By Khin Thida Latt - attn.jp · Classification of Prefix Hijacking If Announced prefix =...

32
By Khin Thida Latt [email protected] 09/09/15 1

Transcript of By Khin Thida Latt - attn.jp · Classification of Prefix Hijacking If Announced prefix =...

Page 1: By Khin Thida Latt - attn.jp · Classification of Prefix Hijacking If Announced prefix = 150.65.0.0/16 , size of the hijacked prefix can be 1. exactly same size -regular prefix hijacking

By

Khin Thida Latt

[email protected]/09/15 1

Page 2: By Khin Thida Latt - attn.jp · Classification of Prefix Hijacking If Announced prefix = 150.65.0.0/16 , size of the hijacked prefix can be 1. exactly same size -regular prefix hijacking

Target Area

� Every organization has its Internet connectivity by one

protocol: BGP4 ( Border Gateway Protocol)

� This BGP4 has longstanding vulnerabilitiesThis BGP4 has longstanding vulnerabilities

� Among these vulnerabilities, today presentation is

about

� “IP prefix Hijacking”

� “Traffic Interception”

09/09/15 2

Page 3: By Khin Thida Latt - attn.jp · Classification of Prefix Hijacking If Announced prefix = 150.65.0.0/16 , size of the hijacked prefix can be 1. exactly same size -regular prefix hijacking

Prefix hijacking and traffic interception are serious threats.

Why?

� AT & T WorldNet suffers outage (Dec 1999)

leaving 1.8 million customers without Web access for almost a day

� Two weeks shutdown of all banking, government and political

sites in Estonia ( May 2007)

� Kenyan Route Hijack

� An ISP from USA and Europe, AboveNet hijacked prefix owned

by Africa Online (March 2008)09/09/15 3

Page 4: By Khin Thida Latt - attn.jp · Classification of Prefix Hijacking If Announced prefix = 150.65.0.0/16 , size of the hijacked prefix can be 1. exactly same size -regular prefix hijacking

Purpose

� Analyze !� Many ideas have been presented to detect/prevent

� However, no enough analysis towards both areas� However, no enough analysis towards both areas

� intends this analysis would be for a stepping-stone

towards solving these two threats

09/09/15 4

Page 5: By Khin Thida Latt - attn.jp · Classification of Prefix Hijacking If Announced prefix = 150.65.0.0/16 , size of the hijacked prefix can be 1. exactly same size -regular prefix hijacking

� Introduction

� Taxonomy of IP prefix hijacking

� Taxonomy of traffic interception

� Attack model of Traffic Interception

09/09/09 5

Page 6: By Khin Thida Latt - attn.jp · Classification of Prefix Hijacking If Announced prefix = 150.65.0.0/16 , size of the hijacked prefix can be 1. exactly same size -regular prefix hijacking

Introduction

09/09/15 6

Page 7: By Khin Thida Latt - attn.jp · Classification of Prefix Hijacking If Announced prefix = 150.65.0.0/16 , size of the hijacked prefix can be 1. exactly same size -regular prefix hijacking

� What is prefix hijacking?

� AS makes an advertisement of a prefix although it is neither

prefix owner nor transit AS

� What is Traffic Interception?� What is Traffic Interception?

� Traffic Interception = hijacking + forwarding

09/09/15 7

Page 8: By Khin Thida Latt - attn.jp · Classification of Prefix Hijacking If Announced prefix = 150.65.0.0/16 , size of the hijacked prefix can be 1. exactly same size -regular prefix hijacking

#3#3Malicio

-usAS #5

Malicio-us

AS #5

[2,1]

[3,2,1]

09/09/158

#2#2

Origin

AS #1

Prefix p

Origin

AS #1

Prefix p

[1]

[3,2,1]

#4#4

Blackhole

Page 9: By Khin Thida Latt - attn.jp · Classification of Prefix Hijacking If Announced prefix = 150.65.0.0/16 , size of the hijacked prefix can be 1. exactly same size -regular prefix hijacking

Reasons behind a hijack

� Legitimate reasons

� Engineering traffic

Mis-configuration� Mis-configuration

� Malicious attempts

� Brand spoofing/phishing

09/09/15 9

Page 10: By Khin Thida Latt - attn.jp · Classification of Prefix Hijacking If Announced prefix = 150.65.0.0/16 , size of the hijacked prefix can be 1. exactly same size -regular prefix hijacking

#3#3Malicio

-usAS #5

Malicio-us

AS #5

[2,1]

[3,2,1]

09/09/1510

#2#2

Origin

AS #1

Prefix p

Origin

AS #1

Prefix p

[1]

[3,2,1]

#4#4

Page 11: By Khin Thida Latt - attn.jp · Classification of Prefix Hijacking If Announced prefix = 150.65.0.0/16 , size of the hijacked prefix can be 1. exactly same size -regular prefix hijacking

� IP prefix Hijacking

� black-hole all the hijacked traffic

� connectivity disrupted (Denial of Service Attack)

� be known after black holing the traffic� be known after black holing the traffic

� Traffic Interception

� No black-hole

� connectivity is not disrupted (Man-In-The-Middle Attack)

� Transparent to the victim

09/09/15 11

Page 12: By Khin Thida Latt - attn.jp · Classification of Prefix Hijacking If Announced prefix = 150.65.0.0/16 , size of the hijacked prefix can be 1. exactly same size -regular prefix hijacking

Taxonomy of Prefix HijackingTaxonomy of Prefix Hijacking

09/09/09 12

Page 13: By Khin Thida Latt - attn.jp · Classification of Prefix Hijacking If Announced prefix = 150.65.0.0/16 , size of the hijacked prefix can be 1. exactly same size -regular prefix hijacking

How does malicious AS hijack a prefix?

� By manipulating AS_PATH attribute of BGP update message

�Prefix owner ASTransit ASes

Valid AS_PATH = [ #4, #6,#9, #1]

09/09/09 13

Malicious AS number

Manipulated AS_PATH = [ #4, #6,#9, #5]

�Prefix Hijacking as Invalid Origin

Manipulated AS_PATH = [ #4, #5,#9,#1]

�Prefix Hijacking as Invalid Transit

Malicious AS number

Page 14: By Khin Thida Latt - attn.jp · Classification of Prefix Hijacking If Announced prefix = 150.65.0.0/16 , size of the hijacked prefix can be 1. exactly same size -regular prefix hijacking

Classification of Prefix Hijacking

� If Announced prefix = 150.65.0.0/16, size of the hijacked

prefix can be

1. exactly same size - regular prefix hijacking

150.65.0.0/16 (JAIST)

2. more specific - sub prefix hijacking

150.65.117.0/24 (Shinoda-lab)

3. Less specific - super prefix hijacking

150.0.0.0/8

09/09/09 14

Page 15: By Khin Thida Latt - attn.jp · Classification of Prefix Hijacking If Announced prefix = 150.65.0.0/16 , size of the hijacked prefix can be 1. exactly same size -regular prefix hijacking

Some of real incidents

Date Incident Classification

Jan. 2006 Con-Ed Steals the Net

Con Edison (AS27506) originated several prefixes that

others own.

Invalid Origin

Regular Prefix

Feb. 2008 Youtube IP hijacking!

YouTube (AS36561) ’s announced prefix =

208.65.152.0/22

Hijaced prefix by AS17557 = 208.65.153.0/24

Invalid Origin

Sub prefix

Nov.2008 Potential Prefix Hijack by Brazil AS

(AS16735) announced almost the whole Internet to two

of its peers

Invalid Transit

Regular Prefix

09/09/09 15

Page 16: By Khin Thida Latt - attn.jp · Classification of Prefix Hijacking If Announced prefix = 150.65.0.0/16 , size of the hijacked prefix can be 1. exactly same size -regular prefix hijacking

only currently-using prefixes are hijacked?

� No!

� unused but possibly be assigned IP prefixes

can also be hijackedcan also be hijacked

� Any legitimate traffic is not disrupted

09/09/09 16

Page 17: By Khin Thida Latt - attn.jp · Classification of Prefix Hijacking If Announced prefix = 150.65.0.0/16 , size of the hijacked prefix can be 1. exactly same size -regular prefix hijacking

Hijacking Incidents on Unused Address Space of US DoD

During 2008

Prefix Country Duration Classification

11.11.11.0/24 Hong Kong 1.1 hours Invalid Origin – Sub prefix

7.7.7.0/24 South Korea 16.0 mins Invalid Origin – Sub prefix

11.1.1.0/24 Russia 3.5weeks Invalid Origin – Sub prefix11.1.1.0/24 Russia 3.5weeks Invalid Origin – Sub prefix

11.0.0.0/24 US 16.0 hours Invalid Origin – Sub prefix

30.30.30.0/24 Argentina 40.0 mins Invalid Origin – Sub prefix

11.1.1.0/24 Indonesia 2.1 mins Invalid Origin – Sub prefix

11.11.11.0/24 Turkey 6.5 mins Invalid Origin – Sub prefix

09/09/09 17

Page 18: By Khin Thida Latt - attn.jp · Classification of Prefix Hijacking If Announced prefix = 150.65.0.0/16 , size of the hijacked prefix can be 1. exactly same size -regular prefix hijacking

#3#3Malicio

-usAS #5

Malicio-us

AS #5

[2,1]

[3,2,1]

09/09/0918

#2#2

Origin AS

#1

Prefix p

Origin AS

#1

Prefix p

[1]

[3,2,1]

#4#4

Blackhole

P = 150.65.0.0/16

x = 150.65.117.0/24xx

Page 19: By Khin Thida Latt - attn.jp · Classification of Prefix Hijacking If Announced prefix = 150.65.0.0/16 , size of the hijacked prefix can be 1. exactly same size -regular prefix hijacking

Recent Methods and issues

Category Name Issues

Modify BGP SBGP, SoBGP Not easily deployable

Checking

central registry

Internet Registry Data Not up-to-date

09/09/09 19

central registry

Filters PG-BGP, Bogon Manual, high false

positives/negatives rate

Alarm services BGPMon, PHAS, MyASN .. etc Sometimes not

distinguishable from

legitimate ones

Can detect only “Invalid

Origin” Type

Page 20: By Khin Thida Latt - attn.jp · Classification of Prefix Hijacking If Announced prefix = 150.65.0.0/16 , size of the hijacked prefix can be 1. exactly same size -regular prefix hijacking

09/09/15 20

Page 21: By Khin Thida Latt - attn.jp · Classification of Prefix Hijacking If Announced prefix = 150.65.0.0/16 , size of the hijacked prefix can be 1. exactly same size -regular prefix hijacking

How does malicious AS intercept ?

1. Firstly, hijack the prefix

2. Then forward the hijacked traffic

� To forward the traffic, malicious ASTo forward the traffic, malicious AS

� know valid route to destination

� make ASes along valid route keep valid route

� not introduce “unreachability” to victim

09/09/15 21

� Key to successful

interception

Page 22: By Khin Thida Latt - attn.jp · Classification of Prefix Hijacking If Announced prefix = 150.65.0.0/16 , size of the hijacked prefix can be 1. exactly same size -regular prefix hijacking

� maintains valid route by itself

OR

� prepends valid route into invalid route

How does malicious AS maintain valid route?

�Then how?

09/09/15 22

Page 23: By Khin Thida Latt - attn.jp · Classification of Prefix Hijacking If Announced prefix = 150.65.0.0/16 , size of the hijacked prefix can be 1. exactly same size -regular prefix hijacking

Attack ModelAttack Model

09/09/15 23

Page 24: By Khin Thida Latt - attn.jp · Classification of Prefix Hijacking If Announced prefix = 150.65.0.0/16 , size of the hijacked prefix can be 1. exactly same size -regular prefix hijacking

Attack Model with shorter AS_PATH

� Malicious AS maintains valid route by itselfTo make successful Interception, Malicious AS follows

� Valley-free nature

� AS relationships ( customer> peer> provider )

Not to introduce reachability problem

1. must carefully choose Ases to propagate invalid route

� if existing route is through provider,

then propagate route to peers + customers

� else

propagate route to all

2. must keep the valid route by itself to fwd traffic back

09/09/15 24

Page 25: By Khin Thida Latt - attn.jp · Classification of Prefix Hijacking If Announced prefix = 150.65.0.0/16 , size of the hijacked prefix can be 1. exactly same size -regular prefix hijacking

Attack Model with shorter AS_PATH

2

3

AS #X

announced prefix =

150.65.10.0/24 (or) /16

maintained Path = [3,2,1,Y]

Announced path = [X,1,Y]

09/09/15 25

1

Origin

Y

5

7

10

Prefix – 150.65.0.0/16

Malicious ASX

8

AS #10

install best path = [X,1,Y]

AS #7

install best path = [10,X,1,Y]

Page 26: By Khin Thida Latt - attn.jp · Classification of Prefix Hijacking If Announced prefix = 150.65.0.0/16 , size of the hijacked prefix can be 1. exactly same size -regular prefix hijacking

Hint to detect!

� Hint : hiding hops between itself and Origin AS shows “strange edge”

� “edge” means “relationship”

� “Strange edge” means “strange relationship”

09/09/15 26

� Strange relationship is the relationship that

� Violates valley free nature

� Introduces a big gap between two Ases

� Then how to explore relationships among ASes?

Page 27: By Khin Thida Latt - attn.jp · Classification of Prefix Hijacking If Announced prefix = 150.65.0.0/16 , size of the hijacked prefix can be 1. exactly same size -regular prefix hijacking

How to explore relationships?

� Infer the relationships using route-view data

� Inferring based on degree of ASes + traffic size of Ases

(currently doing)

09/09/15 27

(currently doing)

Page 28: By Khin Thida Latt - attn.jp · Classification of Prefix Hijacking If Announced prefix = 150.65.0.0/16 , size of the hijacked prefix can be 1. exactly same size -regular prefix hijacking

Attack Model with longer AS_PATH

� Malicious AS does not maintain valid route by

itself

To make successful Interception, malicious AS

09/09/15 28

To make successful Interception, malicious AS

1. Need not consider to which ASes invalid route should

propagated

2. Need not keep the valid route by itself

� Just prepend valid route to invalid route� Taking advantage of “loop prevention mechanism”

Page 29: By Khin Thida Latt - attn.jp · Classification of Prefix Hijacking If Announced prefix = 150.65.0.0/16 , size of the hijacked prefix can be 1. exactly same size -regular prefix hijacking

Attack Model with longer AS_PATH

2

3

AS #X

announced prefix =

150.65.10.0/24

announced Path = [X,3,2,1,Y]

AS #3

09/09/15 29

1

Origin

Y

5

7

10

Prefix – 150.65.0.0/16

X

8

AS #3

� discard [X,3,2,1,Y] (AS loop)

AS #10

� install best path = [X,3,2,1,Y]

AS #7

� install best path =

[10,X,3,2,1,Y]

Page 30: By Khin Thida Latt - attn.jp · Classification of Prefix Hijacking If Announced prefix = 150.65.0.0/16 , size of the hijacked prefix can be 1. exactly same size -regular prefix hijacking

Hints to detect!

� Hint-1 : can intercept only “sub” prefix

� Hint-2 : taking advantage of “loop prevention mechanism”

� These hints can be found in discarded paths

09/09/15 30

� These hints can be found in discarded paths

� To do -> check NLRI + AS_PATH in discarded paths

Page 31: By Khin Thida Latt - attn.jp · Classification of Prefix Hijacking If Announced prefix = 150.65.0.0/16 , size of the hijacked prefix can be 1. exactly same size -regular prefix hijacking

Summary

- Still no sol: towards interception

- Analysis/attack model give hints towards solution

- What kind of hints?

09/09/15 31

- What kind of hints?

- Attack model with shorter AS_PATH

- malicious AS hides one or more Ases -> leads to

strange edge

- Attack model with longer AS_PATH

- it takes ad of loop prevention mechanism -> should

we check before discarding route?

Page 32: By Khin Thida Latt - attn.jp · Classification of Prefix Hijacking If Announced prefix = 150.65.0.0/16 , size of the hijacked prefix can be 1. exactly same size -regular prefix hijacking

Any Question?

09/09/15 32