1 Interdomain Routing and Games Hagay Levin, Michael Schapira and Aviv Zohar The Hebrew University.

Slides:



Advertisements
Similar presentations
1 Incentive-Compatible Interdomain Routing Joan Feigenbaum Yale University Vijay Ramachandran Stevens Institute of Technology Michael Schapira The Hebrew.
Advertisements

COS 461 Fall 1997 Routing COS 461 Fall 1997 Typical Structure.
1 Incentive-Compatible Inter-Domain Routing Joan Feigenbaum Yale University Colloquium at Cornell University; October.
1 Robert Lychev Sharon GoldbergMichael Schapira Georgia Tech Boston University Hebrew University.
Noam Nisan, Michael Schapira, Gregory Valiant, and Aviv Zohar.
Fundamentals of Computer Networks ECE 478/578 Lecture #18: Policy-Based Routing Instructor: Loukas Lazos Dept of Electrical and Computer Engineering University.
Putting BGP on the Right Path: A Case for Next-Hop Routing Michael Schapira Joint work with Yaping Zhu and Jennifer Rexford (Princeton University)
Consensus Routing: The Internet as a Distributed System John P. John, Ethan Katz-Bassett, Arvind Krishnamurthy, and Thomas Anderson Presented.
1 Interdomain Routing Protocols. 2 Autonomous Systems An autonomous system (AS) is a region of the Internet that is administered by a single entity and.
Sogang University ICC Lab Using Game Theory to Analyze Wireless Ad Hoc networks.
SCHOOL OF INFORMATION UNIVERSITY OF MICHIGAN si.umich.edu Searching for Stability in Interdomain Routing Rahul Sami (University of Michigan) Michael Schapira.
Towards a Logic for Wide-Area Internet Routing Nick Feamster and Hari Balakrishnan M.I.T. Computer Science and Artificial Intelligence Laboratory Kunal.
Putting BGP on the Right Path: A Case for Next-Hop Routing Michael Schapira (Yale University and UC Berkeley) Joint work with Yaping Zhu and Jennifer Rexford.
Can Economic Incentives Make the ‘Net Work? Jennifer Rexford Princeton University
Game Theoretic and Economic Perspectives on Interdomain Routing Michael Schapira Yale University and UC Berkeley.
1 Best-Reply Mechanisms Noam Nisan, Michael Schapira and Aviv Zohar.
BGP Safety with Spurious Updates Martin Suchara in collaboration with: Alex Fabrikant and Jennifer Rexford IEEE INFOCOM April 14, 2011.
1 Internet History, Architecture, and Routing ECON 425/563 & CPSC 455/555 9/25/2008 ECON 425/563 & CPSC 455/555 9/25/2008.
1 Tutorial 5 Safe “Peering Backup” Routing With BGP Based on:
Tutorial 5 Safe Routing With BGP Based on: Internet.
Internet Networking Spring 2004 Tutorial 5 Safe “Peering Backup” Routing With BGP.
Interdomain Routing and Games Michael Schapira Joint work with Hagay Levin and Aviv Zohar האוניברסיטה העברית בירושלים The Hebrew University of Jerusalem.
Stable Internet Routing Without Global Coordination Jennifer Rexford Princeton University Joint work with Lixin Gao (UMass-Amherst)
Slide -1- February, 2006 Interdomain Routing Gordon Wilfong Distinguished Member of Technical Staff Algorithms Research Department Mathematical and Algorithmic.
On the Stability of Rational, Heterogeneous Interdomain Route Selection Hao Wang Yale University Joint work with Haiyong Xie, Y. Richard Yang, Avi Silberschatz,
Interdomain Routing as Social Choice Ronny R. Dakdouk, Semih Salihoglu, Hao Wang, Haiyong Xie, Yang Richard Yang Yale University IBC ’ 06.
Interdomain Routing Establish routes between autonomous systems (ASes). Currently done with the Border Gateway Protocol (BGP). AT&T Qwest Comcast Verizon.
Inherently Safe Backup Routing with BGP Lixin Gao (U. Mass Amherst) Timothy Griffin (AT&T Research) Jennifer Rexford (AT&T Research)
When is it Best to Best-Reply? Michael Schapira (Yale University and UC Berkeley) Joint work with Noam Nisan (Hebrew U), Gregory Valiant (UC Berkeley)
The Strategic Justification for BGP Hagay Levin, Michael Schapira, Aviv Zohar.
Economic Incentives in Internet Routing Jennifer Rexford Princeton University
Routing.
Stable Internet Routing Without Global Coordination Jennifer Rexford AT&T Labs--Research
How Bad is Selfish Routing A survey on existing models for selfish routing Professor John Lui, David Yau and Dah-Ming Qiu presented by Joe W.J. Jiang
Stable Internet Routing Without Global Coordination Jennifer Rexford AT&T Labs--Research
1 Autonomous Systems An autonomous system is a region of the Internet that is administered by a single entity. Examples of autonomous regions are: UVA’s.
Stable Internet Routing Without Global Coordination Jennifer Rexford AT&T Labs--Research Joint work with Lixin Gao.
Game Dynamics Out of Sync Michael Schapira (Yale University and UC Berkeley) Joint work with Aaron D. Jaggard and Rebecca N. Wright.
Building a Strong Foundation for a Future Internet Jennifer Rexford ’91 Computer Science Department (and Electrical Engineering and the Center for IT Policy)
ROUTING PROTOCOLS Rizwan Rehman. Static routing  each router manually configured with a list of destinations and the next hop to reach those destinations.
ROUTING ON THE INTERNET COSC Aug-15. Routing Protocols  routers receive and forward packets  make decisions based on knowledge of topology.
Dr. John P. Abraham Professor University of Texas Pan American Internet Routing and Routing Protocols.
Towards a Logic for Wide- Area Internet Routing Nick Feamster Hari Balakrishnan.
Distributed Asynchronous Bellman-Ford Algorithm
Constructing Inter-Domain Packet Filters to Control IP Spoofing Based on BGP Updates Zhenhai Duan, Xin Yuan Department of Computer Science Florida State.
1 Computer Communication & Networks Lecture 22 Network Layer: Delivery, Forwarding, Routing (contd.)
9/15/2015CS622 - MIRO Presentation1 Wen Xu and Jennifer Rexford Department of Computer Science Princeton University Chuck Short CS622 Dr. C. Edward Chow.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking BGP, Flooding, Multicast routing.
How Secure are Secure Inter- Domain Routing Protocols? SIGCOMM 2010 Presenter: kcir.
Transit price negotiation: repeated game approach Sogea 23 Mai 2007 Nancy, France D.Barth, J.Cohen, L.Echabbi and C.Hamlaoui
Jennifer Rexford Fall 2014 (TTh 3:00-4:20 in CS 105) COS 561: Advanced Computer Networks BGP.
Best Reply Mechanisms Justin Thaler and Victor Shnayder.
ACM SIGACT News Distributed Computing Column 9 Abstract This paper covers the distributed systems issues, concentrating on some problems related to distributed.
T. S. Eugene Ngeugeneng at cs.rice.edu Rice University1 COMP/ELEC 429/556 Introduction to Computer Networks Inter-domain routing Some slides used with.
Michael Schapira Yale and UC Berkeley Joint work with P. Brighten Godfrey, Aviv Zohar and Scott Shenker.
Stable Internet Routing Without Global Coordination Jennifer Rexford Princeton University Joint work with Lixin Gao,
1 Robert Lychev Sharon GoldbergMichael Schapira Georgia Tech Boston University Hebrew University.
Teknik Routing Pertemuan 10 Matakuliah: H0524/Jaringan Komputer Tahun: 2009.
Routing Protocols COSC 541 Data Commun. System & Networks Yue Dou.
1 Internet Routing 4/12/2012. Admin. r Exam 2 date: m Wednesday, May 2 at 2:00 p.m. m If you want to take the exam in another day (e.g. due to travel),
1 Internet Routing 11/11/2009. Admin. r Assignment 3 2.
COS 561: Advanced Computer Networks
Hao Wang Yale University Joint work with
Introduction to Internet Routing
Can Economic Incentives Make the ‘Net Work?
COS 561: Advanced Computer Networks
COS 561: Advanced Computer Networks
COS 561: Advanced Computer Networks
COS 461: Computer Networks
Fixing the Internet: Think Locally, Impact Globally
Presentation transcript:

1 Interdomain Routing and Games Hagay Levin, Michael Schapira and Aviv Zohar The Hebrew University

2 On the Agenda Motivation: Are Internet protocols incentive compatible? Interdomain routing & path vector protocols Convergence issues BGP as a game Hardness of approximation of social welfare Incentive compatibility Conclusions

3 Are Current Network Protocols Incentive Compatible? Protocols for the network have been dictated by some designer Okay for cooperative settings But what if nodes try to optimize regardless of harm to others? Example: TCP congestion control –Requires sender to transmit less when the network is congested –This is not optimal for the sender (always better off sending more)

4 Secure Network Protocols A lot of effort is going into re-designing network protocols to be secure. Routing protocols are currently known to be very susceptible to attacks. –Even inadvertent configuration errors of routers have caused global catastrophes. Designers are also concerned about incentive issues in this context. Our work highlights some connections between incentives and security of BGP.

5 Interdomain Routing Messages in the Internet are passed from one router to the other until reaching the destination. Goal of routing protocols: decide how to route packets between nodes on the net. The network is partitioned into Autonomous Systems (ASes) each owned by an economic entity. –Within ASes routing is cooperative –Between ASes inherently non-cooperative Routing preferences are complex and uncoordinated. AT&T Qwest Comcast UUNET My link to UUNET is for backup purposes only. Load-balance my outgoing traffic. Always choose shortest paths. Avoid routes through AT&T if at all possible.

6 Path Vector Protocols receive routes from neighbors choose “best” neighbor send updates to neighbors The only protocol currently used to establish routes between ASes (interdomain routing): The Border Gateway Protocol (BGP). Performed independently for every destination autonomous system in the network. The computation by each node is an infinite sequence of actions:

7 Example of BGP Execution d d d d 1d 3d 41d 23d receive routes from neighbors choose “best” neighbor send updates to neighbors

8 Theorem: In “reasonable economic settings”, BGP is almost incentive- compatible (And can be tweaked to be incentive compatible). Theorem: In these same settings it is also almost collusion proof. –To make it fully collusion proof we need a somewhat stronger assumption. Our Main Results Informally

9 BGP – Not Guaranteed to Converge Other examples may fail to converge for certain timings and succeed for others. 12 d 3 31d 3d … 23d 2d... 12d 1d … 1d 31d 2d 12d

10 Finding Stable States Previously known: It’s NP-Hard to determine if a stable state even exists. [Griffin, Wilfong] We add: Theorem: Determining the existence of a stable state requires exponential communication. In practice, BGP does converge in the Internet! Why?

11 The Gao-Rexford Framework: An economic explanation for network convergence. peer providers customers peer Neighboring pairs of ASes have one of: a customer-provider relationship a peering relationship Restrict the possible graphs and preferences: No customer-provider cycles (cannot be your own customer) Prefer to route through customers over peers, and peers over providers. Only provide transit services to customers. Guarantees convergence of BGP.

12 Dispute Wheels A Dispute Wheel [Griffin et. al.] –A sequence of nodes u i and routes R i, Q i. –u i prefers R i Q i+1 over Q i. If the network has no dispute wheels, BGP will always converge. Also guarantees convergence with node & link failures. Gao-Rexford No Dispute Wheel Robust Convergence Shortest Path

13 Modeling Path Vector Protocols as a Game The interaction is very complex. –Multi-round –Asynchronous –Partial-information Network structure, schedule, other player’s types are all unknown. No monetary transfers! –More realistic –Unlike most works on incentive-compatibility in interdomain routing.

14 Routing as a Game The source-nodes are the strategic agents Agent i has a value v i (R) for any route R The game has an infinite number of rounds Timing decided by an entity called the scheduler –Decides which nodes are activated in each round. –Delays update messages along selective links.

15 Routing as a Game (2) A node that is activated in a certain round can –Read update messages announcing routes. –Send update messages announcing routes. –Choose a neighboring node to forward traffic to. The gain of node i from the game is: –v i (R) if from some point on it has an unchanging route R. –0 otherwise. (can be defined as the maximal gained path in an oscillation as well). a node’s strategy is its choice of a routing protocol. –Executing BGP is a strategy.

16 Approximating Social Welfare Theorem: Getting an approximation to the optimal social welfare is impossible unless P=NP even in Gao-Rexford settings. (Improvement on a bound achieved by [Feigenbaum,Sami,Shenker]) Theorem: It requires exponential communication to approximate social welfare up to

17 Manipulating in The Protocol A node is said to deviate from BGP (or to manipulate BGP) if it does not follow BGP. We want nodes to comply with the alg. Otherwise, suffer a loss when they deviate Which forms of manipulation are available to nodes? –Misreporting preferences. –Reporting inconsistent information. –Announcing nonexistent routes. –Denying routes. –…–…

18 No Optimal Protocols Theorem: Any routing protocol that: 1.Guarantees convergence to a solution for any timing with any preference profile 2.Resists manipulation Must contain a (weak) dictator: A node that always gets its most preferred path. (Simple to prove using a variant of the Gibbard-Satterthwaite theorem)

19 Suppose node 1 is a weak dictator. If it wants some crazy path, it must get it. This feels like an unreasonable protocol d

20 Is BGP Incentive-Compatible? Theorem: BGP is not incentive compatible even in Gao-Rexford settings. m 1 2 d m1d m12d 2md 2d 12d 1d with manipulation m 1 2 d m1d m12d 2md 2d 12d 1d without manipulation

21 We define a property: –Route verification means that an AS can verify that a route is available to a neighboring AS. Route verification is: –Achievable via computational means (cryptographic signatures). –An important part of secure BGP implementation. Can we fix this?

22 Theorem: If the “No Dispute Wheel” condition holds, then BGP with route verification is incentive-compatible in ex- post Nash equilibrium. Theorem: If the “No Dispute Wheel” condition holds, then BGP with route verification is collusion-proof in ex-post Nash equilibrium. Incentive Compatibility

23 Open Questions Characterizing robust BGP convergence (“No dispute wheel” is sufficient but not necessary). Does robust BGP convergence with route verification imply incentive compatibility? Can network formation games help to explain the Internet’s commercial structure? Maintain incentive compatibility if the protocol is changed to deal with attacks and other security issues? How do congestion and load fit in?

24 Conclusions Our results help explain BGP’s resilience to manipulation in practice. –Manipulation requires extensive knowledge on network topology & preferences of ASes. –Faking routes requires manipulation of TCP/IP too. –Manipulations by coalitions require Herculean efforts, and tight coordination. We show that proposed security improvements would benefit incentives in the protocol. Work in progress: other natural asynchronous games. – “Best Reply Mechanisms” with Noam Nisam and Michael Schapira