Fixing the Internet: Think Locally, Impact Globally

Slides:



Advertisements
Similar presentations
Martin Suchara in collaboration with I. Avramopoulos and J. Rexford How Small Groups Can Secure Interdomain Routing.
Advertisements

Network Layer: Internet-Wide Routing & BGP Dina Katabi & Sam Madden.
© J. Liebeherr, All rights reserved 1 Border Gateway Protocol This lecture is largely based on a BGP tutorial by T. Griffin from AT&T Research.
Fundamentals of Computer Networks ECE 478/578 Lecture #18: Policy-Based Routing Instructor: Loukas Lazos Dept of Electrical and Computer Engineering University.
1 Interdomain Routing Protocols. 2 Autonomous Systems An autonomous system (AS) is a region of the Internet that is administered by a single entity and.
Towards a Logic for Wide-Area Internet Routing Nick Feamster and Hari Balakrishnan M.I.T. Computer Science and Artificial Intelligence Laboratory Kunal.
Neighbor-Specific BGP (NS-BGP): More Flexible Routing Policies While Improving Global Stability Yi Wang, Jennifer Rexford Princeton University Michael.
Distributed Route Aggregation on the Global Network (DRAGON) João Luís Sobrinho 1 Laurent Vanbever 2, Franck Le 3, Jennifer Rexford 2 1 Instituto Telecomunicações,
Can Economic Incentives Make the ‘Net Work? Jennifer Rexford Princeton University
Traffic Engineering With Traditional IP Routing Protocols
MIRED: Managing IP Routing is Extremely Difficult Jennifer Rexford Internet and Networking Systems AT&T Labs - Research; Florham Park, NJ
Stable Internet Routing Without Global Coordination Jennifer Rexford Princeton University Joint work with Lixin Gao (UMass-Amherst)
Incrementally Deployable Security for Interdomain Routing (TTA-4, Type-I) Jennifer Rexford, Princeton University Joan Feigenbaum, Yale University July.
Computer Networking Lecture 10: Inter-Domain Routing
Interdomain Routing Establish routes between autonomous systems (ASes). Currently done with the Border Gateway Protocol (BGP). AT&T Qwest Comcast Verizon.
Anycast Jennifer Rexford Advanced Computer Networks Tuesdays/Thursdays 1:30pm-2:50pm.
Inherently Safe Backup Routing with BGP Lixin Gao (U. Mass Amherst) Timothy Griffin (AT&T Research) Jennifer Rexford (AT&T Research)
Interdomain Routing Security Jennifer Rexford Advanced Computer Networks Tuesdays/Thursdays.
Economic Incentives in Internet Routing Jennifer Rexford Princeton University
Stable Internet Routing Without Global Coordination Jennifer Rexford AT&T Labs--Research
Building a Strong Foundation for a Future Internet Jennifer Rexford Princeton University
Wen Xu and Jennifer Rexford Princeton University MIRO : Multi-path Interdomain ROuting.
Stable Internet Routing Without Global Coordination Jennifer Rexford AT&T Labs--Research
Stable Internet Routing Without Global Coordination Jennifer Rexford AT&T Labs--Research Joint work with Lixin Gao.
Building a Strong Foundation for a Future Internet Jennifer Rexford ’91 Computer Science Department (and Electrical Engineering and the Center for IT Policy)
Computer Networks Layering and Routing Dina Katabi
1 Computer Communication & Networks Lecture 22 Network Layer: Delivery, Forwarding, Routing (contd.)
Impact of Prefix Hijacking on Payments of Providers Pradeep Bangera and Sergey Gorinsky Institute IMDEA Networks, Madrid, Spain Developing the Science.
9/15/2015CS622 - MIRO Presentation1 Wen Xu and Jennifer Rexford Department of Computer Science Princeton University Chuck Short CS622 Dr. C. Edward Chow.
1 Controlling IP Spoofing via Inter-Domain Packet Filters Zhenhai Duan Department of Computer Science Florida State University.
1 Interdomain Routing (BGP) By Behzad Akbari Fall 2008 These slides are based on the slides of Ion Stoica (UCB) and Shivkumar (RPI)
Lecture 4: BGP Presentations Lab information H/W update.
Jennifer Rexford Fall 2014 (TTh 3:00-4:20 in CS 105) COS 561: Advanced Computer Networks BGP.
David Wetherall Professor of Computer Science & Engineering Introduction to Computer Networks Hierarchical Routing (§5.2.6)
Finding Vulnerable Network Gadgets in the Internet Topology Author: Nir Amar Supervisor: Dr. Gabi Nakibly Author: Nir Amar Supervisor: Dr. Gabi Nakibly.
Interdomain Routing Security. How Secure are BGP Security Protocols? Some strange assumptions? – Focused on attracting traffic from as many Ases as possible.
A Firewall for Routers: Protecting Against Routing Misbehavior1 June 26, A Firewall for Routers: Protecting Against Routing Misbehavior Jia Wang.
T. S. Eugene Ngeugeneng at cs.rice.edu Rice University1 COMP/ELEC 429/556 Introduction to Computer Networks Inter-domain routing Some slides used with.
Stable Internet Routing Without Global Coordination Jennifer Rexford Princeton University Joint work with Lixin Gao,
CS 4396 Computer Networks Lab BGP. Inter-AS routing in the Internet: (BGP)
Evolving Toward a Self-Managing Network Jennifer Rexford Princeton University
Lowering the Barriers to Innovation Jennifer Rexford Computer Science Department Princeton University
Evolving Toward a Self-Managing Network Jennifer Rexford Princeton University
Routing in the Inernet Outcomes: –What are routing protocols used for Intra-ASs Routing in the Internet? –The Working Principle of RIP and OSPF –What is.
Interdomain Routing Security Jennifer Rexford COS 461: Computer Networks Lectures: MW 10-10:50am in Architecture N101
1 Border Gateway Protocol (BGP) and BGP Security Jeff Gribschaw Sai Thwin ECE 4112 Final Project April 28, 2005.
Michael Schapira, Princeton University Fall 2010 (TTh 1:30-2:50 in COS 302) COS 561: Advanced Computer Networks
1 Internet Routing: BGP Routing Convergence Jennifer Rexford Princeton University
15-849: Hot Topics in Networking Policy and Networks Srinivasan Seshan 1.
Decoy Router Placement Against a Smart Adversary Jacopo Cesareo, Michael Schapira, and Jennifer Rexford Princeton University.
1 CS716 Advanced Computer Networks By Dr. Amir Qayyum.
CS 3700 Networks and Distributed Systems
Border Gateway Protocol
COS 561: Advanced Computer Networks
CSCI-1680 Network Layer: Inter-domain Routing – Policy and Security
COS 561: Advanced Computer Networks
Can Economic Incentives Make the ‘Net Work?
Department of Computer and IT Engineering University of Kurdistan
COS 561: Advanced Computer Networks
Interdomain Routing Security
COS 561: Advanced Computer Networks
COS 561: Advanced Computer Networks
BGP Policies Jennifer Rexford
COS 561: Advanced Computer Networks
COMP/ELEC 429/556 Introduction to Computer Networks
BGP Security Jennifer Rexford Fall 2018 (TTh 1:30-2:50 in Friend 006)
COS 461: Computer Networks
COS 561: Advanced Computer Networks
BGP Instability Jennifer Rexford
Presentation transcript:

Fixing the Internet: Think Locally, Impact Globally Jennifer Rexford Computer Science Department Princeton University

Autonomous Systems (ASes) Path: 6, 5, 4, 3, 2, 1 4 3 5 2 7 6 1 Web server Client Around 35,000 ASes today…

Interdomain Routing ASes exchange information with neighbors Destination: block of Internet Protocol addresses AS path: sequence of ASes along the path Local policies in each AS Path selection: which path to use? Path export: which neighbors to tell? “I can reach d via AS 1” “I can reach d” 1 2 3 data traffic data traffic d

Routing Oscillation 1 2 Prefers 1-2-d over 1-d Prefers 2-3-d over 2-d

Business Relationships Provider Peer Peer Customer Customer pays provider Settlement-free peering

Local Control  Global Stability Internet hierarchy No cycles of provider-customer relationships E.g., my customer’s customer is not my provider No free-riding An AS does not support “transit service” for free Peers and providers can only reach the AS’s customers Prefer profitable paths Prefer paths through customers … over paths through peers and providers Guaranteed to converge to unique, stable solution

Interdomain “Route Hijacking” AS 6 owns and announces d AS 1 wrongly announces d 1 2 3 4 5 6 7 d d

Incremental Deployment Complete solution is hard to deploy Address registry, public key infrastructure, cryptography Little benefit to early adopters Incrementally-deployable solutions Individual ASes detect and avoid suspicious paths Maintain history of who announces each destination Prefer paths consistent with path history Significant security gains Small deployments (e.g., top 40 of the 35,000 ASes) Protects around 95% of the Internet Most big ASes learn at least one valid route Most other ASes pick routes chosen by these providers

How to Build Federated Networks Evolvable Technology (under-specified, programmable) ? Autonomy (autonomous parties, with economic/political objectives) Global Properties (stability, scalability, reliability, security, efficiency, managability, …) Can we have all three? Under what conditions?