[CN notes] Internet Security

莉森羊
6 min readDec 24, 2022

--

CN notes 前情提要:傳送門

目錄:
What are the properties of secure communication?
How does Round Robin DNS (RRDNS) work?
How does DNS-based content delivery work?
How do Fast-Flux Service Networks work?
What are the main data sources used by FIRE (FInding Rogue nEtworks) to identify hosts that likely belong to rogue networks?
The design of ASwatch is based on monitoring global BGP routing activity to learn the control plane behavior of a network. Describe 2 phases of this system.
What are 3 classes of features used to determine the likelihood of a security breach within an organization?
(BGP hijacking) What is the classification by affected prefix?
(BGP hijacking) What is the classification by AS-Path announcement?
(BGP hijacking) What is the classification by data plane traffic manipulation?
What are the causes or motivations behind BGP attacks?
Explain the scenario of prefix hijacking.
Explain the scenario of hijacking a path.
What are the key ideas behind ARTEMIS?
What are the two automated techniques used by ARTEMIS to protect against BGP hijacking?
What are two findings from ARTEMIS?
Explain the structure of a DDoS attack.
What is spoofing, and how is related to a DDoS attack?
Describe a Reflection and Amplification attack.
What are the defenses against DDoS attacks?
Explain provider-based blackholing.
Explain IXP blackholing.
What is one of the major drawbacks of BGP blackholing?

What are the properties of secure communication?

  • Confidentiality
  • Integrity
  • Authentication
  • Availability

How does Round Robin DNS (RRDNS) work?

Responding to a DNS request with a list of DNS A records, cycling through records each time.

How does DNS-based content delivery work?

When a lookup is conducted for a resource / content, the delivery network will determine the best CDN server to service the request and use DNS to point the client to the right IP address.

How do Fast-Flux Service Networks work?

Fast-Flux Service Networks (FFSN) 是 RRDNS 和 CDN 背後思想的延伸。顧名思義,它基於 DNS 答案的“快速”變化,其 TTL 低於 RRDNS 和 CDN。這樣做是為了防止 spammers 將錯誤的 IP 地址注入 DNS 解析生命週期。

What are the main data sources used by FIRE (FInding Rogue nEtworks) to identify hosts that likely belong to rogue networks?

  • Botnet command and control providers
  • Drive-by-download hosting providers
  • Phish housing providers

The design of ASwatch is based on monitoring global BGP routing activity to learn the control plane behavior of a network. Describe 2 phases of this system.

  1. Training phase — ASwatch learns the control-plane behavior of a normal AS and a malicious one and learns to differentiate between them.
  2. Operational phase — ASwatch takes an unknown AS and calculates the features for it, assigning it a reputation score.

What are 3 classes of features used to determine the likelihood of a security breach within an organization?

  • Rewiring activity — changes in the AS connecting activity, multiple changes in providers / customers looks suspicious
  • IP Space Fragmentation and Churn — inspects advertised prefixes of an autonomous system. Malicious ASes are likely to use small BGP prefixes to partition their IP address space and only exposes a small section of them
  • BGP Routing Dynamics — tracks announcements and withdrawals, which usually follow different patterns for malicious ASes

(BGP hijacking) What is the classification by affected prefix?

This classification is primarily concerned with the IP prefixes that are advertised by BGP. There are different ways the prefix can be targeted:

  • Exact prefix hijacking
  • Sub-prefix hijacking
  • Squatting

(BGP hijacking) What is the classification by AS-Path announcement?

An illegitimate autonomous system announces the AS path for a prefix for which it doesn’t have ownership rights.

  • Type-0 hijack — AS announcing a prefix not owned by itself
  • Type-N hijack — counterfeit AS announces an illegitimate path for a prefix that it does not own or create a fake path between different ASes
  • Type-U hijack — the hijacking AS does not modify the AS-PATH but may change the prefix

(BGP hijacking) What is the classification by data plane traffic manipulation?

In this classification of attacks, the attacker attempts to hijack the network traffic and manipulate the redirected network traffic on its way to the receiving AS. Traffic intercepted can be:

  • Dropped (blackholing)
  • Man-in-the-middle
  • Impersonation

What are the causes or motivations behind BGP attacks?

  • Human error — misconfiguration / accidents
  • Targeted attack — intentional interception of network traffic (man-in-the-middle) (stealthy)
  • High impact attack — obvious attempt to cause widespread disruption

Explain the scenario of prefix hijacking.

Malicious autonomous system router advertises a prefix that it doesn’t own, taking advantage of its shorter distance to have peer / customer routers change their path for the prefix to the malicious autonomous system.

Explain the scenario of hijacking a path.

Malicious autonomous system receives a path and alters it, placing itself as the best path to reach a specific autonomous system / prefix. This path will likely be shorter than the original, causing other ASes to use the new hijacked path.

What are the key ideas behind ARTEMIS?

  • A configuration file where all prefixes owned by the network are listed for reference.
  • A mechanism for receiving BGP updates, allows the system to receive updates from local routers and monitoring services

What are the two automated techniques used by ARTEMIS to protect against BGP hijacking?

  • Prefix deaggregation — announcing more specific prefixes in order to mitigate prefix hijacking
  • Mitigation with multiple origin AS (MOAS) — third party organizations and service providers do BGP announcements for a given network

What are two findings from ARTEMIS?

  1. Outsource the task of BGP announcements to third parties
  2. Filtering of prefixes is less optimal when compared against BGP announcements

Explain the structure of a DDoS attack.

  • An attempt to compromise a server or network resources with a flood of traffic
  • Attack compromises and deploys flooding servers that send high volumes of traffic to a victim

What is spoofing, and how is related to a DDoS attack?

Impersonating a legitimate server with a spoofed IP address. One method causes a server to flood a target with unsolicited responses to spoofed requests. The other uses the spoofed IP address in the both the source and destination IP, causing the server to send responses / requests to itself.

Describe a Reflection and Amplification attack.

A reflective attack is sending a bunch of spoofed requests to a server which will then DDoS the target on behalf of the attacker.

What are the defenses against DDoS attacks?

  • Traffic Scrubbing Services
  • Access Control List filters
  • BGP Flowspec

Explain provider-based blackholing.

A customer autonomous system announces a blackholing message to the provider with the host name of the DDoS victim. This usually contains a special community field — the provider will then stop advertising the prefix of the affected host.

Explain IXP blackholing.

Same as the above, but on an autonomous system scale. The IXP will handling the blackholing and advertise the NULL address to the other ASes peered in the IXP.

What is one of the major drawbacks of BGP blackholing?

  • The destination under attack becomes unreachable.
  • The mitigation technique is also ineffective if peer autonomous systems neglect / don’t respect BGP Blackholing requests.

--

--

No responses yet