41
1 © 2013 Cisco Systems, Inc. All rights reserved. DDoS mitigation strategy Bertrand Duvivier [email protected] BGP product manager

Distributed Denial of Service (DDoS) Mitigation Strategy and Overview

Embed Size (px)

DESCRIPTION

Detailed slides that provide a DDoS overview, trends, architecture overview, and BGP flowspec overview.

Citation preview

Page 1: Distributed Denial of Service (DDoS) Mitigation Strategy and Overview

1 © 2013 Cisco Systems, Inc. All rights reserved.

DDoS mitigation strategy

Bertrand Duvivier [email protected] BGP product manager

Page 2: Distributed Denial of Service (DDoS) Mitigation Strategy and Overview

2 © 2013 Cisco Systems, Inc. All rights reserved.

DDoS Mitigation – a stepstone approach

  Phase III Dynamic application aware redirection and traffic handling

  Phase II Malicious traffic mitigation Cleaning of Malicious traffic Dirty and clean traffic handling Usage of Multi-instance BGP

  Phase I ACL RTBH PBR uRPF

IOS-XR 4.3.1 IOS-XE partial

IOS-XR 5.2.0 IOS-XE 3.1.2

Page 3: Distributed Denial of Service (DDoS) Mitigation Strategy and Overview

3 © 2013 Cisco Systems, Inc. All rights reserved.

Agenda

 DDoS trends

 DDoS - Phase 2 – Architecture overview

 DDoS - Phase 3 – BGP flowspec overview

Page 4: Distributed Denial of Service (DDoS) Mitigation Strategy and Overview

4 © 2013 Cisco Systems, Inc. All rights reserved.

 Distributed denial-of-service (DDoS) attacks target network infrastructures or computer services by sending overwhelming number of service requests to the server from many sources.

 Server resources are used up in serving the fake requests resulting in denial or degradation of legitimate service requests to be served

 Addressing DDoS attacks ― Detection – Detect incoming fake requests ― Mitigation o  Diversion – Send traffic to a specialized device that removes the

fake packets from the traffic stream while retaining the legitimate packets

o  Return – Send back the clean traffic to the server

Page 5: Distributed Denial of Service (DDoS) Mitigation Strategy and Overview

5 © 2013 Cisco Systems, Inc. All rights reserved.

DDOS impact on customer Business

GOOD DDOS

Page 6: Distributed Denial of Service (DDoS) Mitigation Strategy and Overview

6 © 2013 Cisco Systems, Inc. All rights reserved.

DDOS impact on customer Business

 Enterprise customer can’t defend themselve, when DDoS hit the FW… it’s already too late.

 SP could protect enterprise by cleaning DDoS traffic at ingress peering point.

 New revenue for SP.

 Mandated service to propose to Financial and visible customers.

Page 7: Distributed Denial of Service (DDoS) Mitigation Strategy and Overview

7 © 2013 Cisco Systems, Inc. All rights reserved.

2011 DDoS trends (Nanog source)   Any Internet Operator Can Be a Target for DDoS Ideologically-motivated ‘Hacktivism’ and On-line vandalism DDoS attacks are the

most commonly identified attack motivations

  Size and Scope of Attacks Continue to Grow at an Alarming Pace

High-bandwidth DDoS attacks are the ‘new normal’ as over 40% of respondents report attacks greater than 1 Gbps and 13% report attacks greater than 10Gbps

Increased sophistication and complexity of layer-7 DDoS attacks, multi-vector DDoS attacks becoming more common

  First-Ever Reports of IPv6 DDoS Attacks 'in the Wild' on Production Networks

Page 8: Distributed Denial of Service (DDoS) Mitigation Strategy and Overview

8 © 2013 Cisco Systems, Inc. All rights reserved.

DDoS mitigation architecture 1. Detection (no DDoS)

DDOS scrubber

Security Server

DDOS Analyser

Netflow

Scan Netflow data to detect DDOS attacks

Page 9: Distributed Denial of Service (DDoS) Mitigation Strategy and Overview

9 © 2013 Cisco Systems, Inc. All rights reserved.

DDoS mitigation architecture 2. Detection (DDOS)

DDOS scrubber

Security Server

DDOS Analyser

Netflow

Scan Netflow data Find DDOS signature

Page 10: Distributed Denial of Service (DDoS) Mitigation Strategy and Overview

10 © 2013 Cisco Systems, Inc. All rights reserved.

DDoS mitigation architecture 3. Redirect traffic to DDOS scruber

DDoS scrubber

Security Server

DDoS Analyser

Scan Netflow data Find DDoS signature

BGP DDoS Mitigation Action: redirect to DDoS scrubber

Page 11: Distributed Denial of Service (DDoS) Mitigation Strategy and Overview

11 © 2013 Cisco Systems, Inc. All rights reserved.

Agenda

 DDoS trends

 DDoS - Phase 2 – Architecture overview

 DDoS - Phase 3 – BGP flowspec overview

Page 12: Distributed Denial of Service (DDoS) Mitigation Strategy and Overview

12 © 2013 Cisco Systems, Inc. All rights reserved.

DDoS Mitigation: Architecture Considerations   Normal traffic flow when there is no attack

  Redirect traffic from any edge PE to any specific DDoS scrubber ― Including the PE that is connected to the host network

  Granular (prefix level/network) diversion ― Customers buy DDoS mitigation service for some prefixes ― Pre-provisioned DDoS service for those prefixes (using policy such as standard community flag)

  Centralized controller that injects the diversion route

  VPN based Labeled return path for the clean traffic ― To prevent routing loops

  Sollution support redirection of BGP less/more specific prefixes or local originated prefixes (static route, redistributed route)

  Support for multi-homed customers ― During attack, send clean traffic from DDOS scrubber to multiple PE’s

Page 13: Distributed Denial of Service (DDoS) Mitigation Strategy and Overview

13 © 2013 Cisco Systems, Inc. All rights reserved.

DDoS mitigation architecture Step 1: create Clean-VPN (off attack configuration)

Security Server

DDoS Analyser

Clean VPN will transport clean traffic from scrubber back to customer next hop

DDoS scrubber

out in

Page 14: Distributed Denial of Service (DDoS) Mitigation Strategy and Overview

14 © 2013 Cisco Systems, Inc. All rights reserved.

DDoS mitigation architecture Step 2: inject customers prefixes to clean Clean-VPN (off attack)

Security Server

DDoS Analyser

VRF dynamic route leaking function to inject VRF glogal prefix in VRF and VPN clean using route-map policy.

DDoS scrubber

out in

Page 15: Distributed Denial of Service (DDoS) Mitigation Strategy and Overview

15 © 2013 Cisco Systems, Inc. All rights reserved.

DDoS mitigation architecture Step 3: inject BGP redirection in DDoS control plane (under attack)

Security Server

DDoS Analyser

Security server will inject BGP update with scrubber as next hop.

DDoS scrubber

out in

BGP update NH: scrubber Prefix: purple

Page 16: Distributed Denial of Service (DDoS) Mitigation Strategy and Overview

16 © 2013 Cisco Systems, Inc. All rights reserved.

DDoS mitigation architecture Traffic flow under attack

Security Server

DDoS Analyser

Traffic is redirect via DDoS scrubber. Loop free solution.

DDoS scrubber

Page 17: Distributed Denial of Service (DDoS) Mitigation Strategy and Overview

17 © 2013 Cisco Systems, Inc. All rights reserved.

Why injecting DDoS in separate BGP instance ?

 Sollution support redirection of BGP less/more specific prefixes or local originated prefixes (static route, redistributed route)

 Separate Inter-Domain control plane and DDoS plane No need to withdraw and re-signal Inter-Domain prefixes, keep internet route intacts in control plane.

Easy to troubleshout

Page 18: Distributed Denial of Service (DDoS) Mitigation Strategy and Overview

18 © 2013 Cisco Systems, Inc. All rights reserved.

Agenda

 DDoS trends

 DDoS - Phase 2 – Architecture overview

 DDoS - Phase 3 – BGP flowspec overview

Page 19: Distributed Denial of Service (DDoS) Mitigation Strategy and Overview

19 © 2013 Cisco Systems, Inc. All rights reserved.

Next-Gen BGP flowspec is RFC-5575 (aka BGP flowspec)

+ IPv6 support (draft-ietf-idr-flow-spec-v6)

+ Flowspec origin check relax (draft-djsmith-idr-flowspec-origin)

+ Extra redirection options (draft-simpson-idr-flowspec-redirect)

+ Comprehensive CLI/XML to inject BGP flowspec updates

+ Internet in VPN use-case

+ Optimized flow based forwarding plane : E-PBR (specific to ASR9K/CRS)

XR 5.2.0 XE 3.12

Page 20: Distributed Denial of Service (DDoS) Mitigation Strategy and Overview

20 © 2013 Cisco Systems, Inc. All rights reserved.

Next Gen BGP flowspec infrastructure phase 1 (XML/CLI model)

BGP flowspec

BGP

BGP

XML/CLI

ACL QoS

Flow forwarding

Application

PBR

Flow Spec Manager

ASR9K/CRS

XR-VR

XML/CLI

Application VM

Page 21: Distributed Denial of Service (DDoS) Mitigation Strategy and Overview

21 © 2013 Cisco Systems, Inc. All rights reserved.

Next Gen BGP flowspec infrastructure phase 2 (OnePK model)

BGP flowspec

BGP

BGP

Flow OnePK

ACL QoS

Flow forwarding

Application

PBR

Flow Spec Manager

ASR9K/CRS

XR-VR

OnePK API/SDK

Application VM

Page 22: Distributed Denial of Service (DDoS) Mitigation Strategy and Overview

22 © 2013 Cisco Systems, Inc. All rights reserved.

NextGen BGP flowspec Flow encoding (phase 1)

Type 1 Destination Prefix (mask) prefix

Type 2 Source Prefix (mask) prefix

Type 3 IP Protocol udp,tcp,icmp,…

Type 4 Port

Type 5 Destination port

Type 6 Source port

Type 7 ICMP type

Type 8 ICMP code

Type 9 TCP flags

Type 10 Packet length

Type 11 DSCP

Type 12 Fragment

Page 23: Distributed Denial of Service (DDoS) Mitigation Strategy and Overview

23 © 2013 Cisco Systems, Inc. All rights reserved.

Next-Gen BGP flowspec Action encoding (phase 1)

Ext Community Action Data 0x8006 traffic-rate (bw zero) BW or Drop

0x8007

traffic-action: Terminal action

(bit 7)

0x8008 Redirect (VRF) 6-byte Route Target

idr-flowspec-redirect Redirect (IP/MPLS) Next Hop

Page 24: Distributed Denial of Service (DDoS) Mitigation Strategy and Overview

24 © 2013 Cisco Systems, Inc. All rights reserved.

Summary

 DDOS mitigation is a Mandatory service.

 DDOS phase 2 provides optimized architecture

 DDOS phase 3 provides flow base mitigation granularity

For more details, contact [email protected]

Page 25: Distributed Denial of Service (DDoS) Mitigation Strategy and Overview

25 © 2013 Cisco Systems, Inc. All rights reserved.

THANKS

Page 26: Distributed Denial of Service (DDoS) Mitigation Strategy and Overview

26 © 2013 Cisco Systems, Inc. All rights reserved.

DDoS phase 2

Technical details

Page 27: Distributed Denial of Service (DDoS) Mitigation Strategy and Overview

27 © 2013 Cisco Systems, Inc. All rights reserved.

Architecture based on BGP multi-instance

 Two planes based on multi-instance BGP ― The default BGP instance for creating normal routing and the return path of the clean traffic ― The DDoS instance for injecting the diversion route in the routers

BGP DDos

Instance

BGP Default

Instance

DDOS RR Internet RR

PE-C

Normal routes

Diversion routes

Page 28: Distributed Denial of Service (DDoS) Mitigation Strategy and Overview

28 © 2013 Cisco Systems, Inc. All rights reserved.

BGP ddos instance

router bgp 99 instance ddos bgp router-id 3.3.3.3

Creation of DDoS BGP instance

Page 29: Distributed Denial of Service (DDoS) Mitigation Strategy and Overview

29 © 2013 Cisco Systems, Inc. All rights reserved.

BGP DDos

Instance

RIB

FIB

VRF default VRF Clean

BGP Default

Instance

VRF RIB

VRF FIB

BGP DDos

Instance

RIB

FIB

VRF default VRF Clean

BGP Default

Instance

VRF RIB

VRF FIB

CGSE Scrubber

C

X/Y

PE-C PE-S

VPN RR

@ RR

DDOS RR

Architecture details

  The default BGP instance uses a VRF, “Clean”, to setup the return path   On the scrubber PE, the clean traffic enters via the VRF “Clean” interface

Clean

Dirty

Page 30: Distributed Denial of Service (DDoS) Mitigation Strategy and Overview

30 © 2013 Cisco Systems, Inc. All rights reserved.

BGP read-only

router bgp 99 instance ddos bgp router-id 3.3.3.3 bgp read-only

bgp read-only •  Allows config of 2th IPv4 or IPv6 instance

•  Suppresses BGP Update Generation

Page 31: Distributed Denial of Service (DDoS) Mitigation Strategy and Overview

31 © 2013 Cisco Systems, Inc. All rights reserved.

BGP DDos

Instance

RIB

FIB

VRF default VRF Clean

BGP Default

Instance

VRF RIB

VRF FIB

BGP DDos

Instance

RIB

FIB

VRF default VRF Clean

BGP Default

Instance

VRF RIB

VRF FIB

CGSE Scrubber

C

X/Y

PE-C PE-S

X/Y->C

VPN RR

@ RR Route setup

 C sends X/Y to the default-VRF of the default instance of PE-C

DDoS RR

Page 32: Distributed Denial of Service (DDoS) Mitigation Strategy and Overview

32 © 2013 Cisco Systems, Inc. All rights reserved.

BGP DDos

Instance

RIB

FIB

VRF default VRF Clean

BGP Default

Instance

VRF RIB

VRF FIB

BGP DDos

Instance

RIB

FIB

VRF default VRF Clean

BGP Default

Instance

VRF RIB

VRF FIB

X/Y->C

CGSE Scrubber

C

X/Y

PE-C PE-S

X/Y->C

X/Y->C X/Y->C

VPN RR

@ RR Route setup

 PE-C imports X/Y to VRF “Clean”

 PE-C downloads X/Y->C to RIB

DDoS RR

Page 33: Distributed Denial of Service (DDoS) Mitigation Strategy and Overview

33 © 2013 Cisco Systems, Inc. All rights reserved.

VRF dynamic route leaking

vrf clean address-family ipv4 unicast import from default-vrf route-policy ddos advertise-as-vpn export route-target 111:1 // ddos policy = match community-string 100:123

Importing selected global route’s in the clean VRF

Page 34: Distributed Denial of Service (DDoS) Mitigation Strategy and Overview

34 © 2013 Cisco Systems, Inc. All rights reserved.

X/Y->C

BGP DDos

Instance

RIB

FIB

VRF default VRF Clean

BGP Default

Instance

VRF RIB

VRF FIB

BGP DDos

Instance

RIB

FIB

VRF default VRF Clean

BGP Default

Instance

VRF RIB

VRF FIB

X/Y->C

CGSE Scrubber

C

X/Y

PE-C PE-S

X/Y->C

X/Y->C

X/Y->C

X/Y->C

X/Y->C

VPN RR

@ RR X/Y->PE-C

X/Y->PE-C Route setup

  PE-C advertises X/Y to @ RR (as IPv4) and VPN RR (as VPNv4)   PE-C RIB downloads X/Y->C to FIB

DDoS RR

Page 35: Distributed Denial of Service (DDoS) Mitigation Strategy and Overview

35 © 2013 Cisco Systems, Inc. All rights reserved.

X/Y->C X/Y->PE-C

BGP DDos

Instance

RIB

FIB

VRF default VRF Clean

BGP Default

Instance

VRF RIB

VRF FIB

X/Y->PE-C

BGP DDos

Instance

RIB

FIB

VRF default VRF Clean

BGP Default

Instance

VRF RIB

VRF FIB

X/Y->C

CGSE Scrubber

C

X/Y

PE-C PE-S

X/Y->PE-C

X/Y->PE-C

X/Y->PE-C

X/Y->PE-C X/Y->PE-C

X/Y->C

X/Y->C

X/Y->C

X/Y->C

X/Y->C

VPN RR

@ RR X/Y->PE-C

X/Y->PE-C Route setup

  @ RR advertises X/Y to default VRF of PE-S and VPN RR advertises X/Y to default-VRF as a VPN route. Then the route is downloaded to RIB and FIB of default VRF and VRF “Clean”

DDoS RR

Page 36: Distributed Denial of Service (DDoS) Mitigation Strategy and Overview

36 © 2013 Cisco Systems, Inc. All rights reserved.

X/Y->C

BGP DDos

Instance

RIB

FIB

VRF default VRF Clean

BGP Default

Instance

VRF RIB

VRF FIB

X/Y->PE-C

BGP DDos

Instance

RIB

FIB

VRF default VRF Clean

BGP Default

Instance

VRF RIB

VRF FIB

X/Y->C

CGSE Scrubber

C

X/Y

PE-C PE-S

X/Y->PE-C

X/Y->PE-C

X/Y->PE-C

X/Y->PE-C X/Y->PE-C

X/Y->C

X/Y->C

X/Y->C

X/Y->C

X/Y->C

VPN RR

@ RR

Attack scenario X/Y->PE-C

X/Y->PE-C

X/Y->S

  Arbor detects X/Y under DDoS attack   Arbor injects diversion route X/Y to nexthop “S” on the DDoS RR

X/Y->PE-C

DDoS RR

Page 37: Distributed Denial of Service (DDoS) Mitigation Strategy and Overview

37 © 2013 Cisco Systems, Inc. All rights reserved.

X/Y->C

BGP DDos

Instance

RIB

FIB

VRF default VRF Clean

BGP Default

Instance

VRF RIB

VRF FIB

X/Y->PE-C

BGP DDos

Instance

RIB

FIB

VRF default VRF Clean

BGP Default

Instance

VRF RIB

VRF FIB

X/Y->C

CGSE Scrubber

C

X/Y

PE-C PE-S

X/Y->PE-C

X/Y->PE-C

X/Y->PE-C

X/Y->PE-C X/Y->PE-C X/Y->S

X/Y->C

X/Y->S X/Y->C

X/Y->C

X/Y->C

X/Y->C

VPN RR

@ RR

Attack scenario X/Y->PE-C

X/Y->PE-C

X/Y->S

 DDoS RR advertises X/Y->S to the DDoS instances on PE-C and PE-S

X/Y->PE-C

DDoS RR

Page 38: Distributed Denial of Service (DDoS) Mitigation Strategy and Overview

38 © 2013 Cisco Systems, Inc. All rights reserved.

X/Y->C

BGP DDos

Instance

RIB

FIB

VRF default VRF Clean

BGP Default

Instance

VRF RIB

VRF FIB

X/Y->S X/Y->PE-C

BGP DDos

Instance

RIB

FIB

VRF default VRF Clean

BGP Default

Instance

VRF RIB

VRF FIB

X/Y->S X/Y->C

CGSE Scrubber

C

X/Y

PE-C PE-S

X/Y->PE-C ->S

X/Y->PE-C

X/Y->PE-C

X/Y->PE-C X/Y->PE-C X/Y->S

X/Y->C ->S

X/Y->S X/Y->C

X/Y->C

X/Y->C

X/Y->C

VPN RR

@ RR

Attack scenario X/Y->PE-C

X/Y->PE-C

X/Y->S

 DDoS instance downloads diversion route to RIB. RIB now has two paths for X/Y

X/Y->PE-C

DDoS RR

Page 39: Distributed Denial of Service (DDoS) Mitigation Strategy and Overview

39 © 2013 Cisco Systems, Inc. All rights reserved.

BGP install diversion

router bgp 99 instance ddos bgp router-id 3.3.3.3

bgp read-only bgp install diversion

bgp install diversion Triggers BGP ddos instance to install

diversion path to RIB, so that the paths are pushed down to FIB

Page 40: Distributed Denial of Service (DDoS) Mitigation Strategy and Overview

40 © 2013 Cisco Systems, Inc. All rights reserved.

X/Y->S

BGP DDos

Instance

RIB

FIB

VRF default VRF Clean

BGP Default

Instance

VRF RIB

VRF FIB

X/Y->S X/Y->PE-C

BGP DDos

Instance

RIB

FIB

VRF default VRF Clean

BGP Default

Instance

VRF RIB

VRF FIB

X/Y->S X/Y->C

CGSE Scrubber

C

X/Y

PE-C PE-S

X/Y->PE-C ->S

X/Y->PE-C

X/Y->PE-C

X/Y->PE-C X/Y->PE-C X/Y->S

X/Y->C ->S

X/Y->S X/Y->C

X/Y->C

X/Y->C

X/Y->C

VPN RR

@ RR

Attack scenario X/Y->PE-C

X/Y->PE-C

X/Y->S

 RIB downloads the diversion route to FIB ― Based on special flags and/or admin distance

X/Y->S

DDoS RR

Page 41: Distributed Denial of Service (DDoS) Mitigation Strategy and Overview

41 © 2013 Cisco Systems, Inc. All rights reserved.

X/Y->S

BGP DDos

Instance

RIB

FIB

VRF default VRF Clean

BGP Default

Instance

VRF RIB

VRF FIB

X/Y->S X/Y->PE-C

BGP DDos

Instance

RIB

FIB

VRF default VRF Clean

BGP Default

Instance

VRF RIB

VRF FIB

X/Y->S X/Y->C

CGSE Scrubber

C

X/Y

PE-C PE-S

X/Y->PE-C ->S

X/Y->PE-C

X/Y->PE-C

X/Y->PE-C X/Y->PE-C X/Y->S

X/Y->C ->S

X/Y->S X/Y->C

X/Y->C

X/Y->C

X/Y->C

VPN RR

@ RR

  IP traffic enters PE-C (or any other PE) and finds X/Y->S in default VRF. Goes to S.

  Clean traffic from S finds X/Y->PE-C in VRF “clean” and returns to PE-C

  On PE-C, the VPN label asks the packet to do IP lookup in VRF “Clean”. Goes to C.

Attack scenario X/Y->PE-C

X/Y->PE-C

X/Y->S

X/Y->S

DDoS RR