Fortifying Network Security: The Power of Blackhole Routing in Mitigating DoS Attacks
Objective of Blackhole in ISP :-
A black hole, in the context of Internet Service Providers (ISP), is a measure to deal with traffic that is flooding network causing congestion by discarding this type of traffic. With the Black Hole route it is a simple matter of redirecting traffic intended for an IP address (or range) to a non-existent path or "null" interface, in doing so the malicious traffic is stopped from getting to its target and killing off network completely. It helps in preserving network stability and Execution by isolating the attackers or risky data flows from authentic customers. However, this inevitably leads to a loss of legitimate and good traffic destined for the black holed IP addresses, so black holing is more of a tactical solution than sustainable one.
Fig : 1 Black hole in ISP to prevent DDos attack
From a network security standpoint, black holes deployed in the network are located where traffic is forwarded and dropped. Once an attack is detected, the black holing function can drop all of traffic that involved in the attack at the edge of an Internet service provider (ISP) network according to destination IP address or source IP address. RTBH filtering allows the network edge, or anywhere else in the network for that matter, to interfere with the route tables such that specific traffic destined to it can simply be dropped before having been given a chance to enter the provider's network.
RTBH filtering is the one of many security tools and can be leveraged together to increase the protection of an environment with positive results by:
• Efficiently mitigating DDoS and worm attacks
• Quarantining all traffic en route to the victim under attack
• Implement blacklist filtering for RTBH A logical scenario where existing network devices that are already running internal Border Gateway Protocol (iBGP) at both access and aggregation points and having a different device isolate within the Network Operations
Center (NOC) as a trigger. BGP updates originating iBGP gets their source address sent to the edge, where a trigger-checking device constantly sends regular traffic to the original next-hop prefix and in case this fails (as the desired path is not available), deny-lists it in ng0 on the way out.
Destination-Based Remotely Triggered Black Hole Filtering
Let’s we understand it using one Scenario ………
Cogent ISP observed that one of IP user from 154.0.176.0/20 IP block does suspicious malicious activity hence, there is a threaten of DDos attack from outside. So, they want to block 154.0.176.0/20 IP block to access internet.
How ISP end it does??
*A:France-r1# configure service vprn 12001 static-route-entry 154.0.176.0/20
*A: France-r1>config>service>vprn>static-route-entry# info
----------------------------------------------
black-hole
no shutdown
exit
----------------------------------------------
*A:ga-libr-ahq-r1# show router 12001 static-route
Static Route Table (Service: 12001) Family: IPv4
===============================================================================
Prefix Tag Met Pref Type Act
Next Hop Interface
-------------------------------------------------------------------------------
154.0.176.0/20 0 1 5 BH Y
n/a n/a
========================================================
Comments
Post a Comment