Lesson 9: Internet Security Flashcards
What are the properties of secure communication?
- Confidentiality
- Integrity
- Authentication
- Availability
How does Round Robin DNS (RRDNS) work?
The server responds to a DNS request with a list of DNS A records, which it then cycles through in a round robin manner. The DNS client can then choose a record using different strategies –choose the first record each time, use the closest record in terms of network proximity, etc
How does DNS-based content delivery work?
For example CDNs distribute the load amongst multiple servers at a single location, but also distribute these servers across the world. When accessing the name of the service using DNS, the CDN computes the ‘nearest edge server’ and returns its IP address to the DNS client. It uses sophisticated techniques based on network topology and current link characteristics to determine the nearest server.
How do Fast-Flux Service Networks work?
it is based on a ‘rapid’ change in DNS answers, with a TTL lower than that of RRDNS and CDN. One key difference between FFSN and the other methods is that after the TTL expires, it returns a different set of A records from a larger set of compromised machines.
What are the main data sources to identify hosts that likely belong to rogue networks, used by FIRE (FInding Rogue nEtworks system)?
- Botnet command and control providers
- Drive-by-download hosting providers
- Phish housing providers
The design of ASwatch is based on monitoring global BGP routing activity to learn the control plane behavior of a network. Describe 2 phases of this system.
- Training phase
2. Operational phase
What are 3 classes of features used to determine the likelihood of a security breach within an organization?
- Mismanagement symptoms
- Malicious Activities
- Security Incident Reports
(BGP hijacking) What is the classification by affected prefix?
In this class of hijacking attacks, we are primarily concerned with the IP prefixes that are advertised by BGP
a. Exact prefix hijacking:When two different ASes (one is genuine and the other one is counterfeit) announce a path for the same prefix. This disrupts routing in such a way that traffic is routed towards the hijacker wherever the AS-path route is shortest, thereby disrupting traffic.
b. Sub-prefix hijacking: This is an extension of exact prefix hijacking, except that in this case, the hijacking AS works with a sub-prefix of the genuine prefix of the real AS. This exploits the characteristic of BGP to favor more specific prefixes, and as a result route large/entire amount of traffic to the hijacking AS.
Example: A given hijacking AS labelled AS2 announces that it has a path to prefix 10.10.0.0/24 which is a part of 10.10.0.0/16 owned by AS1.
c. Squatting: In this type of attack, the hijacking AS announces a prefix that has not yet been announced by the owner AS.
(BGP hijacking) What is the classification by AS-Path announcement?
In this class of attacks, an illegitimate AS announces the AS-path for a prefix for which it doesn’t have ownership rights. There are different ways this can be achieved:
a. Type-0 hijacking: This is simply an AS announcing a prefix not owned by itself.
b. Type-N hijacking: This is an attack where the counterfeit AS announces an illegitimate path for a prefix that it does not own to create a fake link (path) between different ASes.
For example, {AS2, ASx, ASy, AS1 – 10.0.0.0/23} denotes a fake path between AS2 and AS1, where there is no link between AS2 and ASx.The N denotes the position of the rightmost fake link in the illegitimate announcement, e.g. {AS2, ASy, AS1 – 10.0.0.0/23} is a Type-2 hijacking.
c. Type-U hijacking:In this attack the hijacking AS does not modify the AS-PATH but may change the prefix.
(BGP hijacking) What is the classification by data plane traffic manipulation?
In this class of attacks, the intention of the attacker is to hijack the network traffic and manipulate the redirected network traffic on its way to the receiving AS. There are three ways the attack can be realized under this classification, i.e. traffic intercepted by the hijacker can be
a. Dropped, so that it never reaches the intended destination. This attack falls under the category ofblackholing (BH) attack.
b. Eavesdropped or manipulated before it reaches the receiving AS, which is also called asman-in-the-middle attack (MM).
c. Impersonated, e.g. In this case the network traffic of the victim AS is impersonated and the response to this network traffic is sent back to the sender. This attack is calledimposture (IM) attack.
What are the causes or motivations behind BGP attacks?
- Human Error
- Targeted attack
- High impact attack
Explain the scenario of prefix hijacking.
When an attacker advertises a prefix, other ASes which have a longer path for the same prefix advertised will then believe this new fake advertisement.
Explain the scenario of hijacking a path.
When an attacker advertises a path, other ASes which have a longer path for the same advertised will then believe this new fake advertisement.
What are the key ideas behind ARTEMIS?
- Aconfiguration file: where all the prefixes owned by the network are listed here for reference. This configuration file is populated by the network operator.
- Amechanism for receiving BGP updates: this allows receiving updates from local routers and monitoring services. This is built into the system
What are the two automated techniques used by ARTEMIS to protect against BGP hijacking?
- Prefix deaggregation
2. Mitigation with Multiple Origin AS (MOAS)