Professional Documents
Culture Documents
AS: Autonomous
System
AS1
Perimeters can be AS2
broken because of:
Disgruntled network
operators
AS4
AS3
Attacks against the Routing Fabric
(Routing Protocol Attacks and Defenses)
• These attacks game the routing state by
falsifying routing protocol messages
• Falsifications come in two flavors:
– Modification of en-route protocol messages
– Collusion (or wormhole) attacks
ingress egress
Stealth Probing
(Approach)
• Prevent the adversary from preferentially
treating probing traffic by making data
and probing traffic indistinguishable
• Three steps
1. Create an encrypted tunnel and divert both data
and probing traffic in the tunnel
2. Match the size of probing traffic with that of the
data traffic
3. Obscure the timing of probes
Stealth Probing
(Approach---continued)
Provider Provider
Provider
Provider Provider
AS A (Stub)
Secure Route Control (cont.)
AS B (Stub)
Provider Provider
Provider
Provider Provider
AS A (Stub)
Overview
• Introduction
• Stealth Probing
• Intradomain Deployment -- Byzantine
Tomography
• Interdomain Deployment -- Secure Route
Control
• Related Work
• Conclusion
Related Work
• Perlman proposed encryption to make data and control
traffic indistinguishable
– Perlman proposed encryption at network links
– We extend this idea to network paths
• Mizrak et al. proposed Fatih as a secure data-plane
availability monitor
– Fatih requires clock synchronization
– Stealth probing does not rely on clock synchronization
• Several researchers have proposed data-plane
mechanisms for secure fault localization
– Byzantine tomography is a management-plane technique
Conclusion (1)
• Resilience was a top priority in the design of the
operational Internet but the threat model was
naïve (vis-à-vis today’s attacks)
• In future networks, we should expect to see
– better perimeter defense and
– in-depth defense
• secure routing protocols
• secure data forwarding
• Stealth probing is a secure availability monitor
that works by concealing probing traffic
Conclusion (2)
• We presented deployment scenarios of this
monitor in
– Intradomain routing and
– Interdomain routing
• Our ongoing work focuses on … :
– Intradomain case: … improving the accuracy of
Byzantine tomography
– Interdomain case: … investigating the benefits of
more flexible interdomain path selection schemes
Thank you
Questions