RPKI Defense Capability Simulation Method Based on Container Virtualization
Abstract
1. Introduction
- A simulation platform that integrates hardware resources and deploys virtual routing nodes on a large scale is proposed, which combines cloud computing technology and virtualized container technology.
- The complete framework simulation of the BGP and the RPKI is implemented on the proposed simulation platform, which includes the automatic configuration of dynamic routing protocols and the automatic release of RPKI certificate resources and encryption information.
- On the basis of malicious BGP prefix hijacking attacks, a data collection and performance evaluation technique is proposed to assess the defensive capability and effectiveness of the RPKI against malicious attacks from both the control and data planes in an experimental environment.
2. Related Work
3. Architecture of a Cloud-Based BGP Simulation Platform for BGP Security Evaluation
- Simulation scenario management: The main purpose of the SOD–BGP is to study the results of deploying defensive strategies to counter malicious attack scenarios under specific conditions. We define various elements used to create the simulation network, such as images, AS relationships, AS defense strategies, and configuration files for virtual routers, within a simulation scenario. Specifically, in a virtualized environment, the images serve as static forms of virtual nodes, where simulation nodes are composed of the images from virtual systems. By embedding a dynamic routing simulation module developed with FRRouting [30] into the base image, we achieve a functional transformation from regular virtual nodes to router virtual nodes. The generated routing images are synchronized to all the compute nodes under the control node’s scheduling to prevent the need to regenerate the images during the deployment, thus accelerating the deployment process. By adjusting the parameters of the simulation scenario, our simulation framework can achieve diverse simulation network deployments. The details are introduced in Section 4.1.
- BGP network and RPKI component simulation: In accordance with the simulated network topology of the BGP, deployment configuration files containing information about the network and node deployments are generated. The control node initially parses the AS connectivity relationships from the configuration files. Invoking the Neutron API of the network node creates a virtual network to interconnect the virtual nodes. The control node subsequently parses the information about the virtual nodes and uses the routing images generated in the simulation scenario management, along with the RPKI components, to instantiate virtual routing nodes, virtual CA nodes, and virtual RP nodes. Following the topology relationships, all the virtual nodes are interconnected through the virtual network, thus realizing the construction of the target simulated network scenario. The detailed simulation technology implementation is introduced in Section 4.2.
- BGP malicious attack scenario simulation: To simulate a BGP prefix hijacking attack, a random pair of routing nodes is selected on the basis of the routing protocol–simulated network as the foundational scenario. One of these nodes is designated the malicious attacker node, whereas the other node is the victim. Before initiating the attack, the root CA needs to issue ROAs corresponding to the IP address blocks held by the victim node. This ensures that the routing nodes employing the RPKI can perform ROV effectively. Upon selecting the attack type, the control node orchestrates the malicious attacker node to launch a specific attack against the IP prefix addresses held by the victim node, utilizing routing policies and route configurations. This step completes one cycle of a malicious attack. The detailed implementation method is introduced in Section 4.3.
- Data collection and effect evaluation: To verify the proper operation of the simulated malicious attacks and obtain the attack and defense results after deploying the RPKI, this paper introduces a client/server structured technology for collecting the attack results and evaluating their effectiveness. The data collection process begins by acquiring the routing tables of the virtual routing nodes, followed by monitoring the actual traffic path information of the nodes toward the simulated attack prefix addresses. After the data are filtered and processed, the results are initially stored locally on each node. Upon completion of the experimental operations, all the nodes synchronize their results with the server database. By thoroughly analyzing the collected data, extracting key information, and evaluating the attack effectiveness on the basis of metrics such as connection rates and hijack rates, this paper concludes by creating visualized charts to comprehensively present the experimental outcomes. The detailed technical implementation is introduced in Section 5.
4. The BGP Simulation Network Deployment
4.1. Virtualization-Based BGP and RPKI Simulation Technology
4.2. Distributed Simulation Environment Construction for BGP
- Generating the Topology Configuration File: The BGP is an inter-domain routing protocol operating between the ASes. Owing to the large scale of the AS-level network topology, it is necessary to generate a topology deployment file on the basis of the interconnection relationships between the AS nodes. To assess the security advantages of the BGP network environment by deploying additional security mechanisms under the condition of a partial RPKI deployment, the AS nodes need to be randomly selected for RPKI dependent software deployment on the basis of the given deployment percentage. The specific topology configuration information is presented in Table 1.
- Creating Virtual Networks: To ensure the IP address allocation for the nodes and data exchange between the nodes in the simulated network, upon parsing the network configuration information from the topology configuration file, the Neutron API of the network node is invoked to create a virtual network. Subnets are subsequently assigned to the virtual network, completing the establishment of the virtual network.
- Creating Virtual Nodes: On the basis of the routing configuration information in the topology configuration file, the virtual router nodes are created by loading the corresponding simulation images. These nodes are associated with their respective virtual networks and obtain network IP addresses. Additionally, the RP nodes belonging to the AS are created as needed. IP addresses are assigned to these nodes on the basis of the created virtual network, and their gateway addresses are modified to the IP addresses of the AS in the same network segment. This is done to achieve interconnection and communication between the RP and the CA server.
4.3. Automated Loading Technique for Malicious BGP Attack Scenario
| Algorithm 1 Batch ROA Management |
| Input: roas ← a list of ROA information, include IP prefix, length, max length, asn. operation ← string for roa operation, include adding or deleting. Output: result ← roa operation result 1: for roa in roas do 2: if exist maxlength then 3: if maxlength < length then 4: result ← maxlength invalid 5: else 6: update(roa, operation) // perform corresponding operation 7: result ← successs 8: end if 9: end if 10: end for 11: return result |
5. Data Collection and Effectiveness Evaluation Strategy for Simulation Result
- Control Plane: The most obvious manifestation of prefix hijacking at the control level is the change in the virtual router routing table entries, which is also an intuitive demonstration of whether the RPKI works. Therefore, we use the data collection program in the virtual router to record the routing table entries at a certain time after the network topology reaches convergences. By searching for the hijacked prefixes and comparing them, we can access the ROV activation status and determine the security defense provided by the RPKI. To this end, the routing jitter Flapi index is defined as the number of changes in the routing table’s best entries for ASi during a single hijacking event.In the above formula, = {entry1, entry2, …, entryN} represents the set of detailed routing entries for ASi at time t. Flapi is the set difference in routing table entries between two moments, indicating the routing instability caused by the impact of prefix hijacking on the routing node ASi. The Flapi index allows us to assess the degree of routing instability in the simulated network topology. A higher index value suggests a greater malicious impact of the hijacking attack, resulting in a less stable network environment.
- Data Plane: According to the experimental results in [6], the RPKI also has an effect on the data plane. Although an AS deploying the RPKI will never use the BGP route announcements with an invalid ROV state, the AS may still forward announcements to an AS that does not adopt the RPKI because of more specific routing rules. Therefore, it is necessary to assess the impact of prefix hijacking on the data plane and uniformly quantify the results. The specific formula is described as follows:Suppose that A is the set of all ASes, and that S is the set of ASes deploying the RPKI in the current network environment. Hi(S) means that when the AS deploying the RPKI is S, the data traffic of ASi is hijacked by malicious attacks. Ci(S) indicates that ASi is successfully connected to the prefix address held by the legitimate ASes, whereas Di(S) means that ASi is not connected to the prefix address announced by any AS. These three parameters can effectively measure the harm caused by prefix hijacking attacks on the BGP network when the RPKI is partially deployed. To assess the benefits of routers that have deployed the RPKI over undeployed ASes, we also define Bi(S) as follows:
6. Experimental Verification and Analysis
6.1. Experimental Environment
6.2. Virtual–Real Interconnected Scene Construction and Fidelity Testing
6.3. Large-Scale Network Simulation Scenario Testing and Defense Results Analysis
6.4. Comparative Analysis with Other Simulation Methods
7. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Raynor, J.; Crnovrsanin, T.; Di Bartolomeo, S.; South, L.; Saffo, D.; Dunne, C. The state of the art in BGP visualization tools: A mapping of visualization techniques to cyberattack types. IEEE Trans. Vis. Comput. Graph. 2022, 29, 1059–1069. [Google Scholar] [CrossRef] [PubMed]
- Du, L.; Gu, Z.; Wang, Y.; Wang, L.; Jia, Y. A Few-Shot Class-Incremental Learning Method for Network Intrusion Detection. IEEE Trans. Netw. Serv. Manag. 2023, 21, 2389–2401. [Google Scholar] [CrossRef]
- Beaver, J.M.; Symons, C.T.; Gillen, R.E. A learning system for discriminating variants of malicious network traffic. In Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop, Oak Ridge, TN, USA, 8–10 January 2013; pp. 1–4. [Google Scholar]
- Alani, M.M.; Awad, A.I. An intelligent two-layer intrusion detection system for the internet of things. IEEE Trans. Ind. Inform. 2022, 19, 683–692. [Google Scholar] [CrossRef]
- Xu, G.; Cao, Y.; Ren, Y.; Li, X.; Feng, Z. Network security situation awareness based on semantic ontology and user-defined rules for Internet of Things. IEEE Access 2017, 5, 21046–21056. [Google Scholar] [CrossRef]
- Zhang, J.; Feng, H.; Liu, B.; Zhao, D. Survey of technology in network security situation awareness. Sensors 2023, 23, 2608. [Google Scholar] [CrossRef] [PubMed]
- Du, L.; Gu, Z.; Wang, Y.; Gao, C. Open World Intrusion Detection: An Open Set Recognition Method for Can Bus in Intelligent Connected Vehicles. IEEE Netw. 2024, 38, 76–82. [Google Scholar] [CrossRef]
- Anthi, E.; Williams, L.; Słowińska, M.; Theodorakopoulos, G.; Burnap, P. A supervised intrusion detection system for smart home IoT devices. IEEE Internet Things J. 2019, 6, 9042–9053. [Google Scholar] [CrossRef]
- Gilad, Y.; Cohen, A.; Herzberg, A.; Schapira, M.; Shulman, H. Are we there yet? On RPKI’s deployment and security. In Proceedings of the 24th Annual Network and Distributed System Security Symposium (NDSS 2017), San Diego, CA, USA, 26 February–1 March 2017. [Google Scholar]
- Cohen, A.; Gilad, Y.; Herzberg, A.; Schapira, M. Jumpstarting BGP security with path-end validation. In Proceedings of the 2016 ACM SIGCOMM Conference, Florianópolis, Brazil, 22–26 August 2016; pp. 342–355. [Google Scholar]
- Chung, T.; Aben, E.; Bruijnzeels, T.; Chandrasekaran, B.; Choffnes, D.; Levin, D.; Maggs, B.M.; Mislove, A.; Rijswijk-Deij, R.v.; Rula, J. RPKI is coming of age: A longitudinal study of RPKI deployment and invalid route origins. In Proceedings of the Internet Measurement Conference, Amsterdam, the Netherlands, 21–23 October 2019; pp. 406–419. [Google Scholar]
- Hlavacek, T.; Jeitner, P.; Mirdita, D.; Shulman, H.; Waidner, M. Behind the scenes of RPKI. In Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, Los Angeles, CA, USA, 7–11 November 2022; pp. 1413–1426. [Google Scholar]
- Jia, Y.; Gu, Z.; Du, L.; Long, Y.; Wang, Y.; Li, J.; Zhang, Y. Artificial intelligence enabled cyber security defense for smart cities: A novel attack detection framework based on the MDATA model. Knowl. Based Syst. 2023, 276, 110781. [Google Scholar] [CrossRef]
- Goldberg, S.; Schapira, M.; Hummon, P.; Rexford, J. How secure are secure interdomain routing protocols. ACM SIGCOMM Comput. Commun. Rev. 2010, 40, 87–98. [Google Scholar] [CrossRef]
- Testart, C.; Richter, P.; King, A.; Dainotti, A.; Clark, D. Profiling BGP serial hijackers: Capturing persistent misbehavior in the global routing table. In Proceedings of the Internet Measurement Conference, Amsterdam, the Netherlands, 21–23 October 2019; pp. 420–434. [Google Scholar]
- Bakkali, S.; Benaboud, H.; Mamoun, M.B. Security problems in BGP: An overview. In Proceedings of the 2013 National Security Days (JNS3), Rabat, Morocco, 26–27 April 2013; pp. 1–5. [Google Scholar]
- Mitseva, A.; Panchenko, A.; Engel, T. The state of affairs in BGP security: A survey of attacks and defenses. Comput. Commun. 2018, 124, 45–60. [Google Scholar] [CrossRef]
- Vervier, P.-A.; Thonnard, O.; Dacier, M. Mind Your Blocks: On the Stealthiness of Malicious BGP Hijacks. In Proceedings of the NDSS, San Diego, CA, USA, 8–11 February 2015. [Google Scholar]
- Hu, X.; Mao, Z.M. Accurate real-time identification of IP prefix hijacking. In Proceedings of the 2007 IEEE Symposium on Security and Privacy (SP’07), Berkeley, CA, USA, 20–23 May 2007; pp. 3–17. [Google Scholar]
- Spadaccino, P.; Bruzzese, S.; Cuomo, F.; Luciani, F. Analysis and emulation of BGP hijacking events. In Proceedings of the NOMS 2023-2023 IEEE/IFIP Network Operations and Management Symposium, Miami, FL, USA, 8–12 May 2023; pp. 1–4. [Google Scholar]
- Lychev, R.; Goldberg, S.; Schapira, M. BGP security in partial deployment: Is the juice worth the squeeze? In Proceedings of the ACM SIGCOMM 2013 Conference on SIGCOMM, Hong Kong, China, 12–16 August 2013; pp. 171–182. [Google Scholar]
- Rashevskiy, R.B.; Shaburov, A.S. «BGP-hijacking» attacks: Theoretical basis and practical scenarios. In Proceedings of the 2017 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus), St. Petersburg, Russia, 1–3 February 2017; pp. 208–212. [Google Scholar]
- Abaid, A.; Hraib, M.; Ghazzi, A.B.; Sati, S. Convergence Time Analysis of Border Gateway Protocol Using GNS3. In Proceedings of the 2021 IEEE 1st International Maghreb Meeting of the Conference on Sciences and Techniques of Automatic Control and Computer Engineering MI-STA, Tripoli, Libya, 25–27 May 2021; pp. 689–694. [Google Scholar]
- GNS3. Graphical Network Simulator-3. Available online: https://www.gns3.com/ (accessed on 15 July 2024).
- Alharbi, B.; Olson, K.; Keller, E. Enabling Security Research Through Efficient Partial Deployment Topology Configuration and Validation. In Proceedings of the IEEE INFOCOM 2023-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Hoboken, NJ, USA, 17–20 May 2023; pp. 1–6. [Google Scholar]
- Dimitropoulos, X.A.; Riley, G.F. Efficient large-scale BGP simulations. Comput. Netw. 2006, 50, 2013–2027. [Google Scholar] [CrossRef]
- Lopes, N.P.; Rybalchenko, A. Fast BGP simulation of large datacenters. In Proceedings of the Verification, Model Checking, and Abstract Interpretation: 20th International Conference, VMCAI 2019, Cascais, Portugal, 13–15 January 2019; pp. 386–408. [Google Scholar]
- Brandt, M.; Shulman, H. Optimized BGP simulator for evaluation of internet hijacks. In Proceedings of the IEEE INFOCOM 2021-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Virtual, 10–13 May 2021; pp. 1–2. [Google Scholar]
- KathBGPBuilder. A Container-Based Network Emulation System. Available online: https://github.com/bruzzese95/KathBGPBuilder (accessed on 7 July 2024).
- FRRouting. An Internet Routing Protocol Suite. Available online: https://frrouting.org/ (accessed on 15 July 2024).
- Frey, S.; Elkhatib, Y.; Rashid, A.; Follis, K.; Vidler, J.; Race, N.; Edwards, C. It bends but would it break? In topological analysis of BGP infrastructures in europe. In Proceedings of the 2016 IEEE European Symposium on Security and Privacy (EuroS&P), Saarbrucken, Germany, 21–24 March 2016; pp. 423–438. [Google Scholar]
- CAIDA. ASRank CAIDA’s Ranking of Autonomous Systems. Available online: https://asrank.caida.org/ (accessed on 15 July 2024).
- CAIDA. The CAIDA AS Relationships (Serial-1) Dataset. Available online: https://catalog.caida.org/dataset/as_relationships_serial_1 (accessed on 15 July 2024).
- NS3. NS3 Direct Code Execution. Available online: https://www.nsnam.org/about/projects/direct-code-execution/ (accessed on 15 July 2024).








| Configuration Information | Attributes | Description |
|---|---|---|
| Network configuration information | Name | Network’s name |
| Driver | Network type | |
| Subnet | Specific subnet (1.0.0.0/8) | |
| Routing configuration information | Image | Image type |
| Name | Virtual routing node name | |
| ASN | AS number of virtual router | |
| IP Address | IP address of virtual router | |
| Neighbors | Neighbors of virtual router | |
| Networks | BGP announcement | |
| ROV | Whether to execute ROV | |
| RP/CA configuration information | Image | Image Type |
| Name | Virtual node name | |
| AS Num | Affiliated AS network | |
| IP Address | Virtual node IP address | |
| Gateway | Gateway IP address |
| Virtual Node | Title 2 | Title 3 | ||
|---|---|---|---|---|
| Prefix Hijacking | Subprefix Hijacking | Prefix Hijacking | Subprefix Hijacking | |
| AS 1 | Connected | Connected | Connected | Connected |
| AS 2 | Hijacked | Hijacked | Hijacked | Hijacked |
| AS 3 | Connected | Hijacked | Connected | Hijacked |
| AS 4 | Hijacked | Hijacked | Hijacked | Hijacked |
| AS 5 | Hijacked | Hijacked | Hijacked | Hijacked |
| AS 7 | Connected | Connected | Hijacked | Hijacked |
| Simulation Method | Single Physical Server Simulation Scale | Support Complete Deployment of RPKI | Deployment Speed | Deployment Difficulty |
|---|---|---|---|---|
| This article | Approximately 350 nodes | Yes | Fast | Medium |
| GNS3 [24] | Approximately 25 nodes | No | Slow | Hard |
| NS3 [34] | Approximately 1000 nodes | No | Fast | Hard |
| SEED [25] | Approximately 70 nodes | No | Fast | Medium |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Yu, B.; Liu, X.; Wang, X. RPKI Defense Capability Simulation Method Based on Container Virtualization. Appl. Sci. 2024, 14, 8408. https://doi.org/10.3390/app14188408
Yu B, Liu X, Wang X. RPKI Defense Capability Simulation Method Based on Container Virtualization. Applied Sciences. 2024; 14(18):8408. https://doi.org/10.3390/app14188408
Chicago/Turabian StyleYu, Bo, Xingyuan Liu, and Xiaofeng Wang. 2024. "RPKI Defense Capability Simulation Method Based on Container Virtualization" Applied Sciences 14, no. 18: 8408. https://doi.org/10.3390/app14188408
APA StyleYu, B., Liu, X., & Wang, X. (2024). RPKI Defense Capability Simulation Method Based on Container Virtualization. Applied Sciences, 14(18), 8408. https://doi.org/10.3390/app14188408
