BGP Community Harvesting: Locating Peering Infrastructures
|
|
- Abraham Fox
- 6 years ago
- Views:
Transcription
1 Community Harvesting: Locating Peering Infrastructures Vasileios Giotsas, Christoph Dietzel, Georgios Smaragdakis, Anja Feldmann, Arthur Berger, Emile Aben # TU Berlin CAIDA DE-CIX MIT Akamai # RIPE NCC
2 Symbiotic and interdependent infrastructures 2
3 Remote peering extends the reach of IXPs and CFs beyond their local market 3 Global footprint of AMS-IX
4 4 Our Research Goals 1. Path change detection: Timely, at the finest granularity possible 2. Path/peering localization: Distinguish cascading effects from outage source 3. Path tracking: Determine duration, shifts in routing paths, geographic spread
5 Challenges in detecting infrastructure paths 5 Actual incident
6 Challenges in detecting infrastructure paths 6 Actual incident Observed paths VP Before outage
7 Challenges in detecting infrastructure paths 7 Actual incident Observed paths VP Before outage
8 Challenges in detecting infrastructure paths 8 Actual incident Observed paths VP Before outage During outage
9 Challenges in detecting infrastructure paths 9 1. Capturing the infrastructure-level hops between ASes Actual incident Observed paths VP Before outage During outage AS path does not change!
10 Challenges in detecting infrastructure paths Capturing the infrastructure-level hops between ASes Actual incident Observed paths VP Before outage During outage IXP or Facility 2 failed
11 Challenges in detecting infrastructure paths Capturing the infrastructure-level hops between ASes 2. Correlating the paths from multiple vantage points Actual incident Observed paths VP Before outage During outage IXP or Facility 2 failed VP During outage IXP is still active
12 Challenges in detecting infrastructure paths Capturing the infrastructure-level hops between ASes 2. Correlating the paths from multiple vantage points 3. Continuous monitoring of the routing system Actual incident Observed paths VP Before outage During outage The initial hops changed VP During outage No hop changes
13 Challenges in detecting infrastructure paths Capturing the infrastructure-level hops between ASes 2. Correlating the paths from multiple vantage points 3. Continuous monitoring of the routing system Djibouti Telecom Telkom Indonesia France-IX topology
14 Challenges in detecting infrastructure paths Capturing the infrastructure-level hops between ASes 2. Correlating the paths from multiple vantage points 3. Continuous monitoring of the routing system measurement Djibouti Telecom Telkom Indonesia
15 Challenges in detecting infrastructure paths Capturing the infrastructure-level hops between ASes 2. Correlating the paths from multiple vantage points 3. Continuous monitoring of the routing system Traceroute measurement Telkom Indonesia
16 Challenges in detecting infrastructure paths Capturing the infrastructure-level hops between ASes 2. Correlating the paths from multiple vantage points 3. Continuous monitoring of the routing system Traceroute Traceroute Traceroute Traceroute measurement Djibouti Telecom Telkom Indonesia IP-to-Facility 3,4 and IP-to-IXP 5 mapping possible but expensive! 3 Giotsas, Vasileios, et al. "Mapping peering interconnections to a facility", CoNEXT Motamedi, Reza, et al. On the Geography of X-Connects, Technical Report CIS-TR University of Oregon, Nomikos, George, et al. "traixroute: Detecting IXPs in traceroute paths.". PAM 2016
17 Challenges in detecting infrastructure paths Capturing the infrastructure-level hops between ASes 2. Correlating the paths from multiple vantage points 3. Continuous monitoring of the routing system Traceroute Traceroute Traceroute Can we combine continuous passive measurements with fine-grained topology discover?
18 Challenges in detecting infrastructure paths Capturing the infrastructure-level hops between ASes 2. Correlating the paths from multiple vantage points 3. Continuous monitoring of the routing system Traceroute Traceroute Traceroute
19 Deciphering location metadata in 19 PREFIX: /24 ASPATH: COMMUNITY: 2:200
20 Deciphering location metadata in 20 PREFIX: /24 ASPATH: COMMUNITY: 2:200 Communities: Optional attribute 32-bit numerical values Encodes arbitrary metadata
21 Deciphering location metadata in 21 PREFIX: /24 ASPATH: COMMUNITY: 2:200 Top 16 bits: ASN that sets the community. Bottom 16 bits: Numerical value that encodes the actual meaning.
22 Deciphering location metadata in 22 PREFIX: /24 ASPATH: COMMUNITY: 2:200 The Community 2:200 is used to tag routes received at Facility 2
23 Deciphering location metadata in 23 PREFIX: /24 ASPATH: COMMUNITY: 2:200 PREFIX: /24 ASPATH: 4 3 COMMUNITY: 4:8714 4:400 PREFIX: /24 ASPATH: 4 2 COMMUNITY: 4:8714 4:400
24 Deciphering location metadata in 24 PREFIX: /24 ASPATH: COMMUNITY: 2:200 Multiple communities can tag different types of ingress points. PREFIX: /24 ASPATH: 4 3 COMMUNITY: 4:8714 4:400 PREFIX: /24 ASPATH: 4 2 COMMUNITY: 4:8714 4:400
25 Deciphering location metadata in 25 PREFIX: /24 ASPATH: COMMUNITY: 2:100 When a route changes ingress point, the community values will be update to reflect the change. PREFIX: /24 ASPATH: 4 3 COMMUNITY: 4:400 PREFIX: /24 ASPATH: 4 2 COMMUNITY: 4:8714 4:400
26 26 Interpreting Communities Community values not standardized. Documentation in public data sources: WHOIS, NOCs websites 3,049 communities by 468 ASes
27 27 Topological coverage ~50% of IPv4 and ~30% of IPv6 paths annotated with at least one Community in our dictionary. 24% of the facilities in PeeringDB, 98% of the facilities with at least 20 members.
28 28 Conclusions Timely and accurate infrastructure-level path detection through passive monitoring Useful for multiple use cases: outage detection, blackholing activity, path propagation
29 Thank you! 29
Detecting Peering Infrastructure Outages
Detecting Peering Infrastructure Outages ENOG14, Minsk Vasileios Giotsas, Christoph Dietzel, Georgios Smaragdakis, Anja Feldmann, Arthur Berger, Emile Aben # TU Berlin CAIDA DE-CIX MIT Akamai # RIPE NCC
More informationInferring BGP Blackholing in the Internet
Inferring BGP Blackholing in the Internet Vasileios Giotsas, Georgios Smaragdakis, Christoph Dietzel, Philipp Richter, Anja Feldmann, and Arthur Berger TU Berlin CAIDA MIT DE-CIX Akamai DDoS A&acks are
More informationMAPPING PEERING INTERCONNECTIONS TO A FACILITY
MAPPING PEERING INTERCONNECTIONS TO A FACILITY Vasileios Giotsas 1 Georgios Smaragdakis 2 Bradley Huffaker 1 Matthew Luckie 3 kc claffy 1 vgiotsas@caida.org CoNEXT 2015 1 UCSD/CAIDA 2 MIT/TU Berlin 3 University
More informationMAPPING PEERING INTERCONNECTIONS TO A FACILITY
MAPPING PEERING INTERCONNECTIONS TO A FACILITY Vasileios Giotsas 1 Georgios Smaragdakis 2 Bradley Huffaker 1 Matthew Luckie 3 kc claffy 1 vgiotsas@caida.org WIE 2015 1 UCSD/CAIDA 2 MIT/TU Berlin 3 University
More informationGeorge Nomikos
George Nomikos gnomikos@ics.forth.gr To appear in IMC, Boston, 2018 V. Kotronis, P. Sermpezis, P. Gigis, L. Manassakis, C. Dietzel, S. Konstantaras, X. Dimitropoulos, V. Giotsas *Jane Coffin and Christian
More informationExpress or Local Lanes: On Assessing QoE over Private vs. Public Peering Links
Express or Local Lanes: On Assessing QoE over Private vs. Public Peering Links Walter Willinger, NIKSUN Inc. Anja Feldmann, Philipp Richter, TU Berlin Georgios Smaragdakis, MIT/TU Berlin Fabian Bustamante,
More informationPERISCOPE: Standardizing and Orchestrating Looking Glass Querying
PERISCOPE: Standardizing and Orchestrating Looking Glass Querying Vasileios Giotsas UCSD/CAIDA vgiotsas@caida.org NANOG 68, October 17-19 2016, Dallas, TX Purpose of this Talk Inform the operational community
More informationImplementation of RPKI and IRR filtering on the AMS-IX platform. Stavros Konstantaras NOC Engineer
Implementation of RPKI and IRR filtering on the AMS-IX platform Stavros Konstantaras NOC Engineer RIPE EDUCA 2018 Agenda AMS-IX Route Servers Architecture Features Filtering IRRdb RPKI BGP Communities
More informationThe Remote Peering Jedi A portal in the remote peering ecosystem
The Remote Peering Jedi A portal in the remote peering ecosystem Vasileios Giotsas, UCSD/CAIDA, vgiotsas@caida.org Petros Gigis, ICS-FORTH/UOC, gkigkis@ics. forth. gr Alexandros Milolidakis, ICS-FORTH/UOC,
More informationInferring Multilateral Peering
Inferring Multilateral Peering ABSTRACT Vasileios Giotsas University College London v.giotsas@cs.ucl.ac.uk Matthew Luckie CAIDA / UC San Diego mjl@caida.org The AS topology incompleteness problem is derived
More informationMeasuring and Modeling the Adoption of IPv6
Measuring and Modeling the Adoption of IPv6 Amogh Dhamdhere, Matthew Luckie, Bradley Huffaker, kc claffy (CAIDA/UCSD) Ahmed Elmokashfi (Simula Research) Emile Aben (RIPE NCC) presented at TIP2013, 14 Jan
More informationPeering at Peerings: On the Role of IXP Route Servers
Peering at Peerings: On the Role of IXP Route Servers Contact: Philipp Richter (prichter@inet.tu-berlin.de) Paper: net.t-labs.tu-berlin.de/~prichter/imc238-richtera.pdf Philipp Richter TU Berlin Nikolaos
More informationAnatomy of a Large European IXP
Anatomy of a Large European IXP Nikos Chatzis Nadi Sarrar TU Berlin/T-Labs Anja Feldmann TU Berlin/T-Labs Bernhard Ager ETH Zürich Steve Uhlig Queen Mary University of London Walter Willinger AT&T Labs
More informationShortcuts through Colocation Facilities
Shortcuts through Colocation Facilities Vasileios Kotronis1, George Nomikos1, Lefteris Manassakis1, Dimitris Mavrommatis1 and Xenofontas Dimitropoulos1,2 1 Foundation for Research and Technology - Hellas
More informationRIPE Labs Operator Tools, Ideas, Analysis
RIPE Labs Operator Tools, Ideas, Analysis AMS-IX Meeting, Amsterdam, 16 Nov. 2011 Mirjam Kühne, RIPE NCC A Bit of History RIPE NCC started as the coordination centre for the RIPE community - RIPE Database,
More informationTTM AS-level Traceroutes
TTM AS-level Traceroutes Matching IPs to ASes René Wilhelm New Projects Group RIPE NCC 1 Motivation TTM performs frequent traceroutes to find closest IP route for delay measurements
More informationRevealing the load-balancing behavior of YouTube traffic of interdomain links
Revealing the load-balancing behavior of YouTube traffic of interdomain links Ricky K. P. Mok + Vaibhav Bajpai*, Amogh Dhamdhere +, kc claffy + + CAIDA/ University of California San Diego * Technical University
More informationIXP Country Jedi. Measuring how many local paths stay local.
IXP Country Jedi Measuring how many local paths stay local BECHA@ripe.net Diagnose potential routing optimization 2 IXP-Jedi tool & concept by Emile Aben: - https://github.com/emileaben/ixp-country-jedi
More informationThe forces behind the changing Internet: IXPs and content delivery and SDN
The forces behind the changing Internet: IXPs and content delivery and SDN Steve Uhlig Queen Mary, University of London steve@eecs.qmul.ac.uk http://www.eecs.qmul.ac.uk/~steve/ Credit to collaborators:
More informationMANRS: Mutually Agreed Norms for Routing Security Routing is at Risk Let s secure it together!
15 October 2018 Internet2 Technology Exchange MANRS: Mutually Agreed Norms for Routing Security Routing is at Risk Let s secure it together! Kevin Meynell Manager, Technical & Operational Engagement meynell@isoc.org
More informationSibyl A Practical Internet Route Oracle
Sibyl A Practical Internet Route Oracle Ítalo Cunha1, Pietro Marchetta2, Matt Calder3, Yi-Ching Chiu3 Brandon Schlinker3, Bruno Machado1, Antonio Pescapè2 Vasileios Giotsas4, Harsha Madhyastha5, Ethan
More informationRIPE Atlas Intro & Use Cases
RIPE Atlas Intro & Use Cases Philip Smith SANOG 29 23-30 January 2017 Ever Wonder How To Monitor the performance of your network in real time from thousands of vantage points Troubleshoot problems close
More informationBack-Office Web Traffic on the Internet. IMC 2014 Vancouver, BC, CANADA November 5-7, 2014
Back-Office Web Traffic on the Internet Enric Pujol Philipp Richter Balakrishnan Chandrasekaran Georgios Smaragdakis Anja Feldmann Bruce Maggs Keung- Chi Ng TU- Berlin TU- Berlin Duke University MIT /
More informationVantage Point Selection for IPv6 Measurements
Vantage Point Selection for IPv6 Measurements Benefits and Limitations of RIPE Atlas Tags Vaibhav Bajpai TU Munich Joint work with IM 2017 Conference Lisbon, Portugal Steffie Jacob Eravuchira SamKnows
More informationReport: Applicability of current "constrained facility search" mapping methods to intra-u.s interconnections
Report: Applicability of current "constrained facility search" mapping methods to intra-u.s interconnections Bradley Huffaker, Marina Fomenkov, kc claffy UCSD/CAIDA bradley,marina,kc@caida.org ABSTRACT
More informationRIPE Atlas. Measuring the Internet
RIPE Atlas Measuring the Internet Why What is it useful for? Why RIPE Atlas? (1) Internet Growth Critical Multi- Stakeholder Monitor Troubleshoot Measurements Improve Security Lack of Internet wide measurements
More informationPrimitives for Active Internet Topology Mapping: Toward High-Frequency Characterization
Primitives for Active Internet Topology Mapping: Toward High-Frequency Characterization Robert Beverly, Arthur Berger, Geoffrey Xie Naval Postgraduate School MIT/Akamai February 9, 2011 CAIDA Workshop
More informationEvaluating path diversity in the Internet: from an AS-level to a PoP-level granularity
Evaluating path diversity in the Internet: from an AS-level to a PoP-level granularity Evaluation de la diversité de chemins sur Internet: d une granularité au niveau des AS à une vision au niveau des
More informationA Server-to-Server View of the Internet
A Server-to-Server View of the Internet Balakrishnan Chandrasekaran Duke University balac@cs.duke.edu Georgios Smaragdakis MIT / TU Berlin / Akamai gsmaragd@csail.mit.edu Arthur Berger MIT / Akamai awberger@csail.mit.edu
More informationThe Internet: A Complex System at its Limits
The Inter: A Complex System at its Limits Anja Feldmann TU Berlin About myself: Education Diplom: University Paderborn, Germany Ph.D.: CMU, Pittsburgh, US Work experience Researcher at AT&T, Murray Hill,
More informationBuilding an AS-Topology Model that Captures Route Diversity
Building an AS-Topology Model that Captures Route Diversity Wolfgang Mühlbauer Technische Universität München wolfgang@net.in.tum.de Anja Feldmann Olaf Maennel Matthew Roughan Steve Uhlig Deutsche Telekom
More informationTutorial Slides. ALNOF, Tirana, Albania 31
Tutorial Slides 14/11/17 ALNOF, Tirana, Albania 31 PeeringDB 2.0 Key New Infrastructure Features Complete rewrite in Python Python: fast and clean, widely used and supported HTML5: adaptive design for
More informationA Region-Centric Analysis of the Internet Peering Ecosystem
Computer Science Technical Reports Computer Science 6-216 A Region-Centric Analysis of the Internet Peering Ecosystem Rajesh Putta Venkata Iowa State University, rajeshpv@iastate.edu Lu Ruan Iowa State
More informationThe Impact of Router Outages on the AS-Level Internet
The Impact of Router Outages on the AS-Level Internet Matthew Luckie* - University of Waikato Robert Beverly - Naval Postgraduate School *work started while at CAIDA, UC San Diego SIGCOMM 2017, August
More informationAS Connectedness Based on Multiple Vantage Points and the Resulting Topologies
AS Connectedness Based on Multiple Vantage Points and the Resulting Topologies Steven Fisher University of Nevada, Reno CS 765 Steven Fisher (UNR) CS 765 CS 765 1 / 28 Table of Contents 1 Introduction
More informationStudying Black Holes on the Internet with Hubble
Studying Black Holes on the Internet with Hubble Ethan Katz-Bassett, Harsha V. Madhyastha, John P. John, Arvind Krishnamurthy, David Wetherall, Thomas Anderson University of Washington RIPE, May 2008 This
More informationPEERING. A very brief introduction
PEERING A very brief introduction Types of Peering Private Peering Bi-lateral Peering Multi-lateral Peering Private Peering Dedicated circuit between two peers Can use a cross connect within a data centre;
More informationc anomaly detection using a distributed measurement network
Tra c anomaly detection using a distributed measurement network Razvan Oprea Supervisor: Emile Aben (RIPE NCC) System and Network Engineering February 8, 2012 Outline Introduction Similar projects Research
More informationUpdate from the RIPE NCC
Update from the RIPE NCC INEX Meeting, Dublin, 14 December 2011 Mirjam Kühne, RIPE NCC Outline RIPE Labs - Background, Purpose, Content, Participation IPv6 Activities and Statistics RIPE Atlas RIPEstat
More informationMeasuring the Adoption of Route Origin Validation and Filtering
Measuring the Adoption of Route Origin Validation and Filtering Andreas Reuter (andreas.reuter@fu-berlin.de) Joint work with Randy Bush, Ethan Katz-Bassett, Italo Cunha, Thomas C. Schmidt, and Matthias
More informationRPKI Introduction. APNIC Technical Workshop July 5-6, 2018 in Beijing, China. Hosted By:
RPKI Introduction APNIC Technical Workshop July 5-6, 2018 in Beijing, China. Hosted By: 1 Content Why do we need RPKI What is RPKI How to deploy RPKI Configuration case Misdirection / Hijacking Incidents
More informationInternet measurements: topology discovery and dynamics. Renata Teixeira MUSE Team Inria Paris-Rocquencourt
Internet measurements: topology discovery and dynamics Renata Teixeira MUSE Team Inria Paris-Rocquencourt Why measure the Internet topology? Network operators Assist in network management, fault diagnosis
More informationTechnical Requirements Policy for IX.br - V1.0
- V1.0 An Internet Exchange Point (IXP or IX) is a network solution typically consisting of switches and routers operating at the layer 2 level of the ISO/OSI reference model, which offers a range of services
More informationInterconnecting IXPs: pros and cons
Interconnecting IXPs: pros and cons 2012-04-18 RIPE 64 Arnold Nipper CTO/COO arnold.nipper@de-cix.net Agenda Motivation Definition of an IXP Examples of Interconnections Reseller Programs Summary 17. April
More information32-bit ASNs. Greg Hankins Chris Malayter APRICOT 2009 APRICOT /02/25
32-bit ASNs Greg Hankins ghankins@force10networks.com Chris Malayter cmalayter@switchanddata.com APRICOT 2009 APRICOT 2009 2009/02/25 ASN Terminology Soup What??? 2-octet, 2-byte, 16-bit, ASN16, and OLD
More informationMapping PoP-Level Connectivity of Large Content Providers
Mapping PoP-Level Connectivity of Large Content Providers Amir Farzad Reza Rejaie ABSTRACT Large content providers (CPs) are responsible for a large fraction of injected traffic to the Internet. They maintain
More informationMaster Course Computer Networks IN2097
Chair for Network Architectures and Services Prof. Carle Department of Computer Science TU München Master Course Computer Networks IN2097 Prof. Dr.-Ing. Georg Carle Chair for Network Architectures and
More informationWorld IPv6 Day - What did we learn? RIPE 63
World IPv6 Day - What did we learn? emile.aben@ripe.net RIPE 63 RIPE NCC Measurements - World IPv6 Day IPv6 Eyechart and 6to4 (not in this talk) Active measurements Sources: 49 vantage points (RIPE TTM,
More informationBGP Route Leaks Analysis
BGP Route Leaks Analysis Benjamin Wijchers Faculty of Exact Sciences, department of Computer Science Vrije Universiteit Amsterdam December 3, 2014 Supervisors: Dr. Benno Overeinder (NLnetLabs) Dr. Paola
More informationIllegitimate Source IP Addresses At Internet Exchange Points
Illegitimate Source IP Addresses At Internet Exchange Points @ DENOG8, Darmstadt Franziska Lichtblau, Florian Streibelt, Philipp Richter, Anja Feldmann 23.11.2016 Internet Network Architectures, TU Berlin
More informationScanning the IPv6 Internet: Towards a Comprehensive Hitlist
Chair of Network Architectures and Services TUM Department of Informatics Technical University of Munich (TUM) Scanning the IPv6 Internet: Towards a Comprehensive Hitlist Oliver Gasser, Quirin Scheitle,
More informationInternet Mapping Primitives
CYBER SECURITY DIVISION 2014 R&D SHOWCASE AND TECHNICAL WORKSHOP Internet Mapping Primitives Naval Postgraduate School Robert Beverly December 17, 2014 Team Profile Naval Postgraduate School: US Navy s
More informationHigh-Frequency Active Internet Topology Mapping
High-Frequency Active Internet Topology Mapping Robert Beverly, Geoffrey Xie, Ralucca Gera, Justin Rohrer, Arthur Berger, Guillermo Baltra, Erik Rye, Jamar Wright Naval Postgraduate School Computer Science
More informationSoftware Systems for Surveying Spoofing Susceptibility
Software Systems for Surveying Spoofing Susceptibility Matthew Luckie, Ken Keys, Ryan Koga, Bradley Huffaker, Robert Beverly, kc claffy https://spoofer.caida.org/ NANOG68, October 18th 2016 www.caida.o
More informationVantage Point Selection for IPv6 Measurements
Vantage Point Selection for IPv6 Measurements Benefits and Limitations of RIPE Atlas Tags Vaibhav Bajpai Jacobs University Bremen RIPE 72, Copenhagen Joint work with Steffie Jacob Eravuchira SamKnows Limited,
More informationBGP Routing Table Report
BGP Routing Table Report View of the routing table between 2006-2016 Objective Analyse changes in global routing table between 2006 to 2016 Analysis is along: 1. Top 5 well connected ASNs 2. Growth of
More informationInternet exchange Federation Project Funding Proposal
Internet exchange Federation Project Funding Proposal The Internet exchange Point Database (IXPDB) Executive Summary Internet Exchange Points (IXPs) are network facilities that enable the interconnection
More informationReal-time Blackhole Analysis with Hubble
Real-time Blackhole Analysis with Hubble Ethan Katz-Bassett, Harsha V. Madhyastha, John P. John, Arvind Krishnamurthy, Thomas Anderson University of Washington NANOG 40, June 2007 1 Global Reachability
More informationNaMeX Route Server HOWTO
NaMeX Route Server HOWTO June 24, 2010 1 Service overview Route servers (RS) are a value-added service that can be offered by IXPs. Actually, the availability of a RS within an IXP is becoming more and
More informationModelling Inter-Domain Routing
Modelling Inter-Domain Routing Olaf Maennel University of Adelaide Wolfgang MühlbauerM Technical University Munich Anja Feldmann Technical University Munich Steve Uhlig Université catholique de Louvain
More informationIPv6 AS Relationships, Cliques, and Congruence
IPv6 AS Relationships, Cliques, and Congruence Vasileios Giotsas, Matthew Luckie, Bradley Huffaker, kc claffy CAIDA, UC San Diego, USA vgiotsas,mjl,bradley,kc@caida.org Abstract. There is increasing evidence
More informationRIPE Atlas. Christopher Amin 14 November 2017 WTIS-17
RIPE Atlas Christopher Amin 14 November 2017 WTIS-17 Overview What is RIPE Atlas? Growing RIPE Atlas Challenges Example applications Christopher Amin 14 November 2017 WTIS-17 2 What is RIPE Atlas? RIPE
More informationImpactful Routing Research with the PEERING Testbed
1 Impactful Routing Research with the PEERING Testbed Combining intradomain emulation with real BGP connectivity Ethan Katz-Bassett (University of Southern California) with: Brandon Schlinker and Kyriakos
More informationWeb Content Cartography. Georgios Smaragdakis Joint work with Bernhard Ager, Wolfgang Mühlbauer, and Steve Uhlig
Web Content Cartography Georgios Smaragdakis Joint work with Bernhard Ager, Wolfgang Mühlbauer, and Steve Uhlig Cartography Cartography (from Greek Χάρτης, chartes or charax = sheet of papyrus (paper)
More informationRIPE NCC Update. Robert Kisteleki RIPE NCC
RIPE NCC Update Robert Kisteleki RIPE NCC TREX 2017 25 Years of the RIPE NCC Established in April 1992 RIPE NCC has grown to become a diverse organisation with almost 16,000 members The Internet has grown
More informationAnalyzing static, dynamic, and gateway IPv4 addresses. Ramakrishna Padmanabhan, Dave Plonka, Arthur Berger
Analyzing static, dynamic, and gateway IPv4 addresses Ramakrishna Padmanabhan, Dave Plonka, Arthur Berger 1 Analyzing static, dynamic, and gateway IPv4 addresses Ramakrishna Padmanabhan, Dave Plonka, Arthur
More informationInteractive Collector Engine. Luca Sani
Interactive Collector Engine Luca Sani luca.sani@iit.cnr.it BGP route collectors Route collectors (RCs) are devices which collects BGP routing data from co-operating ASes A route collector Maintains a
More informationDissecting the Largest National Ecosystem of Public Internet exchange Points in Brazil
Dissecting the Largest National Ecosystem of Public Internet exchange Points in Brazil Samuel Henrique Bucke Brito, Mateus A. S. Santos, Ramon dos Reis Fontes, Danny A. Lachos Perez, and Christian Esteve
More informationService Provider Multihoming
Service Provider Multihoming ISP Workshops Last updated 18 September 2013 1 Service Provider Multihoming p Previous examples dealt with loadsharing inbound traffic n Of primary concern at Internet edge
More informationThe real-time Internet routing observatory. Luca Sani RIPE Meeting 77 Amsterdam, NL October 15 th, 2018
The real-time Internet routing observatory Luca Sani RIPE Meeting 77 Amsterdam, NL October 15 th, 2018 Isolario project Objective: foster ASes to share their BGP data The more the ASes, the more the completeness
More informationRIPE NCC Measurements And Tools
RIPE NCC Measurements And Tools SwiNOG23 Meeting, 10.11.2011 Vesna Manojlovic BECHA@ripe.net 1 Goal: engaging you in our measurements Interesting & useful tools for network operators: measurements and
More informationAdvanced Multihoming. BGP Traffic Engineering
Advanced Multihoming BGP Traffic Engineering 1 Service Provider Multihoming Previous examples dealt with loadsharing inbound traffic Of primary concern at Internet edge What about outbound traffic? Transit
More informationWorking together to improve routing security for all
Working together to improve routing security for all The MANRS IXP Programme Andrei Robachevsky manrs@isoc.org 1 Mutually Agreed Norms for Routing Security MANRS defines four simple but concrete actions
More informationA Way to Implement BGP with Geographic Information
International Journal of Electronics Engineering, 2 (2), 2010, pp. 349 353 A Way to Implement BGP with Geographic Information Neha Mangla 1 and R.K. Khola 2 1 Department of Computer Science, Suresh Gyanvihar
More informationViolation of interdomain routing assumptions
Violation of interdomain routing assumptions Riad Mazloum 1, Marc-Olivier Buob 1, Jordan Augé 1, Bruno Baynat 1, Dario Rossi 2 and Timur Friedman 1 1 UPMC, Sorbonne Universités, France first.last@lip6.fr
More informationLab Guide 2 - BGP Configuration
IXP Workshop Lab Lab Guide 2 - BGP Configuration Objective: The focus of this lab is to connect 8 customers with IXP. Customers are connected with AS17821 as transit and received customer prefixes, also
More informationModule 16 An Internet Exchange Point
ISP Workshop Lab Module 16 An Internet Exchange Point Objective: To investigate methods for connecting to an Internet Exchange Point. Prerequisites: Modules 12 and 13, and the Exchange Points Presentation
More informationMeasurement: Techniques, Strategies, and Pitfalls. David Andersen CMU
Measurement: Techniques, Strategies, and Pitfalls David Andersen CMU 15-744 Many (most) slides in this lecture from Nick Feamster's measurement lecture Internet Measurement Process of collecting data that
More informationUnderstanding the Share of IPv6 Traffic in a Dual-Stack ISP
Understanding the Share of IPv6 Traffic in a Dual-Stack ISP Enric Pujol, Philipp Richter, and Anja Feldmann PAM 2017, Sydney, Australia IPv6 adoption metrics User end hosts Server-side measurements e.g.,
More informationWorking together to improve routing security for all
Working together to improve routing security for all The MANRS IXP Programme Aftab Siddiqui siddiqui@isoc.org 1 A bit of history 2 EURO-IX 28th Forum: What is in MANRS for an IXP? Is routing security important
More informationthe real-time Internet routing observatory
the real-time Internet routing observatory Luca Sani TOP-IX MEETING, 26 September 2017 1/22 Our research interest: the Internet AS-level ecosystem Why is it important? To identify Internet topological
More informationIPv6 Module 16 An IPv6 Internet Exchange Point
IPv6 Module 16 An IPv6 Internet Exchange Point Objective: To investigate methods for connecting to an Internet Exchange Point. Prerequisites: Modules 12, 14 and 15, and the Exchange Points Presentation
More informationService Provider Multihoming
BGP Traffic Engineering Previous examples dealt with loadsharing inbound traffic Of primary concern at Internet edge What about outbound traffic? Transit ISPs strive to balance traffic flows in both directions
More informationDig into MPLS: Transit Tunnel Diversity
January 2015 Dig into MPLS: Transit Tunnel Diversity Yves VANAUBEL Pascal MÉRINDOL Jean-Jacques PANSIOT Benoit DONNET Summary Motivations MPLS Background Measurement Campaign Label Pattern Recognition
More informationRIPE Atlas. Philip Smith Network Startup Resource Center (NSRC) PacNOG th July 2014, Port Vila, Vanuatu
Philip Smith Network Startup Resource Center (NSRC) PacNOG 15 14 th July 2014, Port Vila, Vanuatu Intro https://atlas.ripe.net 3 Atlas in the Pacific 4 Measurement Devices 5 v1 & v2: Lantronix XPort Pro
More informationService Provider Multihoming
Service Provider Multihoming ISP Workshops These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/) Last
More informationBGP Multihoming Techniques
BGP Multihoming Techniques Philip Smith , Oakland 2001, Cisco Systems, Inc. All rights reserved. 1 Presentation Slides Available on NANOG Web site www.nanog.org/mtg-0110/smith.html Available
More informationPeeringDB APRICOT 2012
PeeringDB APRICOT 2012 Arnold Nipper DE-CIX February 28, 2012 Disclaimer Although I am employed by DE-CIX, this presentation is unrelated to DE-CIX The PeeringDB is not owned, operated, or in any way associated
More informationRouting Security Workshop Internet Routing Registries
Routing Security Workshop Internet Routing Registries Jeff Bartig Senior Interconnection Architect, Internet2 IRR Presentation Overview NANOG 74 Updates IRR Overview IRR Tools Internet2 Participant IRR
More informationAlberto Dainotti
HI-Cube / HI 3 Hub for Internet Incidents Investigation Alberto Dainotti alberto@caida.org Center for Applied Internet Data Analysis University of California, San Diego LARGE-SCALE INCIDENTS a threat to
More informationBGP Communities: A measurement study
BGP Communities: A measurement study @RIPE77, Amsterdam Florian Streibelt 1, Franziska Lichtblau 1, Robert Beverly 2, Cristel Pelsser 3, Georgios Smaragdakis 4, Randy Bush 5, Anja Feldmann 1 Oct. 2018
More informationBGP Route Hijacking - What Can Be Done Today?
BGP Route Hijacking - What Can Be Done Today? Version 1.2 Barry Raveendran Greene Principle Architect Carrier, Enterprise & Security bgreene@akamai.com @Akamai BGP - the Core Protocol that Glues all of
More informationSoftware Systems for Surveying Spoofing Susceptibility
Software Systems for Surveying Spoofing Susceptibility Matthew Luckie, Ken Keys, Ryan Koga, Bradley Huffaker, Robert Beverly, kc claffy https://spoofer.caida.org/ AusNOG 2016, September 2nd 2016 www.caida.o
More informationMeasuring and Characterizing IPv6 Router Availability
Measuring and Characterizing IPv6 Router Availability Robert Beverly, Matthew Luckie, Lorenza Mosley, kc claffy Naval Postgraduate School UCSD/CAIDA March 20, 2015 PAM 2015-16th Passive and Active Measurement
More informationISP 1 AS 1 Prefix P peer ISP 2 AS 2 Route leak (P) propagates Prefix P update Route update P Route leak (P) to upstream 2 AS 3 Customer BGP Update messages Route update A ISP A Prefix A ISP B B leaks
More informationDDoS Defense Mechanisms for IXP Infrastructures
DDoS Defense Mechanisms for IXP Infrastructures Tim Dijkhuizen Lennart van Gijtenbeek Supervisor: Stavros Konstantaras (AMS-IX) SNE: Research Project II 03-07-2018 Introduction Distributed Denial of Service
More informationService Provider Multihoming
Service Provider Multihoming BGP Traffic Engineering 1 Service Provider Multihoming Previous examples dealt with loadsharing inbound traffic Of primary concern at Internet edge What about outbound traffic?
More informationDetecting inconsistencies in INRDB data
Detecting inconsistencies in INRDB data to identify MOAS cases and possible illegitimate Internet resource usage Peter Ruissen System and Network Engineering University of Amsterdam December 11, 2007 1
More informationthe real-time Internet routing observatory Alessandro Improta
the real-time Internet routing observatory Alessandro Improta alessandro.improta@iit.cnr.it Our research focus: the Internet AS-level ecosystem Why is it important? To identify Internet topological properties
More informationKeywords: Internet Economics, Interconnection, Peering, Network Formation, Computational methods, Measurement 1
The Internet consists of thousands of autonomous systems (ASes) that voluntarily form bilateral (sometimes conditional) interconnection agreements to provide end-to-end reachability. These interactions
More information