Top Banner
Brief Announcement: Spoofing Prevention Method Anat Bremler-Barr Hanoch Levy computer science computer science Interdisciplinary Center Herzliya Tel- Aviv University
15

Brief Announcement: Spoofing Prevention Method Anat Bremler-Barr Hanoch Levy computer science computer science Interdisciplinary Center Herzliya Tel-Aviv.

Dec 26, 2015

Download

Documents

Mabel White
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Brief Announcement: Spoofing Prevention Method Anat Bremler-Barr Hanoch Levy computer science computer science Interdisciplinary Center Herzliya Tel-Aviv.

Brief Announcement:

Spoofing Prevention Method

Anat Bremler-Barr Hanoch Levy

computer science computer science

Interdisciplinary Center Herzliya Tel-Aviv University

Page 2: Brief Announcement: Spoofing Prevention Method Anat Bremler-Barr Hanoch Levy computer science computer science Interdisciplinary Center Herzliya Tel-Aviv.

Spoofing

• Used by hackers to mount denial of service attacks.

• Denial of service attacks – consume the resources of victim’s network/servers

• Spoofing- forging the source IP of packets. – Easy to create (4000 attacks per week [MVS01])– Harder to filter– Harder to trace back

Page 3: Brief Announcement: Spoofing Prevention Method Anat Bremler-Barr Hanoch Levy computer science computer science Interdisciplinary Center Herzliya Tel-Aviv.

ISP BISP B

SpoofingNet B’

Attacker

ISP A ISP A

ISP CISP C

Net A’ Victim

Internet

Net A’ victim

Src dst

Page 4: Brief Announcement: Spoofing Prevention Method Anat Bremler-Barr Hanoch Levy computer science computer science Interdisciplinary Center Herzliya Tel-Aviv.

Prevention methods Today: “Good Net-Citizen“

• Ingress/Egress filtering– Implementation uRPF,ACL

– Administrative overhead– Poor incentive – “good-will” and not self-defensive

methods

ISP BISP B

Net B’

Filter out packets with src not in Net B’

ISP CISP CInternet

ISP A ISP A

Page 5: Brief Announcement: Spoofing Prevention Method Anat Bremler-Barr Hanoch Levy computer science computer science Interdisciplinary Center Herzliya Tel-Aviv.

Spoofing Prevention Method (SPM)

• Self defense method

• Incentive to implement– Visibility of SPM members

• Stepwise deployment

• Light mechanism

Page 6: Brief Announcement: Spoofing Prevention Method Anat Bremler-Barr Hanoch Levy computer science computer science Interdisciplinary Center Herzliya Tel-Aviv.

SPM architecture• Entities: AS• Key:

– Function of source AS and destination AS – Added to each packet by the source AS routers.

• Routers: – Mark at the original AS the outgoing traffic with key.– Verify at the destination AS the authenticity of the key on the

incoming packets

• Key distribution: two options:– By protocol– Learned passively

Page 7: Brief Announcement: Spoofing Prevention Method Anat Bremler-Barr Hanoch Levy computer science computer science Interdisciplinary Center Herzliya Tel-Aviv.

ISP BISP B

SPM Architecture

ISP A ISP A

ISP CISP C

Net B’

Net A’ Victim

Net A’ victim BC

src dst key

Attacker

Filtering spoof traffic

Key does not match the src

Page 8: Brief Announcement: Spoofing Prevention Method Anat Bremler-Barr Hanoch Levy computer science computer science Interdisciplinary Center Herzliya Tel-Aviv.

Benefits of SPM

• Server Traffic: Server of SPM member domain can filter at attack

time:– Spoofed traffic from other SPM ASs– Spoofed traffic that spoofs to SPM AS address space

• Client Traffic: Client of SPM member domain receives preferential

treatment at SPM domain servers• Visibility

Page 9: Brief Announcement: Spoofing Prevention Method Anat Bremler-Barr Hanoch Levy computer science computer science Interdisciplinary Center Herzliya Tel-Aviv.

Key • Lightweight function - not crypto: Random constant 32

bit

• Guessing the key with low probability: reduce the volume of attack by

• Function of the source and destination AS– Acquiring the key is hard

• Key remove by routers, Change periodically

– Sniffing is not a likely threat

• Place as an additional IP option

322

1

Page 10: Brief Announcement: Spoofing Prevention Method Anat Bremler-Barr Hanoch Levy computer science computer science Interdisciplinary Center Herzliya Tel-Aviv.

Key distribution

• The key information requires two small tables:– AS-out table - marking– AS-in table - verification

• Size of each table: 120KB each – future 480KB – AS coded by 2bytes (current 16,000, max )– Key 4 bytes

162

Page 11: Brief Announcement: Spoofing Prevention Method Anat Bremler-Barr Hanoch Levy computer science computer science Interdisciplinary Center Herzliya Tel-Aviv.

Key distribution

• Key information: – AS-out: synchronization inside the AS

– AS-in: needs to be learned from various ASes – a key from each AS.

• Key distribution:– Protocol: AS server (IRV[GAGIM03], route reflector).

– Passively: Learn key passively from the regular

non spoof traffic traffic that comletes the TCP handshake.

Page 12: Brief Announcement: Spoofing Prevention Method Anat Bremler-Barr Hanoch Levy computer science computer science Interdisciplinary Center Herzliya Tel-Aviv.

Router job• Marking – one lookup per destination (combine with IP

lookup)

Place only on traffic destined to other SPM members.

• Verification – one lookup per source.

Categorize traffic: Spoofed, non-spoofed, other (no key)

Verification modes:

Conservative verification : peace time (drop spoofed)

Aggressive verification: attack time (drop spoofed + other).

• Implement in Edge Routers:

Combine SPM with ingress/egress filtering

Page 13: Brief Announcement: Spoofing Prevention Method Anat Bremler-Barr Hanoch Levy computer science computer science Interdisciplinary Center Herzliya Tel-Aviv.

Motivation:Implementation benefit (Symmetric Model)

Relative Benefit of SPM

0

0.2

0.4

0.6

0.8

1

0 2000 4000 6000 8000 10000

Participiants

Rel

ativ

e B

enef

it

SPM members

SPM non members

Relative benefit SPM = Cannot spoof from SPM AS +Cannot spoof to SPM address (2K/N-(K/N)^2)

Relative Benefit of Ingress/Egress filtering

0

0.2

0.4

0.6

0.8

1

0 5000 10000

Participiants

Rel

ativ

e B

enef

itIngress/Egressfiltering members

Ingress/Egressfiltering non members

Page 14: Brief Announcement: Spoofing Prevention Method Anat Bremler-Barr Hanoch Levy computer science computer science Interdisciplinary Center Herzliya Tel-Aviv.

Motivation:Implementation benefit (Asymmetric Model)

•Traffic is proportional to the domain size

•Domain size ~ address space allocation ~ zipf distribution

(top 10 ISP – 27.8% of the address space [Fixedorbit]).

Relative Benefits of SPM

0

0.2

0.4

0.6

0.8

1

0 2000 4000 6000 8000 10000

Participiants

Rela

tive B

en

efi

t

SPM members

SPM non members

Page 15: Brief Announcement: Spoofing Prevention Method Anat Bremler-Barr Hanoch Levy computer science computer science Interdisciplinary Center Herzliya Tel-Aviv.

Conclusions

• Ingress/Egress filtering – today’s technological solution is economically ineffective

• SPM – economically attractive: – AS that joins – gains significant relative benefits

(server traffic/client traffic)– Stepwise deployment– Visibility– Simple

Questions

? Thank you

!