首页> 外文会议>2011 Network and distributed system security symposium >Losing Control of the Internet: Using the Data Plane to Attack the Control Plane
【24h】

Losing Control of the Internet: Using the Data Plane to Attack the Control Plane

机译:失去对Internet的控制:使用数据平面攻击控制平面

获取原文
获取原文并翻译 | 示例

摘要

In this work, we introduce the Coordinated Cross Plane Session Termination, or CXPST, attack, a distributed denial of service attack that attacks the control plane of the Internet. CXPST extends previous work that demonstrates a vulnerability in routers that allows an adversary to disconnect a pair of routers using only data plane traffic. By carefully choosing BGP sessions to terminate, CXPST generates a surge of BGP updates that are seen by nearly all core routers on the Internet. This surge of updates surpasses the computational capacity of affected routers, crippling their ability to make routing decisions. In this paper we show how an adversary can attack multiple BGP sessions simultaneously and measure the impact these session failures have on the control plane of the Internet. We directly simulate the BGP activity resulting from this attack and compute the impact those messages have on router processing loads. Through simulations we show that botnets on the order of 250,000 nodes can increase processing delays from orders of microseconds to orders of hours. We also propose and validate a defense against CXPST. Through simulation we demonstrate that current defenses are insufficient to stop CXPST. We propose an alternative, low cost, defense that is successful against CXPST, even if only the top 10% of Autonomous Systems by degree deploy it. Additionally, we consider more long term defenses that stop not only CXPST, but similar attacks as well.
机译:在这项工作中,我们介绍了协作跨平面会话终止(CXPST)攻击,这是一种分布式拒绝服务攻击,它攻击Internet的控制平面。 CXPST扩展了先前的工作,该工作证明了路由器中的漏洞,该漏洞使对手仅使用数据平面流量断开一对路由器的连接。通过仔细选择要终止的BGP会话,CXPST会生成大量的BGP更新,几乎Internet上的所有核心路由器都可以看到。更新的浪潮超过了受影响路由器的计算能力,削弱了它们做出路由决策的能力。在本文中,我们展示了攻击者如何同时攻击多个BGP会话并衡量这些会话失败对Internet控制平面的影响。我们直接模拟此攻击导致的BGP活动,并计算这些消息对路由器处理负载的影响。通过仿真,我们发现,僵尸网络数量在25万个节点左右,可以将处理延迟从微秒级增加到小时级。我们还建议并验证针对CXPST的防御措施。通过仿真,我们证明了当前的防御措施不足以阻止CXPST。我们提出了另一种低成本的防御措施,即使仅按等级划分的自治系统中排名前10%的部署,它也可以成功抵御CXPST。此外,我们考虑了更长期的防御措施,不仅可以阻止CXPST,而且还可以阻止类似的攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号