29
On the Feasibility of Rerouting-based DDoS Defenses Muoi Tran , Min Suk Kang, Hsu-Chun Hsiao, Wei-Hsuan Chiang, Shu-Po Tung, Yu-Su Wang May 2019 | San Francisco, CA

On the Feasibility of Rerouting-based DDoS Defenseskangms/papers/tran... · NetHide (Meier et al.) STRIDE (Hsiao et al.) SIBRA (Basescuet al.) Not availablein the currentInternet

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: On the Feasibility of Rerouting-based DDoS Defenseskangms/papers/tran... · NetHide (Meier et al.) STRIDE (Hsiao et al.) SIBRA (Basescuet al.) Not availablein the currentInternet

On the Feasibility of Rerouting-based DDoS Defenses

Muoi Tran, Min Suk Kang, Hsu-Chun Hsiao, Wei-Hsuan Chiang, Shu-Po Tung, Yu-Su Wang

May 2019 | San Francisco, CA

Page 2: On the Feasibility of Rerouting-based DDoS Defenseskangms/papers/tran... · NetHide (Meier et al.) STRIDE (Hsiao et al.) SIBRA (Basescuet al.) Not availablein the currentInternet

Transit-link DDoS attack: a powerful type of volumetric DDoS attack

2

Coremelt attack(ESORICS ‘09)

Crossfire attack(S&P ‘13)

(distributed denial of service)

Traditional: volumetric attack traffic targeting end servers

Non-traditional: volumetric attack traffic targeting transit links

AS

AS

ASAS

transit link

Real incidents:

Academic studies:

2013 2015

Page 3: On the Feasibility of Rerouting-based DDoS Defenseskangms/papers/tran... · NetHide (Meier et al.) STRIDE (Hsiao et al.) SIBRA (Basescuet al.) Not availablein the currentInternet

Handling transit-link DDoS attack is challenging

AS

AS

AS

AS

AS

Indistinguishablelow-rate traffic

Victims are indirectlyaffected

3

Destination Source

AS

AS

AS

Page 4: On the Feasibility of Rerouting-based DDoS Defenseskangms/papers/tran... · NetHide (Meier et al.) STRIDE (Hsiao et al.) SIBRA (Basescuet al.) Not availablein the currentInternet

Transit-link DDoS attacks still remain an open problem

Coremelt attack(Studer et al.)

Crossfire attack(Kang et al.)

2009

2013

2016

2014

4

2018

Routing Around Congestion(Smith et al. S&P’18)

“Readily deployable solution"

SPIFFY(Kang et al.)

CoDef defense(Lee et al.)

LinkScope(Xue et al.)

Partial solutions RADAR(Zheng et al.)

NetHide(Meier et al.)

STRIDE(Hsiao et al.)

SIBRA(Basescu et al.)

Not available in the current Internet

Page 5: On the Feasibility of Rerouting-based DDoS Defenseskangms/papers/tran... · NetHide (Meier et al.) STRIDE (Hsiao et al.) SIBRA (Basescuet al.) Not availablein the currentInternet

Background: How BGP routing works?

5

{D}

Border Gateway Protocol (BGP)

AS D AS Z AS X AS CAS Y

{ Z, D} { Y, Z, D} { X, Y, Z, D}

Traffic path

BGP propagationTraffic forwarding

SourceDestination

No control over traffic path by design

Loop-freeAS-path

Page 6: On the Feasibility of Rerouting-based DDoS Defenseskangms/papers/tran... · NetHide (Meier et al.) STRIDE (Hsiao et al.) SIBRA (Basescuet al.) Not availablein the currentInternet

Routing Around Congestion (RAC):Rerouting using BGP poisoning [Smith et al., S&P ’18]

6

AS D AS Z

AS W

AS X AS C

AS Y

Goal: rerouteto avoid AS W

{D, W, D}

xLoop detected!

Critical source

Detour path

BGP poisoningmessage

Original path

Victim destination

Page 7: On the Feasibility of Rerouting-based DDoS Defenseskangms/papers/tran... · NetHide (Meier et al.) STRIDE (Hsiao et al.) SIBRA (Basescuet al.) Not availablein the currentInternet

Routing Around Congestion (RAC):Rerouting using BGP poisoning [Smith et al., S&P ’18]

7

AS D AS Z

AS W

AS X AS C

AS Y

{D, W, D}

Critical source

Detour path

BGP poisoningmessage

Original path

Victim destination

Switch to detour path

AS collaboration is not needed!

Page 8: On the Feasibility of Rerouting-based DDoS Defenseskangms/papers/tran... · NetHide (Meier et al.) STRIDE (Hsiao et al.) SIBRA (Basescuet al.) Not availablein the currentInternet

8

Will RAC defense still work against adaptive attackers?

Page 9: On the Feasibility of Rerouting-based DDoS Defenseskangms/papers/tran... · NetHide (Meier et al.) STRIDE (Hsiao et al.) SIBRA (Basescuet al.) Not availablein the currentInternet

Future directions for transit-link DDoS defenses

Practical challenge of mitigating adaptive detour-learning attack

Our contributions

9

Adaptive detour-learning attack against rerouting solutions

Page 10: On the Feasibility of Rerouting-based DDoS Defenseskangms/papers/tran... · NetHide (Meier et al.) STRIDE (Hsiao et al.) SIBRA (Basescuet al.) Not availablein the currentInternet

Adaptive detour-learning attack: Threat model

10

Goals: (1) To detect rerouting in real-time(2) To learn new detour path accurately(3) To congest new detour path (see the paper)

Capabilities: - Same botnets used in transit-link DDoS attack

Page 11: On the Feasibility of Rerouting-based DDoS Defenseskangms/papers/tran... · NetHide (Meier et al.) STRIDE (Hsiao et al.) SIBRA (Basescuet al.) Not availablein the currentInternet

Victim destination

Adaptive detour-learning attack: (1) how to detect rerouting in real-time

11

AS D AS Z

AS W

AS X AS C

AS Y Critical source

Original path

AS Itraceroute

Adaptive adversary

Page 12: On the Feasibility of Rerouting-based DDoS Defenseskangms/papers/tran... · NetHide (Meier et al.) STRIDE (Hsiao et al.) SIBRA (Basescuet al.) Not availablein the currentInternet

Victim destination

Adaptive detour-learning attack: (1) how to detect rerouting in real-time

12

AS D AS Z

AS W

AS X AS C

AS Y Critical source

Detour path

AS Itraceroute

Rerouting is detected!

Adaptive adversary

Page 13: On the Feasibility of Rerouting-based DDoS Defenseskangms/papers/tran... · NetHide (Meier et al.) STRIDE (Hsiao et al.) SIBRA (Basescuet al.) Not availablein the currentInternet

Adaptive detour-learning attack: (2) how to learn detour path accurately

13

AS D AS Y

AS G

AS CAS X

AS E AS J

AS I

AS H

(3) congest detour path(see the paper)

Challenge: Which is more accurate route measurement of actual detour path?

Victim destination Critical source Solution: Prioritize measurement from bot closer to traffic source

Detour path closer AS (e.g., shorter AS-path)

Page 14: On the Feasibility of Rerouting-based DDoS Defenseskangms/papers/tran... · NetHide (Meier et al.) STRIDE (Hsiao et al.) SIBRA (Basescuet al.) Not availablein the currentInternet

Adaptive detour-learning attack: (2) how to learn detour path accurately

14

AS D AS Y

AS G

AS CAS X

AS E AS J

AS I

AS H

(3) congest detour path(see the paper)

Challenge: Which is more accurate route measurement of actual detour path?

Victim destination Critical source Solution: Prioritize measurement from bot closer to traffic source

Detour path closer AS (e.g., shorter AS-path)

Results: 94% of learned detour paths are correct

Page 15: On the Feasibility of Rerouting-based DDoS Defenseskangms/papers/tran... · NetHide (Meier et al.) STRIDE (Hsiao et al.) SIBRA (Basescuet al.) Not availablein the currentInternet

Future directions for transit-link DDoS defenses

Adaptive detour-learning attack against rerouting solutions

Our contributions

15

Practical challenge of mitigating adaptive detour-learning attack

Page 16: On the Feasibility of Rerouting-based DDoS Defenseskangms/papers/tran... · NetHide (Meier et al.) STRIDE (Hsiao et al.) SIBRA (Basescuet al.) Not availablein the currentInternet

AS I

AS J

How to defend against detour-learning attack?

16

Exclusively used for critical flows

Poison all peers of ASes on detour path!

AS D AS Z

AS W

AS X AS C

AS Y Critical sourceVictim destination

Detour path must be isolated!

Detour learned!

How to isolate?

Page 17: On the Feasibility of Rerouting-based DDoS Defenseskangms/papers/tran... · NetHide (Meier et al.) STRIDE (Hsiao et al.) SIBRA (Basescuet al.) Not availablein the currentInternet

0.8

102 103 1040

0.2

0.4

0.6

0.8

1

Detour path isolation => poisoning too many ASes

17

CDF

100 1000 10000

Number of ASes that should be poisoned

ThousandsASes should be poisonedBut why?

Tier-1 or large Tier-2on the detour paths(more in the paper)

0

0.2

0.4

0.6

1

Page 18: On the Feasibility of Rerouting-based DDoS Defenseskangms/papers/tran... · NetHide (Meier et al.) STRIDE (Hsiao et al.) SIBRA (Basescuet al.) Not availablein the currentInternet

0.8

102 103 1040

0.2

0.4

0.6

0.8

1

Can we poison that many ASes?

18

CDF

100 1000 10000

Number of ASes that should be poisoned255 2034

Specificationup to 2034

Implementationup to 255

Configurationup to 30-50

0

0.2

0.4

0.6

1

Specification

Implementation

Page 19: On the Feasibility of Rerouting-based DDoS Defenseskangms/papers/tran... · NetHide (Meier et al.) STRIDE (Hsiao et al.) SIBRA (Basescuet al.) Not availablein the currentInternet

Confirmed: ISPs do not support poisoning > 255 ASes

19

Number of observed

BGP messages

99.99%

1 10 100 100030

slowly decreasein frequency

50x dropin frequency

255Number of ASes seen in a BGP message

19

Page 20: On the Feasibility of Rerouting-based DDoS Defenseskangms/papers/tran... · NetHide (Meier et al.) STRIDE (Hsiao et al.) SIBRA (Basescuet al.) Not availablein the currentInternet

Confirmed: ISPs do not support poisoning > 255 ASes

20

Number of observed

BGP messages

99.99%

1 10 100 100030

slowly decreasein frequency

50x dropin frequency

255Number of ASes seen in a BGP message

20

Poisoning > 1,000 ASes is nearly impossible

=> Detour path isolation is infeasible=> Detour-learning attack is almost always possible

Page 21: On the Feasibility of Rerouting-based DDoS Defenseskangms/papers/tran... · NetHide (Meier et al.) STRIDE (Hsiao et al.) SIBRA (Basescuet al.) Not availablein the currentInternet

Practical challenge of mitigating adaptive detour-learning attack

Adaptive detour-learning attack against rerouting solutions

Our contributions

21

Future directions for transit-link DDoS defenses

Page 22: On the Feasibility of Rerouting-based DDoS Defenseskangms/papers/tran... · NetHide (Meier et al.) STRIDE (Hsiao et al.) SIBRA (Basescuet al.) Not availablein the currentInternet

Desired defense property: destination-controlled routing

22

Clean-slate Internet architecture

Hacking BGP

e.g., STRIDE, SIBRAe.g., Routing Around Congestion

?

e.g., explicit BGP reroutingfor critical flows under emergency ✕ Too costly to deploy ✕ Does not work

Page 23: On the Feasibility of Rerouting-based DDoS Defenseskangms/papers/tran... · NetHide (Meier et al.) STRIDE (Hsiao et al.) SIBRA (Basescuet al.) Not availablein the currentInternet

Two Lessons Learned

23

Page 24: On the Feasibility of Rerouting-based DDoS Defenseskangms/papers/tran... · NetHide (Meier et al.) STRIDE (Hsiao et al.) SIBRA (Basescuet al.) Not availablein the currentInternet

Lesson 1

Hacking the current Internet routing is a flawed idea!

24

Page 25: On the Feasibility of Rerouting-based DDoS Defenseskangms/papers/tran... · NetHide (Meier et al.) STRIDE (Hsiao et al.) SIBRA (Basescuet al.) Not availablein the currentInternet

üAdaptive attacks are possible

üMitigation is hard

ü Adaptive defense is slower than adaptive attacker (more in the paper)

25

Page 26: On the Feasibility of Rerouting-based DDoS Defenseskangms/papers/tran... · NetHide (Meier et al.) STRIDE (Hsiao et al.) SIBRA (Basescuet al.) Not availablein the currentInternet

Lesson 2

Analysis of protocol specifications alone is insufficient!

26

Page 27: On the Feasibility of Rerouting-based DDoS Defenseskangms/papers/tran... · NetHide (Meier et al.) STRIDE (Hsiao et al.) SIBRA (Basescuet al.) Not availablein the currentInternet

27

Specification Implementation Configuration

Page 28: On the Feasibility of Rerouting-based DDoS Defenseskangms/papers/tran... · NetHide (Meier et al.) STRIDE (Hsiao et al.) SIBRA (Basescuet al.) Not availablein the currentInternet

Conclusion• Detour-learning attacks are effective and hard to mitigate

üTransit-link DDoS attacks still remain an open problem

• Suggestion on research directionüBalance destination-controlled routing and deployability

• 2 lessons learned:üHacking BGP for rerouting is a flawed ideaüAnalysis with specification only can be dangerous

28

Page 29: On the Feasibility of Rerouting-based DDoS Defenseskangms/papers/tran... · NetHide (Meier et al.) STRIDE (Hsiao et al.) SIBRA (Basescuet al.) Not availablein the currentInternet

Question?

Muoi [email protected]