Why do we need network security?
Attacks:
Reasons Internet’s Design is Insecure
Packet-switched networks are vulnerable to
resource exhaustion attacks
Components of Security
Availability: ability to use a resource Confidentiality: concealing information Authenticity: assures origin of information Integrity: prevent unauthorized changes Threat: potential violation Attack: action that violates
Denial of Service Attack ? (Component)
Availability
Control plane authentication (Routing Security)
A route hijack is an attack on the following form of authentication:
Origin, because in a route hijack, the AS that is advertising the prefix is actually not the rightful owner of that prefix.
How? (Attacks on Routing)
Types of Attack
Most common: “Hijack”
DNS masquerading
Attack whereby an attacker can use the BGP infrastructure to hijack a DNS query and masquerade as a legitimate service
AS-path poisoning
Make sure hijacked route is not accepted
Session Authentication
Ensure BGP routing messages sent between routers between ASs are authentic.
Guaranteeing Origin & Path Authentication
“Secure BGP” (BGPSEC)
Origin Attestation (Address Attestation): Certificate binding prefix to owner (signed by trusted party)
Path Attestation: Signatures along AS path
Path Attestation prevents against:
Hijacks
Shortening
Modification
Path Attestation cannot prevent against:
Suppression
Replay
Why is DNS Vulnerable?
Which aspects of DNS make it vulnerable to attack?
Queries over UDP
No authentication for query responses
Defense against DNS cache poisoning
Why does 0x20 make DNS more secure?
Additional entropy
DNS Amplification Attack
DNSSEC Protocol