AS Connectedness Based on Multiple Vantage Points and the Resulting Topologies

Similar documents
AS Router Connectedness Based on Multiple Vantage Points and the Resulting Topologies

Achieving scale: Large scale active measurements from PlanetLab

Internet Measurements. Motivation

Virtual Multi-homing: On the Feasibility of Combining Overlay Routing with BGP Routing

Routing Basics ISP/IXP Workshops

Internet measurements: topology discovery and dynamics. Renata Teixeira MUSE Team Inria Paris-Rocquencourt

Routing Basics. Routing Concepts. IPv4. IPv4 address format. A day in a life of a router. What does a router do? IPv4 Routing

Routing Basics ISP/IXP Workshops

Cheleby: Subnet Level Internet Topology

Routing Concepts. IPv4 Routing Forwarding Some definitions Policy options Routing Protocols

Cheleby: Subnet-level Internet Mapper

Dig into MPLS: Transit Tunnel Diversity

Measured Impact of Tracing Straight. Matthew Luckie, David Murrell WAND Network Research Group Department of Computer Science University of Waikato

Lecture 19: Network Layer Routing in the Internet

Internet Topology Research

PoP Level Mapping And Peering Deals

Routing Basics. ISP Workshops. Last updated 10 th December 2015

RealNet: A Topology Generator Based on Real Internet Topology

Primitives for Active Internet Topology Mapping: Toward High-Frequency Characterization

Validity of router responses for IP aliases resolution

Toward Topology Dualism: Improving the Accuracy of AS Annotations for Routers

Inter-domain Routing. Outline. Border Gateway Protocol

CSC 4900 Computer Networks: Routing Protocols

CS4450. Computer Networks: Architecture and Protocols. Lecture 20 Pu+ng ALL the Pieces Together. Spring 2018 Rachit Agarwal

Lecture 4: Intradomain Routing. CS 598: Advanced Internetworking Matthew Caesar February 1, 2011

Internet-Scale IP Alias Resolution Techniques

Introduction to IP Routing. Geoff Huston

1 University of Würzburg. Institute of Computer Science Research Report Series

The Impact of Router Outages on the AS-Level Internet

Why dynamic route? (1)

CS118 Discussion 1A, Week 7. Zengwen Yuan Dodd Hall 78, Friday 10:00 11:50 a.m.

Table of Contents. Cisco Introduction to EIGRP

Flooding Attacks by Exploiting Persistent Forwarding Loops

CS 457 Networking and the Internet. The Global Internet (Then) The Global Internet (And Now) 10/4/16. Fall 2016

Impact of Multi-Access Links on the Internet Topology Modeling

CS 43: Computer Networks Internet Routing. Kevin Webb Swarthmore College November 16, 2017

CS 268: Computer Networking. Next Lecture: Interdomain Routing

Routing Basics. ISP Workshops

Importance of IP Alias Resolution in Sampling Internet Topologies

Network Forensics Prefix Hijacking Theory Prefix Hijacking Forensics Concluding Remarks. Network Forensics:

CS459 Internet Measurements

Introduction. Keith Barker, CCIE #6783. YouTube - Keith6783.

The Interconnection Structure of. The Internet. EECC694 - Shaaban

Small additions by Dr. Enis Karaarslan, Purdue - Aaron Jarvis (Network Engineer)

Mapping PoP-Level Connectivity of Large Content Providers

Revealing the load-balancing behavior of YouTube traffic of interdomain links

Studying Black Holes on the Internet with Hubble

Topic 3 part 2 Traffic analysis; Routing Attacks &Traffic Redirection Fourth Stage

Routing Basics. Campus Network Design & Operations Workshop

CS4450. Computer Networks: Architecture and Protocols. Lecture 15 BGP. Spring 2018 Rachit Agarwal

Last time. Transitioning to IPv6. Routing. Tunneling. Gateways. Graph abstraction. Link-state routing. Distance-vector routing. Dijkstra's Algorithm

CS 43: Computer Networks. 24: Internet Routing November 19, 2018

Comparative Analysis of Internet Topology Data sets

CS 43: Computer Networks Internet Routing. Kevin Webb Swarthmore College November 14, 2013

CS 5114 Network Programming Languages Control Plane. Nate Foster Cornell University Spring 2013

Introduction to OSPF

Internet Routing : Fundamentals of Computer Networks Bill Nace

Tag Switching. Background. Tag-Switching Architecture. Forwarding Component CHAPTER

Evaluating path diversity in the Internet: from an AS-level to a PoP-level granularity

Interdomain Routing Design for MobilityFirst

Unit 3: Dynamic Routing

Computer Science 461 Final Exam May 22, :30-3:30pm

Interplay Between Routing, Forwarding

Evaluation of Prefix Hijacking Impact Based on Hinge-Transmit Property of BGP Routing System

Module 14 Transit. Objective: To investigate methods for providing transit services. Prerequisites: Modules 12 and 13, and the Transit Presentation

Routing State Distance: A Path-based Metric for Network Analysis Gonca Gürsun

Important Lessons From Last Lecture Computer Networking. Outline. Routing Review. Routing hierarchy. Internet structure. External BGP (E-BGP)

CSCE 463/612 Networks and Distributed Processing Spring 2018

Network Policy Enforcement

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 9, NO. 6, DECEMBER On Inferring Autonomous System Relationships in the Internet

Computer Networks II IPv4 routing

R1 R2 R3 R4 R5 AS2 AS3 AS4(IXP) AS5

Hierarchical Routing. Our routing study thus far - idealization all routers identical network flat not true in practice

Inter-Autonomous-System Routing: Border Gateway Protocol

Routing in the Internet

MANET Architecture and address auto-configuration issue

CS 640: Introduction to Computer Networks. Intra-domain routing. Inter-domain Routing: Hierarchy. Aditya Akella

Networking: Network layer

Top-Down Network Design, Ch. 7: Selecting Switching and Routing Protocols. Top-Down Network Design. Selecting Switching and Routing Protocols

Topics for This Week

Chapter 5. RIP Version 1 (RIPv1) CCNA2-1 Chapter 5

An Efficient Algorithm for AS Path Inferring

MPLS VPN--Inter-AS Option AB

COMP211 Chapter 5 Network Layer: The Control Plane

521262S Computer Networks 2 (fall 2007) Laboratory exercise #2: Internetworking

Link State Routing & Inter-Domain Routing

Inter-Autonomous-System Routing: Border Gateway Protocol

Pamplona-traceroute: topology discovery and alias resolution to build router level Internet maps

Interdomain Routing. Networked Systems (H) Lecture 11

BGP. Daniel Zappala. CS 460 Computer Networking Brigham Young University

Computer Networks ICS 651. IP Routing RIP OSPF BGP MPLS Internet Control Message Protocol IP Path MTU Discovery

Lecture 3. The Network Layer (cont d) Network Layer 1-1

Measuring the Adoption of Route Origin Validation and Filtering

Dynamics of Hot-Potato Routing in IP Networks

Overview. Information About Layer 3 Unicast Routing. Send document comments to CHAPTER

5.1 introduction 5.5 The SDN control 5.2 routing protocols plane. Control Message 5.3 intra-as routing in Protocol the Internet

EIGRP Over the Top. Finding Feature Information. Information About EIGRP Over the Top. EIGRP Over the Top Overview

Inferring Autonomous System Relationships in the Internet. Outline

On the Evaluation of AS Relationship Inferences

Planning for Information Network

Transcription:

AS Connectedness Based on Multiple Vantage Points and the Resulting Topologies Steven Fisher University of Nevada, Reno CS 765 Steven Fisher (UNR) CS 765 CS 765 1 / 28

Table of Contents 1 Introduction 2 Methods 3 Issues 4 Related Works DIMES: Let the Internet Measure Itself Characterizing the Internet Hierarchy from Multiple Vantage Points 10 Lessons from 10 Years of Measuring and Modeling the Internet s Autonomous Systems Heuristics for Internet Map Discovery 5 Proposed Project 6 Conclusion Steven Fisher (UNR) CS 765 CS 765 2 / 28

Introduction The internet is the largest man made network in existence, which is always evolving. There are various reasons for wishing to investigate the properties of this network. These could aide in the following: New Deployments Cyber-security Find problems/issues Protocol Design Determine how it has changed Steven Fisher (UNR) CS 765 CS 765 3 / 28

Introduction Definition Vantage Point(VP): A vantage point is a device or node that we are using in order to connect to an ingress of an Autonomous System(AS) Definition Autonomous System(AS): a connected group of one or more IP prefixes run by one or more network operators which has a single and clearly defined routing policy. Each AS has a unique number for identification purposes in inter-domain routing amoung ASes. Steven Fisher (UNR) CS 765 CS 765 4 / 28

Introduction Definition Border Gateway Protocol(BGP): routing protocol used in the internet to exchange reachability information amoung ASes and interconnect them. 1 http://ipsit.bu.edu/sc546/sc441spring2003/bgp/bgpweb.html Steven Fisher (UNR) CS 765 CS 765 5 / 28

Introduction Definition Ingress: An ingress is the device that is at the edge of a network, which is the point to which traffic enters the network. 1 http://www.tcpipguide.com/free/t TCPIPRouteTracingUtilitytraceroutetracerttracerout-2.htm Steven Fisher (UNR) CS 765 CS 765 6 / 28

Methods There are two prominent techniques used today to create Internet maps. The first is active probing and the second is AS Path inference. Steven Fisher (UNR) CS 765 CS 765 7 / 28

Active Probing Active Probing: Works on the data plane of the Internet. It is used to infer Internet topology based on router adjacencies. It uses traceroute-like probing on the IP address space. These probes report back IP forwarding paths to the destination address. This method is likely to find peering links between ISPs. Advantage: paths returned by probes constitute the actual forwarding path that data takes through networks. Disadvantage: redundancy of using edges, could be considered possible DDoS attack, possible issues with the same router having multiple alias and load balancing, which could lead to false topologies. 1 Wikipedia. Network mapping. http://en.wikipedia.org/w/index.php?title=network%20mapping&oldid=802648654, 2017 Steven Fisher (UNR) CS 765 CS 765 8 / 28

AS Path Inference AS Path Inference: works on the control plane and infers autonomous system connectivity based on BGP data. Advantage: paths can be used to infer AS-level connectivity and thus be used to help build AS topology graphs. Disadvantage: paths do not necessarily reflect how data is actually forwarded. A single AS link can in reality be several router links. Also it is harder to infer peerings between ASes, as these peering relationships are only propagated to an ISP s customer networks 1 Wikipedia. Network mapping. http://en.wikipedia.org/w/index.php?title=network%20mapping&oldid=802648654, 2017 Steven Fisher (UNR) CS 765 CS 765 9 / 28

Issues Sampling Bias[1]: Since, there are a limited number of vantage points and a large number of destinations, there could be a bias towards particular vantage points. Load Balancing[1]: Load balancing by ISPs could result in the traceroute returning IP addresses that do not correspond to a real end-to-end path in the network. Probing Overhead[1]: The volume of active probing can cause redundancy. It is important to minimize redundant probing. Steven Fisher (UNR) CS 765 CS 765 10 / 28

Issues Cont. Unresponsive Routers Resolution[1]: Routers that passive to measurement nodes. These routers may appear as a * in traceroute outputs; therefore, we need to identify * s that belong to the same router. IP Alias Resolution[1]: Routers have multiple interfaces, each interface has a unique IP address. A router may appear on multiple path traces with different IP addresses. Subnet Resolution[1]: Routers are connected to each other over sub networks and subnet resolution helps in identifying the underlying subnets Steven Fisher (UNR) CS 765 CS 765 11 / 28

DIMES: Let the Internet Measure Itself[2] Distributed Internet Measurements and Simulations (DIMES) measurements by software agents downloaded by volunteers and installed on their privately owned machines agent operates at a very low rate so as to have minimal impact on the machine performance and on its network connection DIMES focuses on PoP(point of presence) level topology mapping, which is often the best information that an ISP makes available studied the structure and topology of the Internet to obtain map and annotate it with delay, loss and link capacity Steven Fisher (UNR) CS 765 CS 765 12 / 28

Characterizing the Internet Hierarchy from Multiple Vantage Points[3] This paper focused on the topological structure of the Interent in terms of customer-provider and peer-peer realtionships between ASes, as manifested in the BGP routing policies. Focused on the type-of-relationship problem which was as follows: undirected graph G vertex set V edge set E and a set of paths P label E -1,0, or 1 to maximize valid paths in P G represents entire topology where nodes are an AS and each edge represents a relationship between ASes P consists of all paths seen from various vantage points Speculated that type-of-realtionship is NP-complete, did not prove Steven Fisher (UNR) CS 765 CS 765 13 / 28

Characterizing the Internet Hierarchy from Multiple Vantage Points[3] categorized the ASes in three communities: dense core, transit core, and outer core outer core consists of ASes that belong to smaller ISPs and have a small customer based dense core contains the larger ASes present in the internet. This community is defined that if one AS is in the core then its neighbours are also in the core transit core was determined to contain ASes that could peer into the dense core; however, these AS s do not connect to many of the dense core ASes only utilized 10 vantage points, in determining the AS hierarchy. Steven Fisher (UNR) CS 765 CS 765 14 / 28

10 Lessons from 10 Years of Measuring and Modeling the Internet s Autonomous Systems[4] This paper focuses on issues that have arose based on what they learned from a decade of published research on AS-level Internet. The issues that they focused on where: inter-domain topolgoy of the Internet needs a more precise definition abstracting ASes to generic atomic nodes without internal structure is an oversimplification that limits ability to capture features of real-world ASes BGP routing data have practical value for network operators, wasn t meant for inferring or mapping AS-level connectivity. BGP s purpose is to enable ASes to express and realize routing policies without revealing internal features. Steven Fisher (UNR) CS 765 CS 765 15 / 28

10 Lessons from 10 Years of Measuring and Modeling the Internet s Autonomous Systems[4] Traceroute data from ARK, DIMES, or iplane are publicly available, but limited for faithfully inferring or mapping the AS-level connectivity of the Internet. Traceroute was not designed for Internet topology discovery/mapping; it was designed as a diagnostic tool for tracking the route or path of packet s to some host. Significant efforts are required before current models of the Internet s inter-domain topology derived from publicly available data can be used to study the performance of routing protocols and/or perform meaningful studies. Steven Fisher (UNR) CS 765 CS 765 16 / 28

10 Lessons from 10 Years of Measuring and Modeling the Internet s Autonomous Systems[4] Examining the vulnerability of the Internet to various real-world threats or studying the Internet as a critical infrastructure, it is in general inappropriate to equate the Internet with a measures AS topology. Vulnerability aspects require a more holistic approach to Internet connectivity. Results of observational studies of ASes in general are hard to interpret. Steven Fisher (UNR) CS 765 CS 765 17 / 28

10 Lessons from 10 Years of Measuring and Modeling the Internet s Autonomous Systems[4] Studies starting with a definite application and collect best data available for that application have higher success rate than studies that target datasets collected by third-parties Internet experiences high-variability phenomena; need to apply data-analytic methods that have a strong robustness properties to the known deficiencies in observations and account for the presence of extreme values in the data. Steven Fisher (UNR) CS 765 CS 765 18 / 28

Heuristics for Internet Map Discovery[5] In this paper the authors focused on Mercator, which is a program that uses hop-limited probes to infer an Internet map. It utilizes informed random address robing to explore the IP address space when determining router adjacencies. They also employ mechanisms for resolving aliases. Steven Fisher (UNR) CS 765 CS 765 19 / 28

Heuristics for Internet Map Discovery[5] Use a single, arbitrary, location Use only hop-limited probes Mercator instance might discover more that one interface belonging to same router. Steven Fisher (UNR) CS 765 CS 765 20 / 28

Heuristics for Internet Map Discovery[5] Solution: suppose a host S addresses a UDP packet to interface A of a router. Suppose further the packet is addressed to a non-existent port. The corresponding ICMP port unreachable response to this packet will contain, as its source address, the address of the outgoing interface for the unicast route towards S. Simple heuristic for alias resolution: Send alias probe to X. If the source address on the resulting ICMP message is Y, then X and Y are aliases for the same router. Steven Fisher (UNR) CS 765 CS 765 21 / 28

Heuristics for Internet Map Discovery[5] Mercator cannot discover all interface addresses belonging to a router; instead, discovers only those interfaces through which paths fro Mercator hosts enter the router. Use source-routed path probing to help increase number of interfaces discovered. Mercator does not implement heuristics for discovering shared media. To do this, it would have to infer the subnet mask assigned to router interfaces. Mercator is designed to reduce overhead, takes several weeks to discover the map of the Internet. Mercator discovers time-averaged routed topology Steven Fisher (UNR) CS 765 CS 765 22 / 28

Proposed Project My project will consist of the following ideas/concepts: VP Characteristics and Edge detection: how different VP s contribute to edge discovery characteristics of an effective vp AS topologies how they differ and determine the characteristics of the AS topologies Determine if map is power law try to determine completeness of map Steven Fisher (UNR) CS 765 CS 765 23 / 28

Proposed Project Ingress to AS compare AS ingress to other ingress s reachability of the ingress through differing vantage points mulitple AS vs. one AS play a role in the determine the topology of the internet Steven Fisher (UNR) CS 765 CS 765 24 / 28

Conclusion We have discussed different methods that have been utilized with trying to determine the topology of the Internet. Some, have considered the inter-domain structure of the ASes. In going forward we will be trying to possibly build on some of these ideas and in addition find ways to work around some of the problems that have resulted in some of these studies. Steven Fisher (UNR) CS 765 CS 765 25 / 28

Questions? Steven Fisher (UNR) CS 765 CS 765 26 / 28

References I H. Kardes, M. Gunes, and T. Oz, Cheleby: A subnet-level internet topology mapping system. Y. Shavitt and E. Shir, Dimes: Let the internet measure itself, ACM SIGCOMM Computer Communication Review, vol. 35, no. 5, pp. 71 74, 2005. L. Subramanian, S. Agarwal, J. Rexford, and R. H. Katz, Characterizing the internet hierarchy from multiple vantage points. M. Roughan, W. Willinger, O. Maennel, and D. P. R. Bush, 10 lessons from 10 years of measuring and modeling the internet s autonomous systems. Steven Fisher (UNR) CS 765 CS 765 27 / 28

References II R. Govindan and H. Tangmunarunkit, Heuristics for internet map discovery, in INFOCOM 2000. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. IEEE, vol. 3. IEEE, 2000, pp. 1371 1380. Steven Fisher (UNR) CS 765 CS 765 28 / 28