How Small Groups Can Secure Interdomain Routing Martin Suchara in collaboration with I. Avramopoulos and J. Rexford Interdomain Routing (BGP) is not Secure BGP is vulnerable to: Deliberate attacks Misconfigurations Yet, users demand: Confidentiality Integrity Availability 2 Securing Interdomain Routing Users demand: Confidentiality Integrity Availability Existing crypto solutions Focus of this work 3 Overview I. The routing system and its vulnerabilities II. Why should small groups secure BGP III. Securing BGP in small groups – effectiveness of techniques IV. Our approach V. a) SBone – secure overlay routing b) Shout – hijacking the hijacker Conclusion 4 Interdomain Routing – Terminology Autonomous Systems (ASes) = independently administered networks in a loose federation Prefix = set of IP addresses Origin = genuine owner of an address prefix Route = AS-level path to the origin Origin of 12.34.* AS #1 Yale 1 AS #2 AT&T Data packets 21 AS #3 Princeton Routing announcements 5 Interdomain Routing – Protocol Based on Trust BGP is prefix-based path-vector protocol Each AS maintains a set of routes to all prefixes One “best” route is used Originate 12.34.* 21 1 AS1→12.34.* AS #1 12.34.* AS2 → AS1 → 12.34.* AS #2 AS #3 AS #4 6 1 Interdomain Routing – Export & Policies Customer-provider and peer-peer relationships Selecting a route: by assumption the most profitable, shortest route preferred At most one profitable route exported National ISP (#1) Regional ISP (#3) Cust. #6 customerprovider National ISP (#2) Regional ISP (#4) peer-peer Regional ISP (#5) Cust. #7 7 12.34.* Interdomain Routing – Export & Policies Customer-provider and peer-peer relationships Selecting a route: by assumption the most profitable, shortest route preferred At most one profitable route exported National ISP (#1) Regional ISP (#3) Cust. #6 12.34.* National ISP (#2) Regional ISP (#4) Use: 6 Remember: 36 Regional ISP (#5) Cust. #7 8 Interdomain Routing – One Cannot Learn Many Routes Customer-provider and peer-peer relationships Selecting a route: by assumption the most profitable, shortest route preferred At most one profitable route exported National ISP (#1) Regional ISP (#3) Cust. #6 12.34.* National ISP (#2) Regional ISP (#4) Use: 6 Remember: 36 Regional ISP (#5) Cust. #7 9 Vulnerabilities – Example 1 Invalid origin attack Nodes 1, 3 and 4 route to the adversary The true destination is blackholed 1 2 3 4 6 12.34.* Attacker 5 Genuine origin 7 10 12.34.* Vulnerabilities – Example 2 Adversary spoofs a shorter path Node 4 routes through 1 instead of 2 The traffic may be blackholed or intercepted No attack 1 2 3 6 4 Thinks route thru 2 shorter 5 Genuine origin 7 11 12.34.* Vulnerabilities – Example 2 Adversary spoofs a shorter path Node 4 routes through 1 instead of 2 The traffic may be blackholed or intercepted Announce 17 1 2 3 6 4 Thinks route thru 1 shorter 5 Genuine origin 7 12 12.34.* Overview I. The routing system and its vulnerabilities II. Why should small groups secure BGP III. Securing BGP in small groups – effectiveness of techniques IV. Our approach V. a) SBone – secure overlay routing b) Shout – hijacking the hijacker Conclusion 13 State of the Art – S-BGP and soBGP Mechanism: identify which routes are invalid and filter them S-BGP Certificates to verify origin AS Cryptographic attestations added to routing announcements at each hop soBGP Build a (partial) AS level topology database 14 Limitations of the Secure Protocols Previous solutions Benefits only for large deployments (~10,000s) No incentive for early adopters No deployment for over a decade Our goal: Provide incentives to early adopters! 15 Our Approach Secure routing within a small group 10-20 cooperating nodes All participants’ routes are secured Challenges Non-participants outnumber participants Participants rely on non-participants Each AS exports only one route Focus on raising the bar for the adversary rather than residual vulnerabilities 16 Overview I. The routing system and its vulnerabilities II. Why should small groups secure BGP III. Securing BGP in small groups – effectiveness of techniques IV. Our approach V. a) Sbone – secure overlay routing b) Shout – hijacking the hijacker Conclusion 17 Experimental Evaluations Performance of existing techniques They work well in large scale deployments How do they do in small groups? Evaluate performance of state-of-the art: soBGP Evaluate partial deployment If two ASes participate, a valid link connecting them must be in the registry 18 Experimental Setup – All Experiments Method – simulation of BGP announcements on the AS-level Internet topology Topology information from RouteViews Adversary and origin chosen at random Participants implement secure protocol 1 or 5 adversaries Performance metric – fraction of the Internet ASes with valid routes Average of 100 runs 19 soBGP – Random Participation, 1 adversary Percentage of ASes % of the Internet with valid routes Participants have a higher chance to have a valid route! Groups of 1 – 30 participants Participant ASes All ASes Number of Participant ASes 20 Percentage of ASes soBGP – Deployment by 30 Random + Some Largest ISPs Better performance Cooperation of many large ISPs needed! Participant ASes All ASes Number of Large ISPs 21 Perfect Detection Simulations: give ability to detect routes that don’t work Is this sufficient to secure routing? How useful is it to have perfect detection? Can be done in practice: Data-plane probing verifies validity of route by using it 22 Percentage of ASes Perfect Detection at 30 Random + Some Largest ISPs Perfect detection helps but not sufficient by itself! Participant ASes All ASes Number of Large ISPs 23 Lessons Learned Observation Justification Participation of large ISPs is important They learn many routes some of which are valid Perfect detection of bad routes is desirable Better (but not ideal) performance The non-participants are worse off than the participants The participants reject implicated routes while nonparticipants accept all Need to increase path diversity Perfect detection not enough 24 Overview I. The routing system and its vulnerabilities II. Why should small groups secure BGP III. Securing BGP in small groups – effectiveness of techniques IV. Our approach V. a) Sbone – secure overlay routing b) Shout – hijacking the hijacker Conclusion 25 Our Approach – Key Ideas Circumvent the adversary with secure overlay routing Hijack the hijacker: all participants announce the protected prefix Hire a few large ISPs to help Detect invalid routes accurately with data plane detectors 26 Our Approach – Key Ideas Circumvent the adversary with secure overlay routing Hijack the hijacker: all participants announce the protected prefix Hire a few large ISPs to help Detect invalid routes accurately with data plane detectors 27 Our Approach – Key Ideas Circumvent the adversary with secure overlay routing Hijack the hijacker: all participants announce the protected prefix Hire a few large ISPs to help Detect invalid routes accurately with data plane detectors 28 Our Approach – Key Ideas Circumvent the adversary with secure overlay routing Hijack the hijacker: all participants announce the protected prefix Hire a few large ISPs to help Detect invalid routes accurately with data plane detectors 29 Overview I. The routing system and its vulnerabilities II. Why should small groups secure BGP III. Securing BGP in small groups – effectiveness of techniques IV. Our approach V. a) SBone – secure overlay routing b) Shout – hijacking the hijacker Conclusion 30 Secure Overlay Routing (SBone) Protects intra-group traffic Overlay of participants’Use networks peer route Bad paths detected by probing Use provider route Use longer route 1 2 Participant 5 Nonparticipant 4 3 Detected as 6 12.34.* ; 12.34.1.1 bad 7 31 12.34.* ; 12.34.1.1 Secure Overlay Routing (SBone) Traffic may go thru an intermediate node Uses path thru intermediate node 3 Forwards traffic for 1 ? 1 2 ? ? 5 ? 12.8.1.1 4 3 12.34.1.1 12.34.* ; 12.8.1.1 6 7 32 12.34.* ; 12.34.1.1 Percentage of Participating ASes SBone – 30 Random + Help of Some Large ISPs Good performance even for small groups! Group Size (ASes) 5 large ISPs 3 large ISPs 1 large ISP 0 large ISPs 33 SBone – Multiple Adversaries Percentage of Participating ASes Solution: enlist more large ISPs! With 5 adversaries, the performance degrades 5 large ISPs 3 large ISPs 1 large ISP 0 large ISPs Group Size (ASes) 34 SBone - Summary Observation Justification SBone offers good availability even for very small groups It better exposes path diversity Non-participants are not secure yet They lack the ability to tunnel around problems 35 Overview I. The routing system and its vulnerabilities II. Why should small groups secure BGP III. Securing BGP in small groups – effectiveness of techniques IV. Our approach V. a) SBone – secure overlay routing b) Shout – hijacking the hijacker Conclusion 36 Hijacking the Hijacker – Shout Secure traffic from non-participants Prefers Use shortest short path customer’s All participants announce the protected prefix path 1 4 leading 12.34.* to adversary Once the traffic enters the overlay, it is securely forwarded to the true prefix owner 1 2 12.34.* 3 6 12.34.* 4 5 12.34.* Node 4 shouts 7 37 12.34.* Percentage of ASes Shout + SBone – 1 Adversary With as few as 10 participants + 3 large ISPs, 95% of all ASes can reach the victim! 5 large ISPs 3 large ISPs 1 large ISP 0 large ISPs Group Size (ASes) 38 Percentage of ASes Shout + SBone – 5 Adversaries More adversaries larger groups required! 5 large ISPs 3 large ISPs 1 large ISP 0 large ISPs Group Size (ASes) 39 Performance and Scalability of Shout Shout can be used reactively Only shout if an attack is detected Changes in routing table sizes negligible Alternate routes must be saved in routing tables The average table size increased by less than 5% After shouting path lengths increase modestly Paths less than 1.35 times longer Detailed results next 40 Shout + SBone – Increase in Path Length Length Ratio With as few as 3 large ISPs the penalty is negligible! 0 large ISPs 1 large ISP 3 large ISPs 5 large ISPs Group Size (ASes) 41 Shout - Summary Observation Justification Can secure communication It suffices if non-participant from non-participants reaches any participant Routing table sizes do not increase Increases < 5% Shout does not inflate path lengths significantly Path lengths increase by <15% with 3 large ISPs 42 Overview I. The routing system and its vulnerabilities II. Why should small groups secure BGP III. Securing BGP in small groups – effectiveness of techniques IV. Our approach V. a) SBone – secure overlay routing b) Shout – hijacking the hijacker Conclusion 43 Conclusion BGP should be secured by small groups To be effective, the group members should (i) Detect and filter compromised routes accurately (ii) Cooperate to expose path diversity (iii) Coax non-participants to pick valid routes (iv) Enlist a few large ISPs 44 Conclusion SBone and Shout are novel mechanisms that achieve these goals The proposed solution (i) Secures address space of a small group of participants (ii) Allows both participants and non-participants pick valid routes (iii) Provides incentives to the adopters 45 Future Work Deployment in larger groups where participants don’t trust each other Secure routing protocol on the overlay? Analytic models of the deployment Predict which additional ASes to enlist to boost performance? Effects of the structure of the graph on the outcomes? 46 Thank you for your attention! 47 Discussion 1. Effects of subprefix hijacking 2. What if participants not willing to choose less profitable routes? 3. What if N large ISPs are used instead of N largest ones? 4. Average results and error bars 48 1. Subprefix Hijacking Threat: adversary deaggregates the victim’s prefix, all traffic is directed to the adversary Key security mechanisms Deaggregate the prefix and use shout to announce it Tunnel endpoints already secure if announced with /24 prefixes Only deaggregate when attack detected Attack detected if at least one participant sees an unauthorized subprefix Percentage of ASes 1. Subprefix Hijacking – Avoiding Detection If the adversary conceals the attack, <5% ASes are affected! 5 large ISPs 3 large ISPs 1 large ISP Group Size (ASes) 50 1. Subprefix Hijacking - Summary Observation Justification Can secure against subprefix hijacking Deaggregation in addition to shout Low overhead Reactive scheme used only if attack detected Detection is accurate Large ISPs have good connectivity and learn the offending sub-prefix easily 51 Percentage of Participating ASes 2. SBone – Preserve Business Relationships? Participants can influence route selection Participants do not have visibility into BGP; just route through intermediate nodes underlay rerouting no underlay rerouting Group Size (ASes) 52 3. Effect of Choosing the Largest ISPs The largest ISPs are similar in terms of connectivity and size Which one of these we enlist among the participants does not matter much SBone vs. Perfect Detection Alone Percentage of ASes Perfect detection alone SBone With 5 adversaries and 10 participants the SBone is better and variance lower! Stdev: 8% Stdev: 15% 0 large ISPs 1 large ISP 3 large ISPs 5 large ISPs 54
© Copyright 2026 Paperzz