NPLA: Network Prefix Level Authentication

14
NPLA: Network Prefix Level Authentication Ming Li,Yong Cui,Matti Siekkinen,Antti Ylä-Jääski Aalto University, Finland Tsinghua University, China

description

NPLA: Network Prefix Level Authentication. Ming Li,Yong Cui,Matti Siekkinen,Antti Ylä-Jääski Aalto University, Finland Tsinghua University, China. Structure. Motivation Objective Architecture overview Implementation Overhead Conclusion and future work. - PowerPoint PPT Presentation

Transcript of NPLA: Network Prefix Level Authentication

Page 1: NPLA: Network Prefix Level Authentication

NPLA: Network Prefix Level Authentication

Ming Li,Yong Cui,Matti Siekkinen,Antti Ylä-Jääski

Aalto University, FinlandTsinghua University, China

Page 2: NPLA: Network Prefix Level Authentication

Structure

MotivationObjectiveArchitecture overviewImplementationOverheadConclusion and future work

GlobeCom'10 Workshop on FutureNet, Miami, Florida, USA

Page 3: NPLA: Network Prefix Level Authentication

Motivation

IP addresses spoofingLack of accountabilityDoS, vulnerability scanning,...Ruin noval applications in practice

...

GlobeCom'10 Workshop on FutureNet, Miami, Florida, USA

Page 4: NPLA: Network Prefix Level Authentication

Our GoalProvide packet level authentication on the Internet

Basic ApproachDigital signatures on packets

Objective

GlobeCom'10 Workshop on FutureNet, Miami, Florida, USA

Page 5: NPLA: Network Prefix Level Authentication

Objective

Accountability is the responsibility for one’s actions

Link actions to their actorsPunish misbehavior

Packet AuthenticationEliminate/mitigate source spoofing based attacks

Target for existing Internet not clean slate solution

GlobeCom'10 Workshop on FutureNet, Miami, Florida, USA

Page 6: NPLA: Network Prefix Level Authentication

Architecture overview (NPLA)

GlobeCom'10 Workshop on FutureNet, Miami, Florida, USA

Page 7: NPLA: Network Prefix Level Authentication

Implementation

Inject/verify entities

Interact with legacy entitiesHost, router, NAT, prefix aggregation...

OverheadEffectiveness

What kind of key

Which protocol layer

Signature sizeCrypt. securityKey distribution

Granularity

How to implement if we intend to for partial deployment in today’s Internet

GlobeCom'10 Workshop on FutureNet, Miami, Florida, USA

Page 8: NPLA: Network Prefix Level Authentication

Requirements->Implementation

Strong identitifier/on route entities could verify the packets -> key type

Asymmetric key

Compatibility -> protocol layer Shim layer between IP and TCP

GlobeCom'10 Workshop on FutureNet, Miami, Florida, USA

Page 9: NPLA: Network Prefix Level Authentication

Requirements->Implementation...

Key distributionPublic key infrastructure (PKI) Routing protocols (BGP)Offline

Signature size and security ECC public key cryptography algorithm

Security: 163-bit ECC key = 1024-bit RSA key

GlobeCom'10 Workshop on FutureNet, Miami, Florida, USA

Page 10: NPLA: Network Prefix Level Authentication

Requirements->Implementation...

Security level/key management overhead -> authentication granularity

Host/personal level Network prefix level (intra-domain)

AS level (inter-domain)

Signature injection and verification entities

Prefix border router AS border router

GlobeCom'10 Workshop on FutureNet, Miami, Florida, USA

Page 11: NPLA: Network Prefix Level Authentication

Requirements->ImplementationPartial/incremental deployment, interact with legacy entities

Legacy host (strip off before arriving)

Router (compatible)NAT (update)Prefix aggregation (known to the administrator)

Incentive deploymentIP fragmentation

GlobeCom'10 Workshop on FutureNet, Miami, Florida, USA

Page 12: NPLA: Network Prefix Level Authentication

Overhead and performance

The overhead must be affordableComputation overhead (FPGA crypt hardware)

Generate 645K/s and verify 283K/s signatures

Generate 3.8G/s and 1.7G/s traffic

Traffic overhead (%6-10%)Memory overhead

13MB for prefix level authenticationGlobeCom'10 Workshop on FutureNet, Miami, Florida, USA

Page 13: NPLA: Network Prefix Level Authentication

Overhead and PerformanceDelay

~16us per generation~24us per verification

GlobeCom'10 Workshop on FutureNet, Miami, Florida, USA

Page 14: NPLA: Network Prefix Level Authentication

Conclusion and Future WorkAuthenticate packets to its claimed network prefix

Implementation challengesHow to make it work in practice?

Future workImplementation in real networks

GlobeCom'10 Workshop on FutureNet, Miami, Florida, USA