A measurement study of persistent forwarding loops on the Internet

被引:14
作者
Xia, Hanhong [1 ]
Gao, Lixin [1 ]
Fei, Teng [1 ]
机构
[1] Univ Massachusetts, Dept Elect & Comp Engn, Amherst, MA 01003 USA
基金
美国国家科学基金会;
关键词
internet routing; persistent forwarding loop; flooding attacks; distributed denial of service; misconfiguration;
D O I
10.1016/j.comnet.2007.07.004
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we present a measurement study of persistent forwarding loops and a flooding attack that exploits persistent forwarding loops. Persistent forwarding loops may share one or more links with forwarding paths to some hosts. An attacker can exploit persistent forwarding loops to overload the shared links and disrupt Internet connectivity to those hosts. To understand the extent of this vulnerability, we perform extensive measurements to systematically study persistent forwarding loops. We find that persistent forwarding loops do exist in the Internet. At least 35 million addresses experience persistent forwarding loops, and at least 11 million addresses can be attacked by exploiting such persistent forwarding loops. In addition, 87.4% of persistent forwarding loops involve routers in destination domains, which can be observed from various locations. This makes it possible to launch attacks from multiple vantage points. We also find that most persistent forwarding loops are just two hops long, which enables an attacker to significantly amplify traffic to them. We further investigate the possible cause of persistent forwarding loops, and find that about 50% of them are caused by neglecting to configure pull-up routes. We show that even if the misconfiguration occurs in a stub network, it may cause persistent forwarding loops involving routers in large ISPs, and can potentially be exploited by attackers to flood links in a backbone network. To the best of our knowledge, this is the first study of exploiting routing misconfigurations to launch DDoS attacks and understanding the impact of such attacks. (C) 2007 Elsevier B.V. All rights reserved.
引用
收藏
页码:4780 / 4796
页数:17
相关论文
共 11 条
[1]  
[Anonymous], INTERNET ROUTING ARC
[2]  
FRANCOIS P, 2005, P IEEE INFOCOM MIAM, V1, P237
[3]   On the hierarchical structure of the logical Internet graph [J].
Ge, ZH ;
Figueiredo, DR ;
Jaiswal, S ;
Gao, LX .
SCALABILITY AND TRAFFIC CONTROL IN IP NETWORKS, 2001, 4526 :208-222
[4]  
Hengartner U, 2002, IMW 2002: PROCEEDINGS OF THE SECOND INTERNET MEASUREMENT WORKSHOP, P107, DOI 10.1145/637201.637217
[5]   Understanding BGP misconfiguration [J].
Mahajan, R ;
Wetherall, D ;
Anderson, T .
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2002, 32 (04) :3-16
[6]  
Mao Z. M., 2003, P 2003 C APPL TECHN, P365
[7]   End-to-end routing behavior in the Internet [J].
Paxson, V .
IEEE-ACM TRANSACTIONS ON NETWORKING, 1997, 5 (05) :601-615
[8]  
Sridharan A., 2003, P 3 ACM SIGCOMM C IN, P285
[9]  
XIA J, 2005, P INT MEAS C IMC 05, P385
[10]  
XIA J, 2006, N AM NETW OP GROUP N