850 likes | 1.4k Views
Network Reachability-based IP Prefix Hijacking Detection - PhD Thesis Defense -. Seongcheol Hong Supervisor: Prof. James Won-Ki Hong December 16, 2011 Distributed Processing & Network Management Lab. Dept. of Computer Science and Engineering POSTECH, Korea. Presentation Outline.
E N D
Network Reachability-basedIP Prefix Hijacking Detection- PhD Thesis Defense - Seongcheol Hong Supervisor: Prof. James Won-Ki Hong December 16, 2011 Distributed Processing & Network Management Lab. Dept. of Computer Science and Engineering POSTECH, Korea
Presentation Outline • Introduction • Related Work • Research Approach • Reachability Based Hijacking Detection (RBHD) • Evaluation and Results • Conclusions
Introduction • Routing protocols communicate reachability information and perform path selection • BGP is the Internet’s de facto inter-domain routing protocol AS 1 iBGP advertise 1.10.0.0/16 AS 1 AS 2 advertise 1.10.0.0/16 AS 2 eBGP AS 2 AS 300
Introduction • What is IP prefix hijacking? • Stealing IP addresses belonging to other networks • It can occur on purpose or by mistake • Serious threat to the robustness and security of the Internet routing system • IP prefix hijacking attack types • NLRI falsification • AS path falsification advertise 1.2.0.0/16 • IP prefix hijacking incidents • AS 7007 incident • YouTube hijacking • Chinese ISP hijacking AS 4 AS 5 Attacker AS 3 AS 2 AS 1 advertise 1.2.0.0/16 Victim
Research Motivation • IP prefix hijacking is a crucial problem in the Internet security • Number of efforts were introduced • Security enabled BGP protocols • Hijacking detection methods • Every existing BGP security solutions have limitations • Security enabled BGP protocols are impractical to deploy • Hijacking detection methods cannot detect every types of IP prefix hijacking threats • We need a novel approach which is practical and covers all types of IP prefix hijacking attacks
Research Goals • Target approach • Security enabled BGP protocol • IP prefix hijacking detection method • Developing a new approach which is practical and detects all types of IP prefix hijacking • IP hijacking detection system does not require cooperation of ASes and does not have to be located in a specific monitoring point • Proposed approach should be validated in simulated environments using real network data
Related Work • Security enabled BGP protocol
Related Work • Existing IP hijacking detection methods
Related Work • Comparison among IP hijacking detection methods
Research Approach • IP prefix hijacking detection based on network reachability advertise1.2.0.0/16 AS 5 AS 4 Attacker This update is IP hijacking case AS 3 reachability test Multiple origin AS? 1.2.0.0/16 Reached the intended network? AS 2 AS 1 Victim
Reachability-Based Hijacking Detection (RBHD)
Network Reachability Examination • IP prefix hijackingis an attack which influences the network reachability • We have developed network fingerprinting techniques for network reachability examination • Network fingerprinting is active or passive collection of characteristics from a target network (AS level) • Network fingerprint should be unique to distinguish a certain network A B A = B if and only if FingerprintA = FingerprintB FingerprintB FingerprintA
Network Fingerprinting • What can uniquely characterize a network? • IP prefix information • Number of running servers in the network • A static live host or device in the network (e.g., IDS or IPS) • Firewall policy • Geographical location of the network • Etc. • We have selected static live host information and firewall policy as network fingerprints • Static live host: Web server, mail server, DNS server, IPS device, and etc. • Firewall policy: allowed port numbers or IP addresses Not changed frequently
Static Live Host • Requirements of live hosts • Operated in most ASes • Easy to obtain IP addresses • Always provide services for its AS • Allow external connection and respond to active probing • DNS server satisfies all of these requirements • Provide a conversion service between domain names and IP addresses • Part of the core infrastructure of the Internet • Always provide service and allow external connections from any host
DNS Server List Collection • BGP-RIB of RouteViews • ‘RouteViews’ collects global routing information • RIB consists of IP prefixes and AS paths • DNS server collection process
DNS Server Fingerprinting • Host fingerprint of DNS server is used as network fingerprint • DNS server fingerprinting • DNS protocol information • DNS domain name information • DNS server configuration information
Firewall Policy as Alternative Fingerprint • DNS host fingerprints are not sufficient for reachability monitoring of all ASes in the Internet • The ASes in which a DNS server is not found exist (such as IX) • Suitability of firewall policies as network fingerprints • Number of possible combination is huge • Protocol • Port number • IP address • E.g.) ACCEPT TCP from anywhere to 224.0.0.251 TCP Port:80 REJECT ICMP from anywhere to anywhere ICMP unreachable • Firewall policy fingerprinting is performed by active probing • Direction • Permission Target Network Probing packets
Reachability-Based Hijacking Detection (RBHD) • Identification of NLRI falsification • Identification of AS path falsification • DNS host fingerprinting • Firewall policyfingerprinting BGP update NLRI falsification? AS path falsification? N N Valid update Y Y An available DNS server in the target network? N Y Collect DNS host fingerprints Collect firewall policyfingerprints Match the existing fingerprints? Match the existing fingerprints? N N Y Y Valid update Invalid update
Evaluations and Results
DNS Server Collection Result • Current state of DNS server operation • 304,106 IP prefixes (8,414,294 /24 prefixes) in BGP-RIB • 77,530 DNS server’s information using DNS forward/reverse query to /24 prefixes * The number of IP prefixes owned by each AS
Host Fingerprint Groups • The total number of distinguishable fingerprints are 73,781 (total DNS server 77,530) * The number of distinguishable DNS server fingerprints
Uniqueness of Fingerprints • N: the total number of collected DNS servers • G: the total number of mutually exclusive fingerprints • For each group, ni is defined as the number of DNS servers that belong to i-th fingerprint group Ni • The collision probability PC: • In our result, • N is 77,530 and G is 73,781 • Pc in our experiment is 2.69 x 10-6 • We conclude that the sufficient level of distinction can be applied in our proposed host fingerprinting method.
Differences of Firewall Policies * Network B * Network A * Network C * Network D
IP Prefix Hijacking Testbed false announcement two networks are randomly selected (IP address in this slide are anoymized) Collect current fingerprints Collect AS A’s fingerprints Translate IP address ex) 192.168.1.0 => 192.168.31.0
Conclusions Summary Contributions Future Work
Summary • We proposed a new approach that practically detects IP prefix hijacking based on network reachability monitoring • We used a fingerprinting scheme in order to determine the network reachability of a specific network • We proposed DNS host and firewall policy fingerprinting methods for network reachability monitoring • We validated the effectiveness of the proposed method in the IP hijacking test-bed
Contributions • The problems of existing IP prefix hijacking detection techniques are addressed • The absence of detection techniques which deal with all IP prefix hijacking cases leads to the development of new methodologies which are suitable for the current Internet • Our approach provides the practical network fingerprinting method for the reachability test of all ASes • DNS host fingerprinting • Firewall policy fingerprinting • Novel and real-time IP prefix hijacking detection methods are described and validated with the real network data.
Future Work • Enhancement of our DNS server finding and fingerprinting method • Optimization of inferring the firewall policies with small probing packets • Analyzing the performance and feasibility of our fingerprinting approach on the Internet • Applying our hijacking detection system to a real research network
PhD Thesis Defense, Seongcheol Hong December 16, 2011 Q & A
IP Prefix Hijacking Incidents • AS7007 incident • April 25 1997 • Caused by a misconfigured router that flooded the Internet with incorrect advertisement • YouTube Hijacking • February 24 2008 • Pakistan's attempt to block YouTube access within their country takes down YouTube entirely • Chinese ISP hijacks the Internet • April 8 2010 • China Telecom originated 37,000 prefixes not belonging to them
Related Work • Security enabled BGP protocol
Related Work • Existing IP hijacking detection methods
Solution Approach Research Hypothesis An independent system can perform real-time IP prefix hijacking detection using network reachability monitoring without any changes of existing Internet infrastructure
Legitimate Case advertise1.2.0.0/16 AS 5 AS 4 AS 3 This update is valid Static link reachability test Multiple origin AS? O Reached the intended network? AS 2 AS 1 1.2.0.0/16
Common Legitimate Cases • Xin Hu and Z. Morley Mao, “Accurate Real-time Identification of IP Prefix Hijacking”
Distinguishable Groups of Each fingerprints * DNS domain name information * DNS protocol information * DNS server configuration
DNS Server Fingerprint * DNS server fingerprinting process * Structure of DNS server fingerprint
The Use of Sweep Line for Firewall Policy Inference • Example of the sweep line algorithm on a 2-dimensional space
Suspicious Update Frequency • Suspicious update frequency • During 2 weeks monitoring from BGP-RIB