Feedback Based Routing By Dapeng Zhu, Mark Gritter, and David R. Cheriton.

Slides:



Advertisements
Similar presentations
Network Layer – Routing 2 Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF.
Advertisements

© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—8-1 MPLS TE Overview Introducing the TE Concept.
1 Greedy Forwarding in Dynamic Scale-Free Networks Embedded in Hyperbolic Metric Spaces Dmitri Krioukov CAIDA/UCSD Joint work with F. Papadopoulos, M.
Lecture 9 Page 1 CS 236 Online Denial of Service Attacks that prevent legitimate users from doing their work By flooding the network Or corrupting routing.
Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross- Layer Information Awareness Xin Yu Department Of Computer Science New York University,
Consensus Routing: The Internet as a Distributed System John P. John, Ethan Katz-Bassett, Arvind Krishnamurthy, and Thomas Anderson Presented.
Dynamic Routing Scalable Infrastructure Workshop, AfNOG2008.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—6-1 Scaling Service Provider Networks Introducing Route Reflectors.
Denial-of-Service Resilience in Peer-to-Peer Systems D. Dumitriu, E. Knightly, A. Kuzmanovic, I. Stoica and W. Zwaenepoel Presenter: Yan Gao.
XCP: Congestion Control for High Bandwidth-Delay Product Network Dina Katabi, Mark Handley and Charlie Rohrs Presented by Ao-Jan Su.
15-441: Computer Networking Lecture 26: Networking Future.
1 Tutorial 5 Safe “Peering Backup” Routing With BGP Based on:
An Effective Placement of Detection Systems for Distributed Attack Detection in Large Scale Networks Telecommunication and Security LAB. Dept. of Industrial.
Measurement in the Internet. Outline Internet topology Bandwidth estimation Tomography Workload characterization Routing dynamics.
Detecting SYN-Flooding Attacks Aaron Beach CS 395 Network Secu rity Spring 2004.
RD-CSY /09 Distance Vector Routing Protocols.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 Exterior Gateway Protocols: EGP, BGP-4, CIDR Shivkumar Kalyanaraman Rensselaer Polytechnic Institute.
Wireless Sensor Network for Tracking the Traffic in INTERNET Network Routers Part 2 Supervisor:Mark Shifrin Students:Yuri Kipnis Nir Bar-Or Date:30 September.
Tesseract A 4D Network Control Plane
EECC694 - Shaaban #1 lec #7 Spring The OSI Reference Model Network Layer.
ROUTING PROTOCOLS Rizwan Rehman. Static routing  each router manually configured with a list of destinations and the next hop to reach those destinations.
CSE679: Multicast and Multimedia r Basics r Addressing r Routing r Hierarchical multicast r QoS multicast.
Information-Centric Networks07b-1 Week 7 / Paper 2 NIRA: A New Inter-Domain Routing Architecture –Xiaowei Yang, David Clark, Arthur W. Berger –IEEE/ACM.
EQ-BGP: an efficient inter- domain QoS routing protocol Andrzej Bęben Institute of Telecommunications Warsaw University of Technology,
1 Reading Report 4 Yin Chen 26 Feb 2004 Reference: Peer-to-Peer Architecture Case Study: Gnutella Network, Matei Ruoeanu, In Int. Conf. on Peer-to-Peer.
Routing and Routing Protocols Dynamic Routing Overview.
1 Meeyoung Cha, Sue Moon, Chong-Dae Park Aman Shaikh Placing Relay Nodes for Intra-Domain Path Diversity To appear in IEEE INFOCOM 2006.
Introduction to BGP.
9/15/2015CS622 - MIRO Presentation1 Wen Xu and Jennifer Rexford Department of Computer Science Princeton University Chuck Short CS622 Dr. C. Edward Chow.
M.Menelaou CCNA2 ROUTING. M.Menelaou ROUTING Routing is the process that a router uses to forward packets toward the destination network. A router makes.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 2 Module 6 Routing and Routing Protocols.
1 Routing. 2 Routing is the act of deciding how each individual datagram finds its way through the multiple different paths to its destination. Routing.
Jennifer Rexford Fall 2014 (TTh 3:00-4:20 in CS 105) COS 561: Advanced Computer Networks BGP.
Chapter 22 Network Layer: Delivery, Forwarding, and Routing Part 5 Multicasting protocol.
A Routing Underlay for Overlay Networks Akihiro Nakao Larry Peterson Andy Bavier SIGCOMM’03 Reviewer: Jing lu.
David Wetherall Professor of Computer Science & Engineering Introduction to Computer Networks Hierarchical Routing (§5.2.6)
Introduction to OSPF Nishal Goburdhan. Routing and Forwarding Routing is not the same as Forwarding Routing is the building of maps Each routing protocol.
Othman Othman M.M., Koji Okamura Kyushu University 1.
A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University.
Network Security1 Secure Routing Source: Ch. 4 of Malik. Network Security Principles and Practices (CCIE Professional Development). Pearson Education.
TCOM 509 – Internet Protocols (TCP/IP) Lecture 06_a Routing Protocols: RIP, OSPF, BGP Instructor: Dr. Li-Chuan Chen Date: 10/06/2003 Based in part upon.
How to Construct a Correct and Scalable iBGP Configuration Mythili Vutukuru Joint work with Paul Valiant, Swastik Kopparty and Hari Balakrishnan.
Packet-Marking Scheme for DDoS Attack Prevention
Internet Protocols. ICMP ICMP – Internet Control Message Protocol Each ICMP message is encapsulated in an IP packet – Treated like any other datagram,
Teknik Routing Pertemuan 10 Matakuliah: H0524/Jaringan Komputer Tahun: 2009.
Transport Layer3-1 Network Layer Every man dies. Not every man really lives.
An Analysis of Using Reflectors for Distributed Denial-of- Service Attacks Paper by Vern Paxson.
Spring 2000CS 4611 Routing Outline Algorithms Scalability.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—2-1 BGP Transit Autonomous Systems Forwarding Packets in a Transit AS.
Spring Routing: Part I Section 4.2 Outline Algorithms Scalability.
Inter-domain Routing Outline Border Gateway Protocol.
Internet Traffic Engineering Motivation: –The Fish problem, congested links. –Two properties of IP routing Destination based Local optimization TE: optimizing.
Placing Relay Nodes for Intra-Domain Path Diversity Meeyoung Cha Sue Moon Chong-Dae Park Aman Shaikh Proc. of IEEE INFOCOM 2006 Speaker 游鎮鴻.
CS 6401 Intra-domain Routing Outline Introduction to Routing Distance Vector Algorithm.
Dynamic routing Routing Algorithm (Dijkstra / Bellman-Ford) – idealization All routers are identical Network is flat. Not true in Practice Hierarchical.
Network Layer Routing Networks: Routing.
Advanced Computer Networks
Dynamic routing Routing Algorithm (Dijkstra / Bellman-Ford) – idealization All routers are identical Network is flat. Not true in Practice Hierarchical.
ICMP ICMP – Internet Control Message Protocol
Introduction to Internet Routing
Intra-Domain Routing Jacob Strauss September 14, 2006.
Routing: Distance Vector Algorithm
Dynamic routing Routing Algorithm (Dijkstra / Bellman-Ford) – idealization All routers are identical Network is flat. Not true in Practice Hierarchical.
Improving the Freshness of NDN Forwarding States
Dynamic Routing and OSPF
Scaling Service Provider Networks
Inter-domain Routing Outline Homework #3 solutions
Network Layer Routing Networks: Routing.
COMPUTER NETWORKS CS610 Lecture-16 Hammad Khalid Khan.
Dynamic routing Routing Algorithm (Dijkstra / Bellman-Ford) – idealization All routers are identical Network is flat. Not true in Practice Hierarchical.
Presentation transcript:

Feedback Based Routing By Dapeng Zhu, Mark Gritter, and David R. Cheriton

Outline Problems with BGP Our solution Analysis Applications Related Work

Problems with BGP Vulnerability Scalability Convergence Time

Feedback Based Routing Overview of system Structural Information Propagation Algorithm for Access Routers

Analysis Attack Resistance Terrorist Black Holes Check! Bogus SYN-ACK response Nothing to see here, moving along

Scalability Scales better than BGP for three reasons Route computation/propagation removed from critical path Availability of routing system does not depend on in-time computation of shortest paths Requirements on transit routers are substantially reduced

Scalability (cont) This last point is huge! Routing system for the Internet backbone should not be dependent on the exponential growth at the edge. “Back of the envelope calculation” shows something like a mere 50mb to store an entire routing table with our scheme

Applications Defend against The Terrorists(tm) and DoS attacks Our scheme would allow for people to throttle DoS traffic without having to contact upstream providers Recognition of a pattern in the DoS traffic is the only requirement.

Applications (cont) Virtual Links with Zero Failover Time BGP currently has terrible convergence time after a link failure We propose highly available virtual links with zero failover time

Overview Separate structural and dynamic information Core Role Forward Packets Propagate structural information Edge Role Routing Decisions End to end Probing

Structural Information Propagation Edges associated with timer Renewed with announcement Removed from structure at expiration Three rule sets for packet forwarding Positive Negative Traffic Engineering

Algorithm for Access Routers Determine two disjoint routes Measure RTT TCP ICMP Periodic Renewing of Backup Routes

Related Work Differences between previous “Byzantine robustness” strategies and ours: Transit routers don't know network topology, making transit routers almost independent of network growth Since most network traffic is TCP, we use TCP SYN and SYN ACK packets as a measure of network performance We are concerned about scalability...they clearly were not.

Related Work (cont) Resilient Overlay Network Overlay network that tries to “get around” routing failures. We believe this is not sufficient. These only work when there are isolated routing failures An overlay network could not function during a The Terrorists(tm) Black Hole attack. Think about it.

Related Work (cont) RouteScience, Eye Networks, netVmg They do provide possible performance enhancement (Are these the people spamming me about Ciali$?!) Since they are edge-only, however, they do not shield against widespread network failure

Conclusion Separation of Performance Information and Structural Information Routing in the backbone is reduced purely to Structural Information Access routers maintain more than one route. Helps fight The Terrorists(tm)

The End Questions? Comments? Forfeit from the losing Offense team?