Fatih: detecting and isolating malicious routers

Network routers occupy a key role in modern data transport and consequently are attractive targets for attackers. By manipulating, diverting or dropping packets arriving at a compromised router, an attacker can trivially mount denial-of-service, surveillance or man-in-the-middle attacks on end host systems. In this paper, we specify the problem of detecting routers with incorrect packet forwarding behavior and we explore the design space of protocols that implement such a detector. We further present a concrete protocol that is inexpensive enough for practical implementation at scale.

[1]  Burton H. Bloom,et al.  Space/time trade-offs in hash coding with allowable errors , 1970, CACM.

[2]  Leslie Lamport,et al.  The Byzantine Generals Problem , 1982, TOPL.

[3]  Leslie Lamport,et al.  Distributed snapshots: determining global states of distributed systems , 1985, TOCS.

[4]  Ralph Howard,et al.  Data encryption standard , 1987 .

[5]  Radia J. Perlman,et al.  Network layer protocols with Byzantine robustness , 1988 .

[6]  Matt Bishop A Security Analysis of Version 2 of the Network Time Protocol NTP: A Report to the Privacy and Security Research Group , 1991 .

[7]  Radia Perlman Interconnections: Bridges and Routers , 1992 .

[8]  John Moy,et al.  Multicast Extensions to OSPF , 1994, RFC.

[9]  John Moy,et al.  Multicast routing extensions for OSPF , 1994, CACM.

[10]  Sam Toueg,et al.  Unreliable failure detectors for reliable distributed systems , 1996, JACM.

[11]  J.J. Garcia-Luna-Aceves,et al.  Securing the border gateway routing protocol , 1996, Proceedings of GLOBECOM'96. 1996 IEEE Global Telecommunications Conference.

[12]  S. Cheung,et al.  An efficient message authentication scheme for link state routing , 1997, Proceedings 13th Annual Computer Security Applications Conference.

[13]  Karl N. Levitt,et al.  Protecting routing infrastructures from denial of service using cooperative intrusion detection , 1998, NSPW '97.

[14]  Biswanath Mukherjee,et al.  Detecting disruptive routers: a distributed network monitoring approach , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).

[15]  Craig Partridge,et al.  Packet reordering is not pathological network behavior , 1999, TNET.

[16]  Marc Dacier,et al.  Intrusion Detection Mechanism to Detect Reachability Attacks in PNNI Networks , 1999, Recent Advances in Intrusion Detection.

[17]  Hugo Krawczyk,et al.  UMAC: Fast and Secure Message Authentication , 1999, CRYPTO.

[18]  Matthew J. Zekauskas,et al.  A One-way Packet Loss Metric for IPPM , 1999, RFC.

[19]  Shay Kutten,et al.  Early Detection of Message Forwarding Faults , 2000, SIAM J. Comput..

[20]  Charles Lynn,et al.  Secure Border Gateway Protocol (Secure-BGP) , 2000 .

[21]  Feiyi Wang,et al.  Design and implementation of a scalable intrusion detection system for the protection of network infrastructure , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.

[22]  Stephen T. Kent,et al.  Secure Border Gateway Protocol (S-BGP) , 2000, IEEE Journal on Selected Areas in Communications.

[23]  Tuomas Aura,et al.  Using conservation of flow as a security mechanism in network protocols , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[24]  Nick G. Duffield,et al.  Trajectory sampling for direct traffic observation , 2001, TNET.

[25]  M. Goodrich Efficient and Secure Network Routing Algorithms , 2001 .

[26]  Jeff Dike,et al.  User-mode Linux , 2006, Annual Linux Showcase & Conference.

[27]  尚弘 島影 National Institute of Standards and Technologyにおける超伝導研究及び生活 , 2001 .

[28]  Michael Bailey,et al.  Shining Light on Dark Address Space , 2001 .

[29]  Kevin J. Houle,et al.  Trends in Denial of Service Attack Technology , 2001 .

[30]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.

[31]  Stefan Savage,et al.  Measuring packet reordering , 2002, IMW '02.

[32]  Dennis P. Carrigan,et al.  Security: Adding Protection to the Network via the Network Processor , 2002 .

[33]  David Moore,et al.  Beyond folklore: observations on fragmented traffic , 2002, TNET.

[34]  Daniel R. Simon,et al.  Secure traceroute to detect faulty or malicious routing , 2003, CCRV.

[35]  Yaron Minsky,et al.  Set reconciliation with nearly optimal communication complexity , 2003, IEEE Trans. Inf. Theory.

[36]  Renata Teixeira,et al.  In search of path diversity in ISP networks , 2003, IMC '03.

[37]  Al Morton,et al.  Packet Reordering Metric for IPPM , 2003 .

[38]  Ratul Mahajan,et al.  Measuring ISP topologies with Rocketfuel , 2004, IEEE/ACM Transactions on Networking.

[39]  Hisashi Kobayashi,et al.  Amendment to: Highly Secure and Efficient Routing , 2004 .

[40]  Hisashi Kobayashi,et al.  Highly secure and efficient routing , 2004, IEEE INFOCOM 2004.

[41]  Volker Roth,et al.  Listen and whisper: security mechanisms for BGP , 2004 .

[42]  Stefan Savage,et al.  Detecting and Isolating Malicious Routers , 2006, IEEE Transactions on Dependable and Secure Computing.

[43]  Stefan Savage,et al.  Detecting malicious routers , 2007 .

[44]  S. Savage,et al.  Report on Dimacs * Workshop on Large-scale Internet Attacks , .