Detecting Internet Traffic Interception based on Route Hijacking
|
|
- Sharon Parks
- 6 years ago
- Views:
Transcription
1 Detecting Internet Traffic Interception based on Route Hijacking Alberto Dainotti Center for Applied Internet Data Analysis University of California, San Diego Joint work with: Pavlos Sermpezis, Vasileios Kotronis, Petros Gigis, Xenofontas Dimitropoulos, Jae Hyun Park, Danilo Cicalese, Alistair King
2 INTERNET ROUTE HIJACKING a threat to your organization and to critical infrastructure BAD_AS oas (your network) Polluted AS simple hijack (remote users) 2
3 INTERNET ROUTE HIJACKING a threat to your organization and to critical infrastructure BAD_AS oas (your network) Polluted AS (remote users) man-in-the-middle (MITM) hijack 3
4 INTERNET ROUTE HIJACKING many MITM events documented BAD_AS oas (your network) Polluted AS (remote users) Nov
5 INTERNET ROUTE HIJACKING many MITM events documented BAD_AS oas (your network) Polluted AS (remote users) In few minutes, a single attack can manipulate millions of flows causing: service disruption, fraud, data theft, bad reputation, 5
6 ATTACKS UNDER THE RADAR can have large impact Hijack Types: Type hijack: <prefix: BAD_AS, > (a.k.a. prefix origin hijack ) oas, BAD_AS, > Type hijack: <prefix: ARTEMIS: Neutralizing BGP Hijacking within a Minute Type 2 hijack: <prefix: oas, AS, BAD_AS, > lots of attention.8 CDF % 2% 4% 6% 8% Percentage of polluted ASes (a) % Percentage of polluted ASes all events invisible events (stream services) invisible events (all services) Hijack 3 4 (b) 6 Figure : Impact of di erent hijack s: (a) CDF
7 ATTACKS UNDER THE RADAR can have large impact Hijack Types: Type hijack: <prefix: BAD_AS, > (a.k.a. prefix origin hijack ) oas, BAD_AS, > Type hijack: <prefix: ARTEMIS: Neutralizing BGP Hijacking within a Minute Type 2 hijack: <prefix: oas, AS, BAD_AS, >.8 CDF % 2% 4% 6% 8% Percentage of polluted ASes (a) % Percentage of polluted ASes all events invisible events (stream services) invisible events (all services).8 often neglected Hijack 3 4 (b) 7 Figure : Impact of di erent hijack s: (a) CDF
8 STATE OF THE ART False Positives + False Negatives Third-party Detection Services False Positives unless you promptly communicate changes to your network configuration Privacy? False Negatives Most services focus on Type- attacks Hard to detect more sophisticated attacks (Type-, Type-2, ) Mitigation? No integration with mitigation solutions Btw, would you mitigate if uncertain? how later? 8
9 NEED EARLY & ACCURATE DETECTION + FAST MITIGATION 9
10 OUR APPROACH ARTEMIS (/3) public infrastructure Realtime BGP Monitoring using CoNEXT 7, December 27, Seoul, South ~2 vantage points worldwide (BGP routers) impactful events Detect events in few seconds! (tested with experiments on the real Internet) Percentage of invisible events Provides visibility of all Percentage of invisible events source: RouteViews, RIPE RIS, Colorado State Univ. BGPMon processing: CAIDA s BGPStream % 2% 2 % Impact: Percentage of polluted ASes (a) all monitors % 5% Impact: Perc (b) stream Figure 3: Percentage (y-axis) of the hi grouped by impact (x-axis), that are
11 OUR APPROACH ARTEMIS (2/3) Detection without outsourcing Run locally: leverages knowledge of your network configuration Accurate: Detects all s of attacks! No false negatives for all visible attacks No false positives for most s of attacks; demonstrated extremely low rate otherwise No sharing of private data Transparency: open source code
12 OUR APPROACH ARTEMIS (3/3) Mitigation Automated + flexible (it can be configured on a per-prefix basis) Both autonomous or outsourced Prefix de-aggregation Announcement and tunneling from other ASes CoNEXT 7, December 27, Seoul, South Korea P. Sermpezis et al. Contact offending AS and its neighbors outsourcing: random ASes outsourcing: #providers ASes outsourcing: top ISPs filtering: top ISPs Number of ASes (a) Hijack 8 Mean percentage of polluted ASes Mean percentage of polluted ASes.8 outsourcing: random ASes outsourcing: #providers ASes outsourcing: top ISPs filtering: top ISPs Number of ASes 8 Type Type Type2 Type3 without outsourcing 5.% 28.6% 6.9%.6% top ISPs 2.4% 8.2% 6.2% 4.5% AK 2.4%.3%.2%.% CF 4.8%.8%.4%.4% VE 5.%.9%.4%.3% IN NE 7.3%.% 2.3% 3.3%.3%.%.%.5% (b) Hijack Figure Center 6: E ciency mitigation via outsourcing BGP for Applied of Internet Data Analysis University of California San Diego announcements to organizations selected (i) randomly, and based on their (ii) number of providers and (iii) Table 3: Mean percentage of polluted ASes, when outsourcing BGP announcements to organizations providing DDoS protection services. Foundationtoforless Research e.g., leading thanand 5%Technology-Hellas polluted ASes (one order of mag nitude lower compared to the initial impact) with only 3 top2
13 ARTEMIS CONFIGURATION sample Configuration file configure manually extract from routers / route reflector pre-populate from RADB? // Artemis configuration for our main prefixes prefixes: /6,.../24 origin_asns: 43, 432 neighbors: 4, 32, 267, 45, 28, 7462, 423 mitigation: deaggregate // Artemis configuration for prefixes we use only at site #2 prefixes: /24, /24 origin_asns: 43 neighbors: 28, 7462, 423 mitigation: deaggregate, outsource 3
14 PILOT DEPLOYMENT try ARTEMIS Pilot deployment of detection component - all you need is a box with Python Feedback Read our paper draft Contribute to the development of scripts etc. 4
15 THANKS 5
16 ONE LAST SLIDE - We are also developing a centralized service (an Internet observatory for BGP hijacks and anomalies) which does not need deployment in your network - Soon you ll be able to subscribe to receive notifications and inspect events on a dashboard - If you upload your ARTEMIS configuration file it is going to be more accurate and may provide more information about the incident 6
Alberto Dainotti
HI-Cube / HI 3 Hub for Internet Incidents Investigation Alberto Dainotti alberto@caida.org Center for Applied Internet Data Analysis University of California, San Diego LARGE-SCALE INCIDENTS a threat to
More informationBGPStream: a framework for historical analysis and real-time monitoring of BGP data Chiara Orsini, Alistair King, Alberto Dainotti
BGPStream: a framework for historical analysis and real-time monitoring of BGP data Chiara Orsini, Alistair King, Alberto Dainotti alberto@caida.org www.caida.org Center for Applied Internet Data Analysis
More information48hrs after the 1st BGP Hackathon
48hrs after the 1st BGP Hackathon Alberto Dainotti alberto@caida.org www.caida.org Center for Applied Internet Data Analysis University of California, San Diego BGP HACKATHON 2016 https://www.caida.org/workshops/bgp-hackathon/1602/
More informationA framework for BGP data analysis
A framework for BGP data analysis Alberto Dainotti, Alistair King, Chiara Orsini, Vasco Asturiano chiara@caida.org BGPSTREAM A software framework for the historical analysis and real-time monitoring BGP
More informationA framework for BGP data analysis. Alberto Dainotti, Alistair King, Chiara Orsini, Vasco Asturiano
A framework for BGP data analysis Alberto Dainotti, Alistair King, Chiara Orsini, Vasco Asturiano alistair@caida.org THE PROBLEM * Lack of tools for efficient analysis of large volumes of BGP data * BGPdump
More informationSENSS: Software-defined Security Service
SENSS: Software-defined Security Service Minlan Yu University of Southern California Joint work with Abdulla Alwabel, Ying Zhang, Jelena Mirkovic 1 Growing DDoS Attacks Average monthly size of DDoS attacks
More informationAnalysis of Country-wide Internet Outages Caused by Censorship
CAIDA Workshop on BGP and Traceroute data August 22nd, 211- San Diego (CA), USA Analysis of Country-wide Internet Outages Caused by Censorship Alberto Dainotti - alberto@unina.it University of Napoli Federico
More informationbgpand - Architecting a modular BGP4 Attack & Anomalies Detection Platform
bgpand - Architecting a modular BGP4 Attack & Anomalies Detection Platform Mayank Bhatnagar TechMahindra Limited, SDF B-1, NSEZ, Noida-201305, India E-mail : mayank.bhatnagar2@techmahindra.com Abstract
More informationJumpstarting BGP Security. Yossi Gilad Joint work with: Avichai Cohen, Amir Herzberg, and Michael Schapira
Jumpstarting BGP Security Yossi Gilad Joint work with: Avichai Cohen, Amir Herzberg, and Michael Schapira Prefix hijacking Victim Path: 111 AS X AS 111 Boston University BGP Ad. AS 666 Data flow 2 Prefix
More informationRouting Is At Risk. Let's Secure It Together. Andrei Robachevsky 1
Routing Is At Risk. Let's Secure It Together Andrei Robachevsky robachevsky@isoc.org 1 No Day Without an Incident 120 6 month of suspicious activity 100 80 60 Hijack Leak 40 20 0 1/1/17 2/1/17 3/1/17 4/1/17
More informationEvaluation of Prefix Hijacking Impact Based on Hinge-Transmit Property of BGP Routing System
Evaluation of Prefix Hijacking Impact Based on Hinge-Transmit Property of BGP Routing System Evaluation of Prefix Hijacking Impact Based on Hinge-Transmit Property of BGP Routing System School of Computer,
More informationBGPStream and OpenBMP
Meeting with Cisco Systems San Jose, CA, 5th Dec 2017 BGPStream and OpenBMP Alberto Dainotti, Alistair King alberto@caida.org, alistair@caida.org Center for Applied Internet Data Analysis University of
More informationRouting Is At Risk. Let's Secure It Together. Andrei Robachevsky 1
Routing Is At Risk. Let's Secure It Together Andrei Robachevsky robachevsky@isoc.org 1 No Day Without an Incident 120 6 month of suspicious activity 100 80 60 Hijack Leak 40 20 0 1/1/17 2/1/17 3/1/17 4/1/17
More informationInternet Kill Switches Demystified
Internet Kill Switches Demystified Benjamin Rothenberger, Daniele E. Asoni, David Barrera, Adrian Perrig EuroSec 17, Belgrade B.Rothenberger 23.04.2017 1 B.Rothenberger 23.04.2017 2 Internet Kill Switches
More informationRAPTOR: Routing Attacks on Privacy in Tor. Yixin Sun. Princeton University. Acknowledgment for Slides. Joint work with
RAPTOR: Routing Attacks on Privacy in Tor Yixin Sun Princeton University Joint work with Annie Edmundson, Laurent Vanbever, Oscar Li, Jennifer Rexford, Mung Chiang, Prateek Mittal Acknowledgment for Slides
More informationMANRS Mutually Agreed Norms for Routing Security
27 March 2018 MANRS Mutually Agreed Norms for Routing Security Kevin Meynell meynell@isoc.org Presentation title Client name Internet Society 1992 2016 1 The Problem A Routing Security Overview 2 The Basics:
More informationHow Complete and Accurate is the Internet Routing Registry (IRR)?
How Complete and Accurate is the Internet Routing Registry (IRR)? Dec 5 th 2011 4th CAIDA-WIDE-CASFI Joint Measurement Workshop Akmal Khan, Hyun-chul Kim, Ted "Taekyoung" Kwon Seoul National University
More informationSecuring BGP: The current state of RPKI. Geoff Huston Chief Scientist, APNIC
Securing BGP: The current state of RPKI Geoff Huston Chief Scientist, APNIC Incidents What happens when I announce your addresses in BGP? All the traffic that used to go to you will now come to me I can
More informationUpdate from the RIPE NCC
Update from the RIPE NCC INEX Meeting, Dublin, 14 December 2011 Mirjam Kühne, RIPE NCC Outline RIPE Labs - Background, Purpose, Content, Participation IPv6 Activities and Statistics RIPE Atlas RIPEstat
More informationUnderstanding BGP Miscounfiguration
Understanding Archana P Student of Department of Electrical & Computer Engineering Missouri University of Science and Technology appgqb@mst.edu 16 Feb 2017 Introduction Background Misconfiguration Outline
More informationRouting Security We can do better!
Routing Security We can do better! And how MANRS can help Andrei Robachevsky robachevsky@isoc.org 1 No Day Without an Incident 120 6 month of suspicious activity 90 60 Hijack Leak 30 0 1/5/17 1/16/17 1/27/17
More informationSoftware Systems for Surveying Spoofing Susceptibility
Software Systems for Surveying Spoofing Susceptibility Matthew Luckie, Ken Keys, Ryan Koga, Bradley Huffaker, Robert Beverly, kc claffy https://spoofer.caida.org/ NANOG68, October 18th 2016 www.caida.o
More informationBGPMON.IO: THE MANY NEW FACES OF BGPMON
BGPMON.IO: THE MANY NEW FACES OF BGPMON Colorado State University Spiros Thanasoulas and Christos Papadopoulos NANOG 69, Feb 6-8 2017, Washington DC Work supported by NSF #CNS1305404, DHS #D15PC00205,
More informationHow WebSafe Can Protect Customers from Web-Based Attacks. Mark DiMinico Sr. Mgr., Systems Engineering Security
How WebSafe Can Protect Customers from Web-Based Attacks Mark DiMinico Sr. Mgr., Systems Engineering Security Drivers for Fraud Prevention WebSafe Protection Drivers for Fraud Prevention WebSafe Protection
More informationFuture Internet Architectures
Future Internet Architectures Brighten Godfrey cs598pbg Nov 4 2010 slides 2010 by Brighten Godfrey unless otherwise noted Tussle in Cyberspace What tussles have we studied this semester? Choice in routing
More informationA Measurement Study of BGP Misconfiguration
A Measurement Study of BGP Misconfiguration Ratul Mahajan, David Wetherall, and Tom Anderson University of Washington Motivation Routing protocols are robust against failures Meaning fail-stop link and
More informationMANRS Mutually Agreed Norms for Routing Security
6 July 2018 MANRS Mutually Agreed Norms for Routing Security Kevin Meynell Manager, Technical & Operational Engagement meynell@isoc.org Presentation title Client name Internet Society 1992 2018 1 The Problem
More informationStrobeLight: Lightweight Availability Mapping and Anomaly Detection. James Mickens, John Douceur, Bill Bolosky Brian Noble
StrobeLight: Lightweight Availability Mapping and Anomaly Detection James Mickens, John Douceur, Bill Bolosky Brian Noble At any given moment, how can we tell which enterprise machines are online and
More informationAS-CRED: Reputation Service for Trustworthy Inter-domain Routing
AS-CRED: Reputation Service for Trustworthy Inter-domain Routing Krishna Venkatasubramanian Computer and Information Science University of Pennsylvania ONR MURI N00014-07-1-0907 Review Meeting June 10,
More informationCS519: Computer Networks. Lecture 4, Part 5: Mar 1, 2004 Internet Routing:
: Computer Networks Lecture 4, Part 5: Mar 1, 2004 Internet Routing: AS s, igp, and BGP As we said earlier, the Internet is composed of Autonomous Systems (ASs) Where each AS is a set of routers, links,
More informationInter-domain Routing(BGP) Security [IP Prefix Hijacking] Akmal Khan
Inter-domain Routing(BGP) Security [IP Hijacking] Akmal Khan [raoakhan@mmlab.snu.ac.kr] 4-15-2010 2 Outline Introduction Types of IP Hijacking Internet Routing Data Sources Tools of the Trade Past Research
More informationMANRS. Mutually Agreed Norms for Routing Security. Jan Žorž
MANRS Mutually Agreed Norms for Routing Security Jan Žorž The Problem A Routing Security Overview 2 No Day Without an Incident http://bgpstream.com/ 3 Routing Incidents Cause Real World
More informationMethods for Detection and Mitigation of BGP Route Leaks
Methods for Detection and Mitigation of BGP Route Leaks ietf-idr-route-leak-detection-mitigation-00 (Route leak definition: draft-ietf-grow-route-leak-problem-definition) K. Sriram, D. Montgomery, and
More informationRIPE Labs Operator Tools, Ideas, Analysis
RIPE Labs Operator Tools, Ideas, Analysis AMS-IX Meeting, Amsterdam, 16 Nov. 2011 Mirjam Kühne, RIPE NCC A Bit of History RIPE NCC started as the coordination centre for the RIPE community - RIPE Database,
More informationBGP. Autonomous system (AS) BGP version 4
BGP Border Gateway Protocol (an introduction) dr. C. P. J. Koymans Informatics Institute University of Amsterdam (version 1.3, 2010/03/10 20:05:02) Monday, March 8, 2010 General ideas behind BGP Background
More informationBeyond technical solutions: Understanding the role of governance structures in Internet routing security
Beyond technical solutions: Understanding the role of governance structures in Internet routing security Brenden Kuerbis, School of Public Policy, Georgia Institute of Technology Milton Mueller, School
More informationPERISCOPE: Standardizing and Orchestrating Looking Glass Querying
PERISCOPE: Standardizing and Orchestrating Looking Glass Querying Vasileios Giotsas UCSD/CAIDA vgiotsas@caida.org NANOG 68, October 17-19 2016, Dallas, TX Purpose of this Talk Inform the operational community
More informationBGP. Autonomous system (AS) BGP version 4
BGP Border Gateway Protocol (an introduction) dr. C. P. J. Koymans Informatics Institute University of Amsterdam March 11, 2008 General ideas behind BGP Background Providers, Customers and Peers External
More informationBGP. Autonomous system (AS) BGP version 4
BGP Border Gateway Protocol (an introduction) Karst Koymans Informatics Institute University of Amsterdam (version 1.5, 2011/03/06 13:35:28) Monday, March 7, 2011 General ideas behind BGP Background Providers,
More informationC A S E S T U D Y D E C E M B E R P R E P A R E D B Y : Iftah Bratspiess
FINANCIAL INSTITUTES PENETRATION INTO A BANK NETWORK USING TRANSPARENT NETWORK DEVICES C A S E S T U D Y P R E P A R E D B Y : Iftah Bratspiess 2018 Sepio Systems www.sepio.systems US: 11810 Grand Park
More informationNetworking Review & Grand Challenges
ing Review & Grand Challenges Brighten Godfrey CS 538 January 22 2018 slides 2010-2018 by Brighten Godfrey unless otherwise noted Announcements Introducing Sangeetha Key dates posted Assignment release,
More informationSecurity Information & Event Management (SIEM)
Security Information & Event Management (SIEM) Datasheet SIEM in a nutshell The variety of cyber-attacks is extraordinarily large. Phishing, DDoS attacks in combination with ransomware demanding bitcoins
More informationActive BGP Measurement with BGP-Mux. Ethan Katz-Bassett (USC) with testbed and some slides hijacked from Nick Feamster and Valas Valancius
Active BGP Measurement with BGP-Mux Ethan Katz-Bassett (USC) with testbed and some slides hijacked from Nick Feamster and Valas Valancius 2 Before I Start Georgia Tech system, I am just an enthusiastic
More informationBGP. Autonomous system (AS) BGP version 4. Definition (AS Autonomous System)
BGP Border Gateway Protocol (an introduction) Karst Koymans Informatics Institute University of Amsterdam (version 310, 2014/03/11 10:50:06) Monday, March 10, 2014 General ideas behind BGP Background Providers,
More informationProtecting Against Online Fraud. F5 EMEA Webinar August 2014
Protecting Against Online Fraud F5 EMEA Webinar August 2014 Agenda Fraud threat trends and business challenges Web fraud protection Mobile fraud protection Security operations center Example architecture
More informationthe real-time Internet routing observatory
the real-time Internet routing observatory Luca Sani TOP-IX MEETING, 26 September 2017 1/22 Our research interest: the Internet AS-level ecosystem Why is it important? To identify Internet topological
More informationhttps://spoofer.caida.org/
Software Systems for Surveying Spoofing Susceptibility Matthew Luckie, Ken Keys, Ryan Koga, Bradley Huffaker, Robert Beverly, kc claffy https://spoofer.caida.org/ DDoS PI meeting, March 9 2017 www.caida.o
More informationA PKI For IDR Public Key Infrastructure and Number Resource Certification
A PKI For IDR Public Key Infrastructure and Number Resource Certification AUSCERT 2006 Geoff Huston Research Scientist APNIC If You wanted to be Bad on the Internet And you wanted to: Hijack a site Inspect
More informationBorder Gateway Protocol (an introduction) Karst Koymans. Monday, March 10, 2014
.. BGP Border Gateway Protocol (an introduction) Karst Koymans Informatics Institute University of Amsterdam (version 3.10, 2014/03/11 10:50:06) Monday, March 10, 2014 Karst Koymans (UvA) BGP Monday, March
More informationRouting Support for Wide Area Network Mobility. Z. Morley Mao Associate Professor Computer Science and Engineering University of Michigan
Routing Support for Wide Area Network Mobility Z. Morley Mao Associate Professor Computer Science and Engineering University of Michigan 1 Outline Introduction Inter-AS Mobility Support Intra-AS Mobility
More informationAuto-Detecting Hijacked Prefixes?
Auto-Detecting Hijacked Prefixes? Geoff Huston APNIC @RIPE 50 May 2005 1 Address Hijacking Is the unauthorized use of an address prefix as an advertised route object on the Internet It s not a bogon the
More information2nd SIG-NOC meeting and DDoS Mitigation Workshop Scrubbing Away DDOS Attacks. 9 th November 2015
2nd SIG-NOC meeting and DDoS Mitigation Workshop Scrubbing Away DDOS Attacks 9 th November 2015 AKAMAI SOLUTIONS WEB PERFORMANCE SOLUTIONS MEDIA DELIVERY SOLUTIONS CLOUD SECURITY SOLUTIONS CLOUD NETWORKING
More informationInternet Routing Table Analysis Update. Philip Smith CaribNOG 5 24 th 26 th April 2013 Bridgetown, Barbados
Internet Routing Table Analysis Update Philip Smith CaribNOG 5 24 th 26 th April 2013 Bridgetown, Barbados Motivation 1998: No one was publishing any Internet routing table analysis Only CIDR-Report reporting
More informationMeasuring Adoption of RPKI Route Origin Validation and Filtering
PEERING The BGP Testbed Measuring Adoption of RPKI Route Origin Validation and Filtering Andreas Reuter (andreas.reuter@fu-berlin.de) Joint work with Randy Bush, Ethan Katz-Bassett, Italo Cunha, Thomas
More informationBGPStream: A Software Framework for Live and Historical BGP Data Analysis
BGPStream: A Software Framework for Live and Historical BGP Data Analysis Chiara Orsini 1, Alistair King 1, Danilo Giordano 2, Vasileios Giotsas 1, Alberto Dainotti 1 1 CAIDA, UC San Diego 2 Politecnico
More informationIntroduction to IP Routing. Geoff Huston
Introduction to IP Routing Geoff Huston Routing How do packets get from A to B in the Internet? A Internet B Connectionless Forwarding Each router (switch) makes a LOCAL decision to forward the packet
More informationIllegitimate Source IP Addresses At Internet Exchange Points
Illegitimate Source IP Addresses At Internet Exchange Points @ DENOG8, Darmstadt Franziska Lichtblau, Florian Streibelt, Philipp Richter, Anja Feldmann 23.11.2016 Internet Network Architectures, TU Berlin
More informationNetwork Layer (Routing)
Network Layer (Routing) Border Gateway Protocol Structure of the Internet Networks (ISPs, CDNs, etc.) group with IP prefixes Networks are richly interconnected, often using IXPs Prefix E1 Net E IXP Prefix
More informationDetecting Peering Infrastructure Outages
Detecting Peering Infrastructure Outages ENOG14, Minsk Vasileios Giotsas, Christoph Dietzel, Georgios Smaragdakis, Anja Feldmann, Arthur Berger, Emile Aben # TU Berlin CAIDA DE-CIX MIT Akamai # RIPE NCC
More informationInvestigating occurrence of duplicate updates in BGP announcements
Investigating occurrence of duplicate updates in BGP announcements Jonathan Park, Dan Jen, Mohit Lab, Shane Amante, Danny McPherson, Lixia Zhang GROW @ IETF75 July 27, 2009 Why This Work All BGP update
More informationInterdomain Routing and Connectivity
Interdomain Routing and Connectivity Brighten Godfrey CS 538 February 28 2018 slides 2010-2018 by Brighten Godfrey unless otherwise noted Routing Choosing paths along which messages will travel from source
More informationthe real-time Internet routing observatory
the real-time Internet routing observatory Alessandro Improta alessandro.improta@iit.cnr.it Luca Sani luca.sani@iit.cnr.it VSIX Meeting, May 10, 2017 - Padova Our research interest: the Internet AS-level
More informationBGP. Autonomous system (AS) BGP version 4. Definition (AS Autonomous System)
BGP Border Gateway Protocol (an introduction) Karst Koymans Informatics Institute University of Amsterdam (version 1.9, 2012/03/14 10:21:22) Monday, March 12, 2012 General ideas behind BGP Background Providers,
More informationMANRS. Mutually Agreed Norms for Routing Security. Aftab Siddiqui
MANRS Mutually Agreed Norms for Routing Security Aftab Siddiqui siddiqui@isoc.org The Problem A Routing Security Overview 2 Routing Incidents are Increasing In 2017 alone, 14,000 routing outages or attacks
More informationMutually Agreed Norms for Routing Security NAME
Mutually Agreed Norms for Routing Security NAME EMAIL The Problem A Routing Security Overview 2 Routing Incidents are Increasing In 2017 alone, 14,000 routing outages or attacks such as hijacking, leaks,
More informationTTM AS-level Traceroutes
TTM AS-level Traceroutes Matching IPs to ASes René Wilhelm New Projects Group RIPE NCC 1 Motivation TTM performs frequent traceroutes to find closest IP route for delay measurements
More informationthe real-time Internet routing observatory Luca Sani
the real-time Internet routing observatory Luca Sani 1 / 24 Our research topic: discovering the Internet structure Everyone knows the role of the Internet in our society, but since its commercialization
More informationIPv6 Rapid Deployment (6rd) in broadband networks. Allen Huotari Technical Leader June 14, 2010 NANOG49 San Francisco, CA
Rapid Deployment () in broadband networks Allen Huotari Technical Leader ahuotari@cisco.com June 14, 2010 NANOG49 San Francisco, CA 1 Why IP Tunneling? IPv4 Tunnel Tunnel IPv4 IPv4 Retains end-end IP semantics
More informationUsing Threat Analytics to Protect Privileged Access and Prevent Breaches
Using Threat Analytics to Protect Privileged Access and Prevent Breaches Under Attack Protecting privileged access and preventing breaches remains an urgent concern for companies of all sizes. Attackers
More informationMeasuring the Adoption of Route Origin Validation and Filtering
Measuring the Adoption of Route Origin Validation and Filtering Andreas Reuter (andreas.reuter@fu-berlin.de) Joint work with Randy Bush, Ethan Katz-Bassett, Italo Cunha, Thomas C. Schmidt, and Matthias
More informationHow Secure are. BGP Security Protocols? Sharon Goldberg Microsoft Research & Boston University. Michael Schapira. Pete Hummon AT&T Research
How Secure are NANOG 49, San Francisco Tuesday June 15 2010 BGP Security Protocols? Sharon Goldberg Microsoft Research & Boston University Michael Schapira Princeton University Yale & Berkeley Pete Huon
More informationBGP Security. Kevin s Attic for Security Research
Kevin s Attic for Security Research kevinkoo001@gmail.com Table 1. BGP Operation (1): Concept & Topology 2. BGP Operation (2): Message Exchange, Format and Path Decision Algorithm 3. Potential Attacks
More informationSecuring Core Internet Functions Resource Certification, RPKI. Mark Kosters ARIN CTO
Securing Core Internet Functions Resource Certification, RPKI Mark Kosters ARIN CTO Core Internet Functions: Routing & DNS The Internet relies on two critical resources DNS: Translates domain names to
More informationMcAfee Embedded Control
McAfee Embedded Control System integrity, change control, and policy compliance in one solution McAfee Embedded Control maintains the integrity of your system by only allowing authorized code to run and
More informationISP Border Definition. Alexander Azimov
ISP Border Definition Alexander Azimov ISP goal (one ASN) BGP Decision Process Step Attribute Transit 1 Highest Local Preference value Non-transit 2 Lowest AS Path length Transit 3 Lowest
More informationNetworking Review & Grand Challenges
ing Review & Grand Challenges CS 538 August 25 2011 slides 2010-2011 by Brighten Godfrey unless otherwise noted Undergraduate ing in Three Slides (including this one) Layering Application Application Transport
More informationCyberArk Privileged Threat Analytics
CyberArk Privileged Threat Analytics Table of Contents The New Security Battleground: Inside Your Network 3 Privileged account security 3 Collect the right data 4 Detect critical threats 5 Alert on critical
More informationWorldwide Detection of Denial of Service (DoS) Attacks
Worldwide Detection of Denial of Service (DoS) Attacks David Moore, Geoff Voelker and Stefan Savage August 15, 2001 dmoore @ caida.org www.caida.org Outline The Backscatter Analysis Technique Observations
More informationInternet Routing : Fundamentals of Computer Networks Bill Nace
Internet Routing 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross Looking Ahead Lab #2 just due Quiz #2
More informationSecuring the Internet at the Exchange Point Fernando M. V. Ramos
Securing the Internet at the Exchange Point Fernando M. V. Ramos 18.09.2017 Securing the Internet at the Exchange Point Fernando M. V. Ramos 18.09.2017 There are vulnerabilities in the Internet architecture
More informationBGP Anomaly Detection. Bahaa Al-Musawi PhD candidate Supervisors: Dr. Philip Branch and Prof. Grenville Armitage.
BGP Anomaly Detection Bahaa Al-Musawi PhD candidate Supervisors: Dr. Philip Branch and Prof. Grenville Armitage balmusawi@swin.edu.au Centre for Advanced Internet Architectures (CAIA) Swinburne University
More informationEnsuring and Accelerating Routing Security
2016 Cyber Security Division R&D SHOWCASE AND TECHNICAL WORKSHOP Ensuring and Accelerating Routing Security PARSONS, Inc Sandra Murphy 18 Feb 2016 DHS S&T Cyber Security Division 2016 R&D Showcase & Technical
More informationTowards Trustworthy Internet of Things for Mission-Critical Applications. Arjmand Samuel, Ph.D. Microsoft Azure - Internet of Things
Towards Trustworthy Internet of Things for Mission-Critical Applications Arjmand Samuel, Ph.D. Microsoft Azure - Internet of Things Internet of Things is a game changer Organizations are benefiting from
More informationCABaRet: Leveraging Recommendation Systems for Mobile Edge Caching
CABaRet: Leveraging Recommendation Systems for Mobile Edge Caching Savvas Kastanakis Pavlos Sermpezis Vasileios Kotronis Xenofontas Dimitropoulos FORTH & University of Crete Greece Mobile edge caching
More informationDDoS Detection&Mitigation: Radware Solution
DDoS Detection&Mitigation: Radware Solution Igor Urosevic Head of Technical Department SEE CCIE #26391 Ingram Micro Inc. 1 Agenda DDoS attack overview Main point of failures Key challenges today DDoS protection
More informationLocating Prefix Hijackers using LOCK
Locating Prefix ijackers using LOCK Tongqing Qiu Georgia Tech tongqqiu@cc.gatech.edu Jia Wang AT&T Labs Research jiawang@research.att.com Lusheng Ji AT&T Labs Research lji@research.att.com Jun (Jim) Xu
More informationSOLUTION BRIEF. Enabling and Securing Digital Business in API Economy. Protect APIs Serving Business Critical Applications
Enabling and Securing Digital Business in Economy Protect s Serving Business Critical Applications 40 percent of the world s web applications will use an interface Most enterprises today rely on customers
More informationDiscovering Interdomain Prefix Propagation using Active Probing
Discovering Interdomain Prefix Propagation using Active Probing lorenzo@ripe.net - colitti@dia.uniroma3.it ISMA 2006 WIT, San Diego, 10 May 2006 http://www.ripe.net 1 The problem ISMA 2006 WIT, San Diego,
More informationSoftware Systems for Surveying Spoofing Susceptibility
Software Systems for Surveying Spoofing Susceptibility Matthew Luckie, Ken Keys, Ryan Koga, Bradley Huffaker, Robert Beverly, kc claffy https://spoofer.caida.org/ AusNOG 2016, September 2nd 2016 www.caida.o
More informationSCION: A Secure Internet Architecture Samuel Hitz CTO Anapaya Systems ETH Zurich
SCION: A Secure Internet Architecture Samuel Hitz CTO Anapaya Systems ETH Zurich March 2019 Internet: The network of networks The Internet is a network of Autonomous Systems (ASes). Each AS is itself a
More informationSCION: Scalability, Control and Isolation On Next-Generation Networks
SCION: Scalability, Control and Isolation On Next-Generation Networks Xin Zhang, Hsu-Chun Hsiao, Geoff Hasker, Haowen Chan, Adrian Perrig, David Andersen 1 After years of patching, the Internet is Reliable
More informationTOP TEN DNS ATTACKS PROTECTING YOUR ORGANIZATION AGAINST TODAY S FAST-GROWING THREATS
TOP TEN DNS ATTACKS PROTECTING YOUR ORGANIZATION AGAINST TODAY S FAST-GROWING THREATS 1 Introduction Your data and infrastructure are at the heart of your business. Your employees, business partners, and
More informationPositive Technologies Telecom Attack Discovery DATA SHEET
Positive Technologies Telecom Attack Discovery DATA SHEET PT TELECOM ATTACK DISCOVERY DATA SHEET CELLULAR NETWORK SECURITY COMPLICATIONS As is shown in the network analysis performed by Positive Technologies
More informationMANRS: Mutually Agreed Norms for Routing Security Routing is at Risk Let s secure it together!
15 October 2018 Internet2 Technology Exchange MANRS: Mutually Agreed Norms for Routing Security Routing is at Risk Let s secure it together! Kevin Meynell Manager, Technical & Operational Engagement meynell@isoc.org
More informationIdentifying BGP Routing Table Transfer. !Machu Picchu!
Identifying BGP Routing Table Transfer Beichuan Zhang (Univ. Of Arizona) Vamsi Kambhampati (Colorado State Univ.) Daniel Massey (Colorado State Univ.) Mohit Lad (Univ. Of California, LA) Lixia Zhang (Univ.
More informationSDN Use-Cases. internet exchange, home networks. TELE4642: Week8. Materials from Prof. Nick Feamster is gratefully acknowledged
SDN Use-Cases internet exchange, home networks TELE4642: Week8 Materials from Prof. Nick Feamster is gratefully acknowledged Overview n SDX: A Software-Defined Internet Exchange n SDN-enabled Home Networks
More informationBamboozling Certificate Authorities with BGP
Bamboozling Certificate Authorities with BGP Henry Birge-Lee Princeton University Jennifer Rexford Princeton University Yixin Sun Princeton University Prateek Mittal Princeton University Anne Edmundson
More informationGeorge Nomikos
George Nomikos gnomikos@ics.forth.gr To appear in IMC, Boston, 2018 V. Kotronis, P. Sermpezis, P. Gigis, L. Manassakis, C. Dietzel, S. Konstantaras, X. Dimitropoulos, V. Giotsas *Jane Coffin and Christian
More informationBGP and inter-as economic relationships
BGP and inter-as economic relationships E. Gregori 1, A. Improta 2,1, L. Lenzini 2, L. Rossi 1, L. Sani 3 1 Institute of Informatics and Telematics, Italian National Research Council Pisa, Italy 2 Information
More informationAPT Incremental Deployment
APT Incremental Deployment Dan Jen, Michael Meisel, Daniel Massey, Lan Wang, Beichuan Zhang, Lixia Zhang http://www.cs.ucla.edu/~meisel/draft-apt-incremental-00.txt 1 Why This Talk Incrememtal deployability
More information