Top Banner
NPLA: Network Prefix Level Authentication Ming Li,Yong Cui,Matti Siekkinen,Antti Ylä-Jääski Aalto University, Finland Tsinghua University, China
14

NPLA: Network Prefix Level Authentication Ming Li,Yong Cui,Matti Siekkinen,Antti Ylä-Jääski Aalto University, Finland Tsinghua University, China.

Dec 16, 2015

Download

Documents

Stephan Kilby
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: NPLA: Network Prefix Level Authentication Ming Li,Yong Cui,Matti Siekkinen,Antti Ylä-Jääski Aalto University, Finland Tsinghua University, China.

NPLA: Network Prefix Level Authentication

Ming Li,Yong Cui,Matti Siekkinen,Antti Ylä-Jääski

Aalto University, FinlandTsinghua University, China

Page 2: NPLA: Network Prefix Level Authentication Ming Li,Yong Cui,Matti Siekkinen,Antti Ylä-Jääski Aalto University, Finland Tsinghua University, China.

Structure

MotivationObjectiveArchitecture overviewImplementationOverheadConclusion and future work

GlobeCom'10 Workshop on FutureNet, Miami, Florida, USA

Page 3: NPLA: Network Prefix Level Authentication Ming Li,Yong Cui,Matti Siekkinen,Antti Ylä-Jääski Aalto University, Finland Tsinghua University, China.

Motivation

IP addresses spoofingLack of accountabilityDoS, vulnerability scanning,...Ruin noval applications in practice

...

GlobeCom'10 Workshop on FutureNet, Miami, Florida, USA

Page 4: NPLA: Network Prefix Level Authentication Ming Li,Yong Cui,Matti Siekkinen,Antti Ylä-Jääski Aalto University, Finland Tsinghua University, China.

Our GoalProvide packet level authentication on the Internet

Basic ApproachDigital signatures on packets

Objective

GlobeCom'10 Workshop on FutureNet, Miami, Florida, USA

Page 5: NPLA: Network Prefix Level Authentication Ming Li,Yong Cui,Matti Siekkinen,Antti Ylä-Jääski Aalto University, Finland Tsinghua University, China.

Objective

Accountability is the responsibility for one’s actions

Link actions to their actorsPunish misbehavior

Packet AuthenticationEliminate/mitigate source spoofing based attacks

Target for existing Internet not clean slate solution

GlobeCom'10 Workshop on FutureNet, Miami, Florida, USA

Page 6: NPLA: Network Prefix Level Authentication Ming Li,Yong Cui,Matti Siekkinen,Antti Ylä-Jääski Aalto University, Finland Tsinghua University, China.

Architecture overview (NPLA)

GlobeCom'10 Workshop on FutureNet, Miami, Florida, USA

Page 7: NPLA: Network Prefix Level Authentication Ming Li,Yong Cui,Matti Siekkinen,Antti Ylä-Jääski Aalto University, Finland Tsinghua University, China.

Implementation

Inject/verify entities

Interact with legacy entitiesHost, router, NAT, prefix aggregation...

OverheadEffectiveness

What kind of key

Which protocol layer

Signature sizeCrypt. securityKey distribution

Granularity

How to implement if we intend to for partial deployment in today’s Internet

GlobeCom'10 Workshop on FutureNet, Miami, Florida, USA

Page 8: NPLA: Network Prefix Level Authentication Ming Li,Yong Cui,Matti Siekkinen,Antti Ylä-Jääski Aalto University, Finland Tsinghua University, China.

Requirements->Implementation

Strong identitifier/on route entities could verify the packets -> key type

Asymmetric key

Compatibility -> protocol layer Shim layer between IP and TCP

GlobeCom'10 Workshop on FutureNet, Miami, Florida, USA

Page 9: NPLA: Network Prefix Level Authentication Ming Li,Yong Cui,Matti Siekkinen,Antti Ylä-Jääski Aalto University, Finland Tsinghua University, China.

Requirements->Implementation...

Key distributionPublic key infrastructure (PKI) Routing protocols (BGP)Offline

Signature size and security ECC public key cryptography algorithm

Security: 163-bit ECC key = 1024-bit RSA key

GlobeCom'10 Workshop on FutureNet, Miami, Florida, USA

Page 10: NPLA: Network Prefix Level Authentication Ming Li,Yong Cui,Matti Siekkinen,Antti Ylä-Jääski Aalto University, Finland Tsinghua University, China.

Requirements->Implementation...

Security level/key management overhead -> authentication granularity

Host/personal level Network prefix level (intra-domain)

AS level (inter-domain)

Signature injection and verification entities

Prefix border router AS border router

GlobeCom'10 Workshop on FutureNet, Miami, Florida, USA

Page 11: NPLA: Network Prefix Level Authentication Ming Li,Yong Cui,Matti Siekkinen,Antti Ylä-Jääski Aalto University, Finland Tsinghua University, China.

Requirements->ImplementationPartial/incremental deployment, interact with legacy entities

Legacy host (strip off before arriving)

Router (compatible)NAT (update)Prefix aggregation (known to the administrator)

Incentive deploymentIP fragmentation

GlobeCom'10 Workshop on FutureNet, Miami, Florida, USA

Page 12: NPLA: Network Prefix Level Authentication Ming Li,Yong Cui,Matti Siekkinen,Antti Ylä-Jääski Aalto University, Finland Tsinghua University, China.

Overhead and performance

The overhead must be affordableComputation overhead (FPGA crypt hardware)

Generate 645K/s and verify 283K/s signatures

Generate 3.8G/s and 1.7G/s traffic

Traffic overhead (%6-10%)Memory overhead

13MB for prefix level authenticationGlobeCom'10 Workshop on FutureNet, Miami, Florida, USA

Page 13: NPLA: Network Prefix Level Authentication Ming Li,Yong Cui,Matti Siekkinen,Antti Ylä-Jääski Aalto University, Finland Tsinghua University, China.

Overhead and PerformanceDelay

~16us per generation~24us per verification

GlobeCom'10 Workshop on FutureNet, Miami, Florida, USA

Page 14: NPLA: Network Prefix Level Authentication Ming Li,Yong Cui,Matti Siekkinen,Antti Ylä-Jääski Aalto University, Finland Tsinghua University, China.

Conclusion and Future WorkAuthenticate packets to its claimed network prefix

Implementation challengesHow to make it work in practice?

Future workImplementation in real networks

GlobeCom'10 Workshop on FutureNet, Miami, Florida, USA