer Science PhD Final Exam Thursday, September 26, 2013 1 Friday, September 27, 13

Upload: others

Post on 09-Jul-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: ROVER: A DNS-Based method to Detect and Prevent IP Hijacksgersch/cs457/ROVER.pdf · IP Hijacking intentional or mis-configuration Black Holes R Us IP hijack meant to censor YouTube

ROVER: A DNS-Based method to Detect and Prevent IP Hijacks

Joseph GerschCSU Department of Computer Science

PhD Final ExamThursday, September 26, 2013

1

Friday, September 27, 13

Page 2: ROVER: A DNS-Based method to Detect and Prevent IP Hijacksgersch/cs457/ROVER.pdf · IP Hijacking intentional or mis-configuration Black Holes R Us IP hijack meant to censor YouTube

Agenda• Introduction:

• Problem Statement: IP Hijacking

• minimal discussion of background and prior work

• Thesis Statement

• Invention: ROVER

• Research Results

• Global Internet Simulation & Inherent Metrics

• Analysis of IP Hijack Propagation

• Analysis of Incremental Defense Deployment

• Pragmatic Self-Interest Protections

• ROVER Reliability, Resilience, and Scalability

• Publications & Contributions

• Conclusion & Future Directions2

Friday, September 27, 13

Page 3: ROVER: A DNS-Based method to Detect and Prevent IP Hijacksgersch/cs457/ROVER.pdf · IP Hijacking intentional or mis-configuration Black Holes R Us IP hijack meant to censor YouTube

What is IP hijacking? How does it happen?

• BGP (Border Gateway Protocol) communicates routing data among Autonomous System (AS) networks across the world.

• BGP has no security. BGP simply trusts data from its neighbors.

I own 129.82/16

Intro Solution ConclusionResearch

3

Friday, September 27, 13

Page 4: ROVER: A DNS-Based method to Detect and Prevent IP Hijacksgersch/cs457/ROVER.pdf · IP Hijacking intentional or mis-configuration Black Holes R Us IP hijack meant to censor YouTube

What is IP hijacking? How does it happen?

• BGP (Border Gateway Protocol) communicates routing data among Autonomous System (AS) networks across the world.

• BGP has no security. BGP simply trusts data from its neighbors.

I own 129.82/16

I own 129.82/16

Intro Solution ConclusionResearch

3

Friday, September 27, 13

Page 5: ROVER: A DNS-Based method to Detect and Prevent IP Hijacksgersch/cs457/ROVER.pdf · IP Hijacking intentional or mis-configuration Black Holes R Us IP hijack meant to censor YouTube

Hijack Consequences

• Black-hole an address block -- take them off the net• Impersonate• Eavesdrop• Send Spam and avoid detection• Not to mention.... crime and cyber-warfare

Leon Panetta: “A cyber-attack perpetrated by nation states or violent extremist groups could be as destructive as the terrorist attack on 9/11. Such a destructive cyber-terrorist attack could virtually paralyze the nation. They could use these kinds of cyber tools to gain control of critical switches. They could, for example, derail passenger trains or even more dangerous, derail trains loaded with lethal chemicals. They could contaminate the water supply in major cities or shutdown the power grid across large parts of the country. The most destructive scenarios involve cyber actors launching several attacks on our critical infrastructure at one time, in combination with a physical attack on our country. Attackers could also seek to

Intro Solution ConclusionResearch

4

Friday, September 27, 13

Page 6: ROVER: A DNS-Based method to Detect and Prevent IP Hijacksgersch/cs457/ROVER.pdf · IP Hijacking intentional or mis-configuration Black Holes R Us IP hijack meant to censor YouTube

IP Hijacking intentional or mis-configuration

February 2008YouTube goes missing for 2 hours

Intro Solution ConclusionResearch

5

Friday, September 27, 13

Page 7: ROVER: A DNS-Based method to Detect and Prevent IP Hijacksgersch/cs457/ROVER.pdf · IP Hijacking intentional or mis-configuration Black Holes R Us IP hijack meant to censor YouTube

IP Hijacking intentional or mis-configuration

Black Holes R Us

IP hijack meant to censor YouTube in Pakistan leaked from router to router across the entire world

Intro Solution ConclusionResearch

5

Friday, September 27, 13

Page 8: ROVER: A DNS-Based method to Detect and Prevent IP Hijacksgersch/cs457/ROVER.pdf · IP Hijacking intentional or mis-configuration Black Holes R Us IP hijack meant to censor YouTube

RELATED WORK

• Much research into DETECTION, REACTIVE MITIGATION, & PROACTIVE PREVENTION techniques

• Detection is non-trivial; many attacks go undetected

• Reactive & Proactive Prevention Methods proposed to date are difficult to deploy and are not cost-effective

Intro Solution ConclusionResearch

6

Friday, September 27, 13

Page 9: ROVER: A DNS-Based method to Detect and Prevent IP Hijacksgersch/cs457/ROVER.pdf · IP Hijacking intentional or mis-configuration Black Holes R Us IP hijack meant to censor YouTube

Scoresheet: Factors affecting Solution Deployment

Intro Solution ConclusionResearch

Butler et al: “we...explain why no solution has yet struck an adequate balance between comprehensive security and deployment cost.”

7

Friday, September 27, 13

Page 10: ROVER: A DNS-Based method to Detect and Prevent IP Hijacksgersch/cs457/ROVER.pdf · IP Hijacking intentional or mis-configuration Black Holes R Us IP hijack meant to censor YouTube

Lots of proposals...But has it REALLY been solved?

• It’s been 16 years and there is no deployed solution....

• Current solutions are either too complex and costly to deploy, or are insufficient in what they solve --- Hobson’s Choice

• IT Risk Assessment Formula:• probability * impact > cost

• probability is low• Most ISP impact is low• But some are EXTREMELY

high

• Most ISP’s have “low/low”• But some have REALLY HIGH

impact!

• Will the reluctant or complacent many block a deployment needed by the few, especially if is too costly?

Intro Solution ConclusionResearch

8

Friday, September 27, 13

Page 11: ROVER: A DNS-Based method to Detect and Prevent IP Hijacksgersch/cs457/ROVER.pdf · IP Hijacking intentional or mis-configuration Black Holes R Us IP hijack meant to censor YouTube

Thesis StatementIntro Solution ConclusionResearch

"A system based on the existing DNS infrastructure can be deployed by a small number of institutions in an incremental fashion and still effectively thwart origin and sub-prefix IP hijacking despite non-participation by the majority of Autonomous System owners.”

9

Friday, September 27, 13

Page 12: ROVER: A DNS-Based method to Detect and Prevent IP Hijacksgersch/cs457/ROVER.pdf · IP Hijacking intentional or mis-configuration Black Holes R Us IP hijack meant to censor YouTube

Solution Proposal

“ROVER”

Cost-effective Route Origin Verification using the pre-existing DNSSEC infrastructure

Securely Publish, authoritatively Verify

Intro Solution ConclusionResearch

10

Friday, September 27, 13

Page 13: ROVER: A DNS-Based method to Detect and Prevent IP Hijacksgersch/cs457/ROVER.pdf · IP Hijacking intentional or mis-configuration Black Holes R Us IP hijack meant to censor YouTube

ROVER Architecture

11

Friday, September 27, 13

Page 14: ROVER: A DNS-Based method to Detect and Prevent IP Hijacksgersch/cs457/ROVER.pdf · IP Hijacking intentional or mis-configuration Black Holes R Us IP hijack meant to censor YouTube

Converting a CIDR address to a DNS Domain Name

12

Friday, September 27, 13

Page 15: ROVER: A DNS-Based method to Detect and Prevent IP Hijacksgersch/cs457/ROVER.pdf · IP Hijacking intentional or mis-configuration Black Holes R Us IP hijack meant to censor YouTube

Example zone fileIntro Solution ConclusionResearch

13

Friday, September 27, 13

Page 16: ROVER: A DNS-Based method to Detect and Prevent IP Hijacksgersch/cs457/ROVER.pdf · IP Hijacking intentional or mis-configuration Black Holes R Us IP hijack meant to censor YouTube

ROVER Verification of a BGP Announcement

• Upon receiving a BGP announcement and performing a DNS lookup based on the IP prefix:

• origin MATCH with DNS ==> VALID

• origin MISMATCH with DNS ==> BOGUS (origin hijack)

• no data found, RLOCK exists ==> BOGUS (sub-prefix hijack)

• no data found, no RLOCK ==> ALLOW (same as today, not authenticated)

Intro Solution ConclusionResearch

14

Friday, September 27, 13

Page 17: ROVER: A DNS-Based method to Detect and Prevent IP Hijacksgersch/cs457/ROVER.pdf · IP Hijacking intentional or mis-configuration Black Holes R Us IP hijack meant to censor YouTube

Rover ExampleHijack Detection

• proof-of-concept testbed has been online over a year

• LEVEL3 experiment: “catch me if you can”

• detected hijack within 30 seconds of launch and detected it in multiple vantage points across the world!

Intro Solution ConclusionResearch

15

Friday, September 27, 13

Page 18: ROVER: A DNS-Based method to Detect and Prevent IP Hijacksgersch/cs457/ROVER.pdf · IP Hijacking intentional or mis-configuration Black Holes R Us IP hijack meant to censor YouTube

Research Results

16

Friday, September 27, 13

Page 19: ROVER: A DNS-Based method to Detect and Prevent IP Hijacksgersch/cs457/ROVER.pdf · IP Hijacking intentional or mis-configuration Black Holes R Us IP hijack meant to censor YouTube

Research ResultsDoes it work? How well does it work?

What are its issues and limits?

• Global Internet Characteristics & Measurements

• Characterize Attack Propagation to Establish a Behavioral Baseline

• Analyze Defensive Methods:

• Incremental Filter Deployment

• Incremental Detector Deployment

• Pragmatic Self-Interest Actions

• Analyze Rover Resilience, Robustness & Scalability

Intro Solution ConclusionResearch

17

Friday, September 27, 13

Page 20: ROVER: A DNS-Based method to Detect and Prevent IP Hijacksgersch/cs457/ROVER.pdf · IP Hijacking intentional or mis-configuration Black Holes R Us IP hijack meant to censor YouTube

Research Results

Global Internet Characteristics and Measurements

18

Friday, September 27, 13

Page 21: ROVER: A DNS-Based method to Detect and Prevent IP Hijacksgersch/cs457/ROVER.pdf · IP Hijacking intentional or mis-configuration Black Holes R Us IP hijack meant to censor YouTube

Simulation ProgramModeling the global internet

Intro Solution ConclusionResearch

Sanity Checks:

compare to RIBs, TRACEROUTE, Looking-glass ROUTERs

compare known attacks

Cannot be identical to real net, but must be reasonable for evaluating results

19

Friday, September 27, 13

Page 22: ROVER: A DNS-Based method to Detect and Prevent IP Hijacksgersch/cs457/ROVER.pdf · IP Hijacking intentional or mis-configuration Black Holes R Us IP hijack meant to censor YouTube

Simulation Accuracy

20

Friday, September 27, 13

Page 23: ROVER: A DNS-Based method to Detect and Prevent IP Hijacksgersch/cs457/ROVER.pdf · IP Hijacking intentional or mis-configuration Black Holes R Us IP hijack meant to censor YouTube

Base MetricsIntro Solution ConclusionResearch

21

Friday, September 27, 13

Page 24: ROVER: A DNS-Based method to Detect and Prevent IP Hijacksgersch/cs457/ROVER.pdf · IP Hijacking intentional or mis-configuration Black Holes R Us IP hijack meant to censor YouTube

“Depth” Distribution

Tier-1 centric topology

Depth = number of hops to the nearest tier-1 AS

22

Friday, September 27, 13

Page 25: ROVER: A DNS-Based method to Detect and Prevent IP Hijacksgersch/cs457/ROVER.pdf · IP Hijacking intentional or mis-configuration Black Holes R Us IP hijack meant to censor YouTube

Research Results

Characterizing Attack Propagation and AS Vulnerability

23

Friday, September 27, 13

Page 26: ROVER: A DNS-Based method to Detect and Prevent IP Hijacksgersch/cs457/ROVER.pdf · IP Hijacking intentional or mis-configuration Black Holes R Us IP hijack meant to censor YouTube

Polar Graph Evolution (modified from prelim exam)

radius = degree radius = depth

Intro Solution ConclusionResearch

24

Friday, September 27, 13

Page 27: ROVER: A DNS-Based method to Detect and Prevent IP Hijacksgersch/cs457/ROVER.pdf · IP Hijacking intentional or mis-configuration Black Holes R Us IP hijack meant to censor YouTube

Attack VarianceIntro Solution ConclusionResearch

Moratel vs Google ISI vs Harvest Electronics NZ25

Friday, September 27, 13

Page 28: ROVER: A DNS-Based method to Detect and Prevent IP Hijacksgersch/cs457/ROVER.pdf · IP Hijacking intentional or mis-configuration Black Holes R Us IP hijack meant to censor YouTube

Effect of Depth on Attack Propagation

Intro Solution ConclusionResearch

26

Friday, September 27, 13

Page 29: ROVER: A DNS-Based method to Detect and Prevent IP Hijacksgersch/cs457/ROVER.pdf · IP Hijacking intentional or mis-configuration Black Holes R Us IP hijack meant to censor YouTube

Vulnerability AnalysisAll 42k ASes attack specific target

Intro Solution ConclusionResearch

27

Friday, September 27, 13

Page 30: ROVER: A DNS-Based method to Detect and Prevent IP Hijacksgersch/cs457/ROVER.pdf · IP Hijacking intentional or mis-configuration Black Holes R Us IP hijack meant to censor YouTube

Re-defining “depth”distance from tier-1 or Tier-2 backbone network

Tier-1 Vulnerability Tier-2 Vulnerabilityvery similar behavior

28

Friday, September 27, 13

Page 31: ROVER: A DNS-Based method to Detect and Prevent IP Hijacksgersch/cs457/ROVER.pdf · IP Hijacking intentional or mis-configuration Black Holes R Us IP hijack meant to censor YouTube

But hey, don’t the Transit ASes try to filter their customers?

29

Friday, September 27, 13

Page 32: ROVER: A DNS-Based method to Detect and Prevent IP Hijacksgersch/cs457/ROVER.pdf · IP Hijacking intentional or mis-configuration Black Holes R Us IP hijack meant to censor YouTube

Impact of private peering and internet exchanges

• Private Peering: helps keep paths to the private peer intact, but makes attack to peer stronger (so filtering would be required)

• IX = many to many peering; the same observations apply

30

Friday, September 27, 13

Page 33: ROVER: A DNS-Based method to Detect and Prevent IP Hijacksgersch/cs457/ROVER.pdf · IP Hijacking intentional or mis-configuration Black Holes R Us IP hijack meant to censor YouTube

Research Results

Analysis of incremental Filter Deployment(Rover, RPKI or any other method)

31

Friday, September 27, 13

Page 34: ROVER: A DNS-Based method to Detect and Prevent IP Hijacksgersch/cs457/ROVER.pdf · IP Hijacking intentional or mis-configuration Black Holes R Us IP hijack meant to censor YouTube

Defensive Filtering for a Relatively Attack-Resistant AS

Intro Solution ConclusionResearch

32

Friday, September 27, 13

Page 35: ROVER: A DNS-Based method to Detect and Prevent IP Hijacksgersch/cs457/ROVER.pdf · IP Hijacking intentional or mis-configuration Black Holes R Us IP hijack meant to censor YouTube

Comparison of filter Deployments: how many & Where?

Relatively Resistant Target Relatively Vulnerable TargetAverage # polluted ASes in successful attack

•Tier-1: 5,084•degree >= 500: 1,076•degree >= 300: 378•degree >= 200: 228•degree >= 100: 66

Average # polluted ASes in successful attack•Tier-1: 22,018•degree >= 500: 8,562•degree >= 300: 2,716•degree >= 200: 1,576•degree >= 100: 163

Intro Solution ConclusionResearch

33

Friday, September 27, 13

Page 36: ROVER: A DNS-Based method to Detect and Prevent IP Hijacksgersch/cs457/ROVER.pdf · IP Hijacking intentional or mis-configuration Black Holes R Us IP hijack meant to censor YouTube

Even after Filtering, some attacks are still aggressive

• When AS 11537 attacks AS 98:

• no filters: 11,650 ASes become polluted• with filters at degree >= 100: 1025 ASes become

polluted (better, but still a lot)• analysis of polar graph can help determine where

additional filters could be placed

Top 5 attackers for AS98, after filtering at AS degree >= 100

Intro Solution ConclusionResearch

34

Friday, September 27, 13

Page 37: ROVER: A DNS-Based method to Detect and Prevent IP Hijacksgersch/cs457/ROVER.pdf · IP Hijacking intentional or mis-configuration Black Holes R Us IP hijack meant to censor YouTube

Research Results

Analysis of Incremental Detection Deployment

35

Friday, September 27, 13

Page 38: ROVER: A DNS-Based method to Detect and Prevent IP Hijacksgersch/cs457/ROVER.pdf · IP Hijacking intentional or mis-configuration Black Holes R Us IP hijack meant to censor YouTube

IP Hijack Detection• 8000 random attacks

• Compare 3 Deployment Strategies:

• Tier-1: • 34% undetected

• average pollution = 2,344• median pollution = 1806• max pollution = 20,306

• BGPMON: • 11% undetected

• average pollution = 1,521• median pollution = 673• max pollution = 12,542

• 62 detectors at ASes with degree>500:

• 3% undetected• average pollution = 202• median pollution = 125• max pollution = 2804

Intro Solution ConclusionResearch

36

Friday, September 27, 13

Page 39: ROVER: A DNS-Based method to Detect and Prevent IP Hijacksgersch/cs457/ROVER.pdf · IP Hijacking intentional or mis-configuration Black Holes R Us IP hijack meant to censor YouTube

Research Results

Pragmatic self-interest

37

Friday, September 27, 13

Page 40: ROVER: A DNS-Based method to Detect and Prevent IP Hijacksgersch/cs457/ROVER.pdf · IP Hijacking intentional or mis-configuration Black Holes R Us IP hijack meant to censor YouTube

while the world stands and watches....

I’ll do it by myself

• If inaction by others, what can an AS do on its own?• analyze relevant AS topology• reduce vulnerability• publish route origins and recruit others to publish (look for

dependencies)• incorporate filters based on published data• use detection

186 NZ ASes

Intro Solution ConclusionResearch

38

Friday, September 27, 13

Page 41: ROVER: A DNS-Based method to Detect and Prevent IP Hijacksgersch/cs457/ROVER.pdf · IP Hijacking intentional or mis-configuration Black Holes R Us IP hijack meant to censor YouTube

ROVER Reliability, Resilience, and

Scalability

Threat Models and Failure Modes

Operational Considerations

Global DNS Capacity and Load

Resolving the Perceived Circular dependency between BGP and DNS

39

Friday, September 27, 13

Page 42: ROVER: A DNS-Based method to Detect and Prevent IP Hijacksgersch/cs457/ROVER.pdf · IP Hijacking intentional or mis-configuration Black Holes R Us IP hijack meant to censor YouTube

Threat Models and Failure modes

• Vulnerabilities• BGP

communication• DNS

communication• subscriber

communication• System

Redundancy and Fail-over

Intro Solution ConclusionResearch

Attackers exploit vulnerabilities to mask attacks, prevent alarms, or trigger false alarms

40

Friday, September 27, 13

Page 43: ROVER: A DNS-Based method to Detect and Prevent IP Hijacksgersch/cs457/ROVER.pdf · IP Hijacking intentional or mis-configuration Black Holes R Us IP hijack meant to censor YouTube

An improved SystemIntro Solution ConclusionResearch

Internal ROVER DBExponential DNS Re-TrySubscriber Keep-Alives

41

Friday, September 27, 13

Page 44: ROVER: A DNS-Based method to Detect and Prevent IP Hijacksgersch/cs457/ROVER.pdf · IP Hijacking intentional or mis-configuration Black Holes R Us IP hijack meant to censor YouTube

Operational Considerations

• Operators will make mistakes; need to allow experimental publishing to verify correctness

• Transferring a prefix to another AS• IPv6: a /48 covering to a /64 requires 65k

zone cuts

• Solution: modify RLOCK and SRO records for activation time, flag, and prefix-limit fields

Intro Solution ConclusionResearch

42

Friday, September 27, 13

Page 45: ROVER: A DNS-Based method to Detect and Prevent IP Hijacksgersch/cs457/ROVER.pdf · IP Hijacking intentional or mis-configuration Black Holes R Us IP hijack meant to censor YouTube

Conclusion

Contributions, Future Directions,Publications & Conference Presentations

43

Friday, September 27, 13

Page 46: ROVER: A DNS-Based method to Detect and Prevent IP Hijacksgersch/cs457/ROVER.pdf · IP Hijacking intentional or mis-configuration Black Holes R Us IP hijack meant to censor YouTube

Contributions

• Developed Solution Taxonomy for IP Hijacks• ROVER design: Resource Records, Reverse-DNS Domain

Naming Convention and Validation Algorithm• Web-based ROVER testbed• Global Internet Simulation Program, underlying database and

graphics output• Research on Internet Measurements, Vulnerability Analysis,

Incremental Filter Deployment, Incremental Detection Deployment;

• introduced depth and reach metrics.• Analysis of Robustness, Resilience and Scalability leading to

required design improvements

44

Friday, September 27, 13

Page 47: ROVER: A DNS-Based method to Detect and Prevent IP Hijacksgersch/cs457/ROVER.pdf · IP Hijacking intentional or mis-configuration Black Holes R Us IP hijack meant to censor YouTube

Future Directions

• Determine methods to communicate directly with routers for real-time hijack filtering

• Analysis of attacks that still get by critical mass filters (improve from 90% -> 99%)

• More research on pragmatic self-interest; processes, tools and methods

• Get ROVER deployed and accepted45

Friday, September 27, 13

Page 48: ROVER: A DNS-Based method to Detect and Prevent IP Hijacksgersch/cs457/ROVER.pdf · IP Hijacking intentional or mis-configuration Black Holes R Us IP hijack meant to censor YouTube

Publications & Presentations

• “Reverse-DNS Naming Convention for CIDR address blocks”, in Securing and Trusting Internet Names, SATIN2012 • “Reverse-DNS Naming Convention for CIDR address blocks”, IETF draft• “DNS Resource Records for BGP Routing Data”, IETF draft• Secure64 ROVER web site and testbed• “BGP Route Origin Verification Using Reverse DNS” and similar presentations at

• RIPE64• NANOG55• AUSNOG ’12• TIP2013

• “ROVER: Route Origin Verification Using DNS”, ICCCN 2013• “Characterizing Vulnerability to IP Hijack Attempts”, IEEE-HST 2013• “Effective Incremental Deployment of BGP Security”, submitted to IEEE INFOCOM 2014

• Also:• presented to ISOC Outreach Committee, • Presented to US FCC, FCC CSRIC committees• Presentations by CenturyLink to US Government Departments• Publishing of ROVER data by significant organizations: AT&T, HP, CenturyLink, Level3, Internet2 members

Intro Solution ConclusionResearch

46

Friday, September 27, 13

Page 49: ROVER: A DNS-Based method to Detect and Prevent IP Hijacksgersch/cs457/ROVER.pdf · IP Hijacking intentional or mis-configuration Black Holes R Us IP hijack meant to censor YouTube

Final SummaryIntro Solution ConclusionResearch

"A system based on the existing DNS infrastructure can be deployed by a small number of institutions in an incremental fashion and still effectively thwart origin and sub-prefix IP hijacking despite non-participation by the majority of Autonomous System owners.”

47

Friday, September 27, 13

Page 50: ROVER: A DNS-Based method to Detect and Prevent IP Hijacksgersch/cs457/ROVER.pdf · IP Hijacking intentional or mis-configuration Black Holes R Us IP hijack meant to censor YouTube

Questions?

48

Friday, September 27, 13