Fortifying Network Security: The Power of Blackhole Routing in Mitigating DoS Attacks

 

Objective of Blackhole in ISP :-

A black hole, in the context of Internet Service Providers (ISP), is a measure to deal with traffic that is flooding network causing congestion by discarding this type of traffic. With the Black Hole route it is a simple matter of redirecting traffic intended for an IP address (or range) to a non-existent path or "null" interface, in doing so the malicious traffic is stopped from getting to its target and killing off network completely. It helps in preserving network stability and Execution by isolating the attackers or risky data flows from authentic customers. However, this inevitably leads to a loss of legitimate and good traffic destined for the black holed IP addresses, so black holing is more of a tactical solution than sustainable one.

 

 

                  Fig : 1 Black hole in ISP to prevent DDos attack 

From a network security standpoint, black holes deployed in the network are located where traffic is forwarded and dropped. Once an attack is detected, the black holing function can drop all of traffic that involved in the attack at the edge of an Internet service provider (ISP) network according to destination IP address or source IP address. RTBH filtering allows the network edge, or anywhere else in the network for that matter, to interfere with the route tables such that specific traffic destined to it can simply be dropped before having been given a chance to enter the provider's network.

 

 RTBH filtering is the one of many security tools and can be leveraged together to increase the protection of an environment with positive results by:

 • Efficiently mitigating DDoS and worm attacks

 • Quarantining all traffic en route to the victim under attack

 • Implement blacklist filtering for RTBH A logical scenario where existing network devices that are already running internal Border Gateway Protocol (iBGP) at both access and aggregation points and having a different device isolate within the Network Operations

Center (NOC) as a trigger. BGP updates originating iBGP gets their source address sent to the edge, where a trigger-checking device constantly sends regular traffic to the original next-hop prefix and in case this fails (as the desired path is not available), deny-lists it in ng0 on the way out.

Destination-Based Remotely Triggered Black Hole Filtering

Mitigating the damaging effects of a denial-of-service (DoS) attack involves swiftly implementing measures to drop malicious traffic and protect network integrity. One effective strategy is destination-based IP black hole filtering with remote triggering, which allows for quick and efficient network-wide response. This approach entails adding a static route to a triggering device, which then sends a routing update via iBGP to edge routers configured for black hole filtering. The routing update sets the next hop IP address to a reconfigured static route pointing to a null interface, effectively discarding the offending traffic. This method not only isolates the attack but also minimizes collateral damage, such as bandwidth consumption and processor utilization, thereby maintaining service stability. Additionally, it allows for the documentation and tracking of black-holed destinations, ensuring that these addresses can be promptly restored once the threat subsides, maintaining network resilience and service continuity.
 

Let’s we understand it using one Scenario ………

Cogent ISP observed that one of IP user from 154.0.176.0/20 IP block does suspicious malicious activity hence, there is a threaten of DDos attack from outside. So, they want to block 154.0.176.0/20 IP block to access internet.

How ISP end it does??

*A:France-r1# configure service  vprn 12001 static-route-entry 154.0.176.0/20

*A: France-r1>config>service>vprn>static-route-entry# info

----------------------------------------------

                black-hole

                    no shutdown

                exit

----------------------------------------------

 

 

*A:ga-libr-ahq-r1# show  router  12001 static-route

Static Route Table (Service: 12001)  Family: IPv4

===============================================================================

Prefix                                        Tag         Met    Pref Type Act

   Next Hop                                    Interface

-------------------------------------------------------------------------------

154.0.176.0/20                                0           1      5    BH   Y

   n/a                                         n/a

========================================================

 

 

Comments

Popular posts from this blog

AI in NOC: A New Era for Capacity Planning and Network Management

Basics of Multiprotocol Label Switching

Traffic engineering: An attractive feature of MPLS