Traffic Diversion Techniques for DDoS Mitigation using BGP Flowspec. Leonardo Serodio leonardo.serodio@alcatel-lucent.com May 2013



Similar documents
Firewall-on-Demand. GRNET s approach to advanced network security services management via bgp flow-spec and NETCONF. Leonidas Poulopoulos

Scalable DDoS mitigation using BGP Flowspec

DDoS Mitigation Techniques

SecurityDAM On-demand, Cloud-based DDoS Mitigation

Hunting down a DDOS attack

DDoS Protection. How Cisco IT Protects Against Distributed Denial of Service Attacks. A Cisco on Cisco Case Study: Inside Cisco IT

Arbor s Solution for ISP

F5 Silverline DDoS Protection Onboarding: Technical Note

Firewall on Demand Multidomain

Attacks Against the Cloud: A Mitigation Strategy. Cloud Attack Mitigation & Firewall on Demand

HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT

Availability Digest. Prolexic a DDoS Mitigation Service Provider April 2013

DEFENSE NETWORK FAQS DATA SHEET

How Cisco IT Protects Against Distributed Denial of Service Attacks

How To Block A Ddos Attack On A Network With A Firewall

IS-IS Extensions for Flow Specification

KASPERSKY DDOS PROTECTION. Discover how Kaspersky Lab defends businesses against DDoS attacks

Approaches for DDoS an ISP Perspective.

DESTINATION BASED RTBH FILTERING AT ATTACK ORIGINATING INTERNET SERVICE PROVIDER

MANAGED SECURITY SERVICES : IP AGNOSTIC DDOS AN IP AGNOSTIC APPROACH TO DISTRIBUTED DENIAL OF SERVICE DETECTION AND MITIGATION

Stop DDoS Attacks in Minutes

VERISIGN DDOS PROTECTION SERVICES IN-THE-CLOUD SOLUTION FOR SCALABLE, RELIABLE, AND FLEXIBLE DDOS MONITORING AND MITIGATION

Service Description DDoS Mitigation Service

Automated Mitigation of the Largest and Smartest DDoS Attacks

Protect your network: planning for (DDoS), Distributed Denial of Service attacks

DDoS Mitigation via Regional Cleaning Centers

DDoS Threat Report. Chris Beal Chief Security Architect on Twitter

FortiDDos Size isn t everything

SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper

/ Staminus Communications

MPLS VPN over mgre. Finding Feature Information. Prerequisites for MPLS VPN over mgre

BGP DDoS Mitigation. Gunter Van de Velde. Sr Technical Leader NOSTG, Cisco Systems. May Cisco and/or its affiliates. All rights reserved.

Mitigating DDoS Attacks at Layer 7

TDC s perspective on DDoS threats

Pravail 2.0 Technical Overview. Exclusive Networks

Network provider filter lab

OpenDaylight Project Proposal Dynamic Flow Management

Introduction to MPLS-based VPNs

Demonstrating the high performance and feature richness of the compact MX Series

DDoS Mitigation Solutions

Stop DDoS Attacks in Minutes

Being Ready to Face DDoS Challenge. Vodafone Power to you. DDoS

Protection Solution. Strategic White Paper

Increase Simplicity and Improve Reliability with VPLS on the MX Series Routers

Automated Mitigation of the Largest and Smartest DDoS Attacks

DISTRIBUTED DENIAL OF SERVICE OBSERVATIONS

Versatile Routing and Services with BGP. Understanding and Implementing BGP in SR-OS

How To Stop A Ddos Attack On A Network From Tracing To Source From A Network To A Source Address

IP/MPLS-Based VPNs Layer-3 vs. Layer-2

UNDERSTANDING JUNOS OS NEXT-GENERATION MULTICAST VPNS

IPv6 over IPv4/MPLS Networks: The 6PE approach

The benefits of BGP for every service provider

Transition to IPv6 in Service Providers

DDoS Overview and Incident Response Guide. July 2014

Network Virtualization Network Admission Control Deployment Guide

Making the Internet fast, reliable and secure. DE-CIX Customer Summit Steven Schecter <schecter@akamai.com>

Distributed Denial of Service protection

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

CS 457 Lecture 19 Global Internet - BGP. Fall 2011

2012 Infrastructure Security Report. 8th Annual Edition Kleber Carriello Consulting Engineer

Introduction Inter-AS L3VPN

FireCircle: GRNET s approach to advanced network security services management via bgp flow-spec and NETCONF

Exterior Gateway Protocols (BGP)

DDoS attacks in CESNET2

Enabling Solutions in Cloud Infrastructure and for Network Functions Virtualization

State of Texas. TEX-AN Next Generation. NNI Plan

JUNOS DDoS SECURE. Advanced DDoS Mitigation Technology

Inter-domain Routing Basics. Border Gateway Protocol. Inter-domain Routing Basics. Inter-domain Routing Basics. Exterior routing protocols created to:

DDoS attacks on electronic payment systems. Sean Rijs and Joris Claassen Supervisor: Stefan Dusée

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Campus LAN at NKN Member Institutions

Data Sheet. DPtech Anti-DDoS Series. Overview

Ihr Standort bleibt erreichbar. Ihre Applikationen bleiben erreichbar!

MPLS WAN Explorer. Enterprise Network Management Visibility through the MPLS VPN Cloud

IPV6 FRAGMENTATION. The Case For Deprecation. Ron Bonica NANOG58

Building a small Data Centre

VALIDATING DDoS THREAT PROTECTION

How To Make A Network Secure

Service Provider Solutions. DDoS Protection Solution. Enabling Clean Pipes Capabilities

Internet Protocol: IP packet headers. vendredi 18 octobre 13

KASPERSKY DDoS PROTECTION. Protecting your business against financial and reputational losses with Kaspersky DDoS Protection

SHARE THIS WHITEPAPER. On-Premise, Cloud or Hybrid? Approaches to Mitigate DDoS Attacks Whitepaper

Tutorial: Options for Blackhole and Discard Routing. Joseph M. Soricelli Wayne Gustavus NANOG 32, Reston, Virginia

DDoS Mitigation Strategies

Transcription:

Traffic Diversion Techniques for DDoS Mitigation using BGP Flowspec Leonardo Serodio leonardo.serodio@alcatel-lucent.com May 2013

Distributed Denial of Service (DDoS) Attacks DDoS attack traffic consumes SP network capacity DDoS attack traffic saturates inline security devices Bots Victim Firewall IPS Internet Service Provider Network Enterprise or IDC DDoS attacks launched from compromised systems (bots) DDoS attack traffic targets applications & services 2

Cloud-based DDoS Defense with RTBH BGP Announcement Originated by the Victim D/RTBH - All traffic to the victim is discarded! Remotely Trigered Black Hole Filtering at Peer SP edge Victim initiates BGP announcement Victim RTBH RTBH Firewall IPS Good traffic Attack traffic Internet BGP Announcement Service Provider Network Enterprise or IDC BGP Prefix with next-hop set to predefined black-hole route. Fourth most used tool to mitigate DDoS attacks [5] RFCs: RFC 3882, RFC 5635 (includes D/RTBH and S/RTBH) 3

Cloud-based DDoS Defense with RTBH BGP Announcement Originated by the SP D/RTBH - All traffic to the victim is discarded! Remotely Trigered Black Hole Filtering at SP edge Victim RTBH RTBH Firewall IPS Internet Good traffic Attack traffic BGP Announcement Service Provider Network Enterprise or IDC BGP Prefix with next-hop set to predefined black-hole route. 4

BGP Flow Specification BGP Flowspec defines a new BGP Network Layer Reachability Information (NLRI) format used to distribute traffic flow specification rules. NLRI (AFI=1, SAFI=133): IPv4 unicast filtering NLRI (AFI=1, SAFI=134): BGP/MPLS VPN filtering Specified by RFC 5575 [1], extended to IPv6 in [2] Main application today is to automate the distribution of traffic filter lists to routers for the mitigation of DDoS attacks. Selectively drop traffic flows based on L3/L4 information. Intelligent control platform builds filter rules to drop harmful traffic, encodes them as BGP flowspec routes and advertises them to BGP peers. 5

BGP Flow Specification The Flow specification can match on the following criteria: Source / Destination Prefix IP Protocol (UDP, TCP, ICMP, etc.) Source and/or Destination Port ICMP Type and Code TCP Flags Packet Length DSCP (Diffserv Code Point) Fragment (DF, IsF, FF, LF) Actions defined using Extended Communities: 0x8006: traffic-rate (rate 0 discards all traffic for the flow) 0x8007: traffic-action (sample) 0x8008: redirect to VRF 0x8009: traffic-marking (DSCP value ) 6

BGP Flow Specification Why Use It for ACLs? ACLs are still the single most widely used tool to mitigate DDoS attacks [5]. But ACLs are demanding in configuration & maintenance. BGP Flowspec leverages the BGP Control Plane to simplify the distribution of ACLs, greatly improving operations: Inject new filter rules to all routers simultaneously without changing router configuration. Reuse existing BGP operational knowledge and best practices. Control policy propagation via BGP Communities. Improve response time to mitigate DDoS attacks. Route validation performed for ebgp sessions, see draft [3] for revised validation procedure for ibgp sessions. 7

Cloud-based DDoS Defense with BGP Flowspec Inter-domain flowspec injection Volumetric attack traffic removed at ISP network edge Only clean traffic delivered to enterprise/idc Flowspec Victim Flowspec Flowspec Firewall IPS Internet Service Provider Network Enterprise or IDC Good traffic Attack traffic Flowspec Flowspec mitigation controlled by ISP customer under attack 8

Cloud-based DDoS Defense with BGP Flowspec Intra-domain flowspec injection Volumetric attack traffic removed at ISP network edge Only clean traffic delivered to enterprise/idc Flowspec Victim Flowspec Flowspec Internet SOC Service Provider Network Firewall IPS Enterprise or IDC Good traffic Attack traffic Flowspec Flowspec mitigation controlled by the ISP or ISP customer via Portal 9

BGP Flow Specification Vendors & Users Router vendors supporting BGP Flowspec: Alcatel-Lucent 7750 SROS 9.0R1 Juniper JunOS 7.3 DDoS mitigation vendors: Arbor Peakflow SP 3.5 BGP Tools: ExaBGP Injector [7] Users: North America: TW Telecom (TWTC) [6], other Tier 1, Tier 2 Europe: Tier 1, Tier 2 Latin America & Caribbean: RNP (Brasil) [8] Flowspec itself is the 8 th most used tool to mitigate attacks [5] 10

DDoS attacks: Increasing Scale & Sophistication DDoS Attack Bandwidth (Gbps) Volumetric Attacks Network Infrastructure Application Attacks IDCs & Services Source: Arbor Networks 2012 Worldwide Infrastructure Security Report, Volume VIII 11

DDoS Protection with Mitigation Appliance (IDMS) Surgical Mitigation Traffic anomaly is scrubbed by a DPI-capable mitigation appliance that surgically removes the attack traffic only. Mitigation appliances are also known as Intelligent DDoS Mitigation Systems (IDMS). IDMS are the second most used tool for DDoS protection [5]. Able to mitigate complex, application-layer DDoS attacks without completing the attack. Typically a shared resource in the network infrastructure. Traffic anomalies need to be redirected in the network to go through the IDMS before reaching the intended destination: - Traffic Diversion or Offramping - Traffic Reinjection or Onramping 12

IDMS-based DDoS Mitigation Terminology Diversion or Offramping: rerouting of traffic destined to the victim to the DDoS mitigation appliance for scrubbing. Reinjection or Onramping: redirection of scrubbed (clean) traffic back to its intended destination. Typically, traffic diversion takes place through more specific BGP prefix announcements (victim addresses), usually in the GRT (called diversion/offramp route): Easier to control & manipulate routes (NH, Communities) Can be signaled across AS boundaries if required Traffic Reinjection usually requires tunneling or an alternate routing domain (VRF) to get clean traffic back to its intended destination without looping. 13

IDMS-based DDoS Mitigation Scrubbing Center Design Traffic Diversion Scrubbing Center IDMS (Mitigation Appliance) Scrubbed Traffic Reinjection Internet Victim Firewall IPS Good traffic Attack traffic BGP Prefix Diversion Diversion Prefixes (BGP) Detection & Control Internet GRE Tunnel or VRF (dotted yellow line) Enterprise or IDC 14

IDMS-based DDoS Mitigation Distributed Design Embedded IDMS Internal Traffic Diversion & Scrubbing Scrubbing Center IDMS (Mitigation Appliance) Internet Victim I M D S Firewall IPS Embedded IMDS I M D S Detection & Control Enterprise or IDC Good traffic Attack traffic BGP Prefix Diversion Internet 15

Traffic Diversion with BGP Prefixes The Good & The Bad Real mitigation of DNS attack 16

DDoS Mitigation Appliance Surgical Diversion Using BGP Flowspec Redirect to VRF Action Traffic diversion using a VRF (subset of all traffic to victim). Scrubbing Center Mitigation Appliance Traffic Reinjection Internet Victim Firewall IPS BGP Flowspec filter to redirect only specified traffic Detection & Control Enterprise or IDC Dirty VRF Good traffic Attack traffic BGP Flowspec Diversion Internet 17

Surgical Diversion Using BGP Flowspec Optimized Design & Operation No changes to the Global Routing Table (GRT) Diversion performed by Flowspec NLRI Flowspec filter Action configured to Redirect to VRF Extended Community 0x8008. Less intrusive to the routing system No need for a tunneling design for reinjection/onramping Clean traffic can simply be sent back to the GRT More granular control of diverted traffic Allows for the redirection of only a subset of the traffic to the victim: specific protocols, ports, source prefix, destination prefix Less traffic overhead for Mitigation Appliance to deal with 18

Surgical Diversion Using BGP Flowspec Enabling New Workflows Facilitates the implementation of new mitigation workflows for demanding use cases: Always on Mitigations for critical resources: HTTPS traffic only (normal web traffic follows on-demand mitigation model) ICMP & UDP traffic Victims with very large traffic volume Divert just traffic from a certain block, or geographical region (based on IP Location) 19

Public Facing Servers Surgical Diversion for Data Centers Optimizing the Mitigation of Application-Layer DDoS Attacks On-demand or continuous mitigation of selective traffic Benefits of continuous DPI traffic scrubbing without the risks and demands of in-line deployments. Legitimate Users Flowspec GRT Firewall / IPS / WAF Attackers VRF I D M S Backbone / Internet Data Center Network 20

BGP Flowspec Diversion Work in Progress New Redirect to IP Next-Hop Flowspec Action Described in draft-simpson-idr-flowspec-redirect-02.txt [4] New Extended Community value 0x0800 Enables BGP flowspec redirection using encapsulations other than VRFs, such as GRE or MPLS tunnels. Scrubbing Center Mitigation Appliance Victim MPLS or GRE Tunnel Enterprise or IDC 21

Summary Surgical Diversion Benefits Using BGP Flowspec: Greatly simplifies traffic diversion design and operation: Less intrusive to the routing system no changes to the Global Routing Table (GRT). On the reinjection side, there is no need to use tunneling (GRE) or VRF designs. Optimizes the benefits of a DDoS Mitigation Appliance ( surgical mitigation ) with precise diversion: Allows for a better optimization of the shared mitigation capacity of the mitigation appliance. Addresses demanding mitigation use cases. On-demand & continuous scrubbing per application or other criteria. 22

References: [1] RFC 5575, Dissemination of Flow Specification Rules [2] draft-ietf-idr-flow-spec-v6-03 Dissemination of Flow Specification Rules for IPv6 [3] draft-ietf-idr-bgp-flowspec-oid-01 Revised Validation Procedure for BGP Flow Specifications [4] draft-simpson-idr-flowspec-redirect-02.txt BGP Flow-Spec Extended Community for Traffic Redirect to IP Next Hop [5] Arbor Networks 2012 Worldwide Infrastructure Security Report, Volume VIII [6] 2006 - NANOG 38, D. Gassen, R. Lozano (Time Warner Telecom), D. McPherson, C. Labovitz (Arbor Networks), "BGP Flow Specification Deployment Experience [7] 2010 - LINX69, Thomas Mangin (Exa Networks), Andy Davidson (NetSumo), "BGP Route Injection http://www.andyd.net/media/talks/bgprouteinjection.pdf [8] GTER/GTS 2007, Raniery Pontes (RNP), Flowspec em ação - Experiência de uso no backbone da RNP 23