Advancements in the Inference of AS Relationships Xenofontas Dimitropoulos (Fontas) (CAIDA/GaTech) Dmitri Krioukov Bradley Huffaker k claffy George Riley.

Slides:



Advertisements
Similar presentations
Locating Prefix Hijackers using LOCK Tongqing Qiu +, Lusheng Ji *, Dan Pei * Jia Wang *, Jun (Jim) Xu +, Hitesh Ballani ++ + College of Computing, Georgia.
Advertisements

The need for BGP AfNOG Workshops Philip Smith. “Keeping Local Traffic Local”
Quantitative Analysis of BGP Route Leaks Benjamin Wijchers Benno Overeinder.
Structural Inference of Hierarchies in Networks BY Yu Shuzhi 27, Mar 2014.
Inferring Autonomous System Relationships in the Internet Lixin Gao Dept. of Electrical and Computer Engineering University of Massachusetts, Amherst
Inferring Autonomous System Relationships in the Internet Lixin Gao.
Inferring Autonomous System Relationships in the Internet Lixin Gao Presented by Santhosh R Thampuran.
1 Internet Path Inflation Xenofontas Dimitropoulos.
Something We Always Wanted to Know about ASs: Relationships and Taxonomy Dmitri Krioukov X. Dimitropoulos, M. Fomenkov, B. Huffaker, Y.
Part II: Inter-domain Routing Policies. March 8, What is routing policy? ISP1 ISP4ISP3 Cust1Cust2 ISP2 traffic Connectivity DOES NOT imply reachability!
Progress in inferring business relationships between ASs Dmitri Krioukov 4 th CAIDA-WIDE Workshop.
Topology Generation Suat Mercan. 2 Outline Motivation Topology Characterization Levels of Topology Modeling Techniques Types of Topology Generators.
Computing the relationships between autonomous systems giuseppe di battista maurizio patrignani maurizio pizzonia univ. of rome III
The Cache Location Problem IEEE/ACM Transactions on Networking, Vol. 8, No. 5, October 2000 P. Krishnan, Danny Raz, Member, IEEE, and Yuval Shavitt, Member,
Computing the relationships between autonomous systems giuseppe di battista maurizio patrignani maurizio pizzonia univ. of rome III
University of Nevada, Reno Ten Years in the Evolution of the Internet Ecosystem Paper written by: Amogh Dhamdhere, Constantine Dovrolis School of Computer.
1 Tutorial 5 Safe “Peering Backup” Routing With BGP Based on:
Tutorial 5 Safe Routing With BGP Based on: Internet.
Mini Introduction to BGP Michalis Faloutsos. What Is BGP?  Border Gateway Protocol BGP-4  The de-facto interdomain routing protocol  BGP enables policy.
A View of the AS Hierarchy Provider - customer. A View of the AS Hierarchy No transitivity No SP concatenation Provider - customerData path.
Internet Networking Spring 2004 Tutorial 5 Safe “Peering Backup” Routing With BGP.
Stable Internet Routing Without Global Coordination Jennifer Rexford Princeton University Joint work with Lixin Gao (UMass-Amherst)
Slide -1- February, 2006 Interdomain Routing Gordon Wilfong Distinguished Member of Technical Staff Algorithms Research Department Mathematical and Algorithmic.
On Power-Law Relationships of the Internet Topology CSCI 780, Fall 2005.
Characterizing the Internet Hierarchy from Multiple Vantage Points Jennifer Rexford Internet and Networking Systems AT&T Labs - Research; Florham Park,
Inherently Safe Backup Routing with BGP Lixin Gao (U. Mass Amherst) Timothy Griffin (AT&T Research) Jennifer Rexford (AT&T Research)
Near-Deterministic Inference of AS Relationships Udi Weinsberg A thesis submitted toward the degree of Master of Science in Electrical and Electronic Engineering.
Economic Incentives in Internet Routing Jennifer Rexford Princeton University
Stable Internet Routing Without Global Coordination Jennifer Rexford AT&T Labs--Research
Building a Strong Foundation for a Future Internet Jennifer Rexford Princeton University
University of Massachusetts, Amherst 1 On the Evaluation of AS Relationship Inferences Jianhong Xia and Lixin Gao Department of Electrical and Computer.
Characterizing the Internet Hierarchy from Multiple Vantage Points Jennifer Rexford Internet and Networking Systems AT&T Labs - Research; Florham Park,
UNIVERSITY OF JYVÄSKYLÄ Resource Discovery in Unstructured P2P Networks Distributed Systems Research Seminar on Mikko Vapa, research student.
Stable Internet Routing Without Global Coordination Jennifer Rexford AT&T Labs--Research Joint work with Lixin Gao.
Building a Strong Foundation for a Future Internet Jennifer Rexford ’91 Computer Science Department (and Electrical Engineering and the Center for IT Policy)
CS8803-NS Network Science Fall 2013
Position Statement Debbie Perouli, PhD Student Sonia Fahmy, Associate Professor Computer Science Department Purdue University WODNAFO 10.
Internet Routing: Measurement, Modeling, and Analysis Dr. Jia Wang AT&T Labs Research Florham Park, NJ 07932, USA
Communication Systems Group (CSG) Policy-Compliant Path Diversity and Bisection Bandwidth Rowan Klöti 1, Vasileios Kotronis 1, Bernhard Ager 1, Xenofontas.
On the Construction of Data Aggregation Tree with Minimum Energy Cost in Wireless Sensor Networks: NP-Completeness and Approximation Algorithms National.
Constructing Inter-Domain Packet Filters to Control IP Spoofing Based on BGP Updates Zhenhai Duan, Xin Yuan Department of Computer Science Florida State.
Computing the relationships between autonomous systems giuseppe di battista maurizio patrignani maurizio pizzonia univ. of rome III
Egress Route Selection for Interdomain Traffic Engineering Design considerations beyond BGP.
9/15/2015CS622 - MIRO Presentation1 Wen Xu and Jennifer Rexford Department of Computer Science Princeton University Chuck Short CS622 Dr. C. Edward Chow.
Popularity versus Similarity in Growing Networks Fragiskos Papadopoulos Cyprus University of Technology M. Kitsak, M. Á. Serrano, M. Boguñá, and Dmitri.
Issues with Inferring Internet Topological Attributes Lisa Amini ab, Anees Shaikh a, Henning Schulzrinne b a IBM T.J. Watson Research Center b Columbia.
On AS-Level Path Inference Jia Wang (AT&T Labs Research) Joint work with Z. Morley Mao (University of Michigan, Ann Arbor) Lili Qiu (University of Texas,
Jennifer Rexford Fall 2014 (TTh 3:00-4:20 in CS 105) COS 561: Advanced Computer Networks BGP.
RR-FS Status Report Dmitri Krioukov CAIDA IETF-60.
Aemen Lodhi (Georgia Tech) Amogh Dhamdhere (CAIDA)
An Optimization-Driven Approach for Modeling AS-level Internet Connectivity Presented by: Hyunseok Chang Joint work with Sugih Jamin.
Networks Igor Segota Statistical physics presentation.
CSE534- Fundamentals of Computer Networking Lecture 12-13: Internet Connectivity + IXPs (The Underbelly of the Internet) Based on slides by D. Choffnes.
CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 23 PHILLIPA GILL - STONY BROOK U.
Routing in the Inernet Outcomes: –What are routing protocols used for Intra-ASs Routing in the Internet? –The Working Principle of RIP and OSPF –What is.
Scaling Properties of the Internet Graph Aditya Akella, CMU With Shuchi Chawla, Arvind Kannan and Srinivasan Seshan PODC 2003.
1/18 Evaluating Potential Routing Diversity for Internet Failure Recovery *Chengchen Hu, + Kai Chen, + Yan Chen, *Bin Liu *Tsinghua University, + Northwestern.
Inferring AS Relationships. The Problem  One view  AS relationships  BGP route tables  The other view  BGP route tables  AS relationships  Available.
Inter-domain Routing Outline Border Gateway Protocol.
Internet Traffic Engineering Motivation: –The Fish problem, congested links. –Two properties of IP routing Destination based Local optimization TE: optimizing.
Placing Relay Nodes for Intra-Domain Path Diversity Meeyoung Cha Sue Moon Chong-Dae Park Aman Shaikh Proc. of IEEE INFOCOM 2006 Speaker 游鎮鴻.
1 Internet Routing 11/11/2009. Admin. r Assignment 3 2.
Inferring Autonomous System Relationships in the Internet Lixin Gao Dept. of Electrical and Computer Engineering University of Massachusetts, Amherst.
computing the relationships between autonomous systems
A Study of Group-Tree Matching in Large Scale Group Communications
CS590B/690B Detecting Network Interference
No Direction Home: The True cost of Routing Around Decoys
The Internet: A System of Interconnected Autonomous Systems
Kunxiao Zhou and Xiaohua Jia City University of Hong Kong
Stable and Practical AS Relationship Inference with ProbLink
Presentation transcript:

Advancements in the Inference of AS Relationships Xenofontas Dimitropoulos (Fontas) (CAIDA/GaTech) Dmitri Krioukov Bradley Huffaker k claffy George Riley

2 Outline Background & previous works. Background & previous works. Limitations of existing algorithms. Limitations of existing algorithms. New algorithm to infer customer to provider (c2p) peer to peer (p2p) and sibling to sibling (s2s) relationships. New algorithm to infer customer to provider (c2p) peer to peer (p2p) and sibling to sibling (s2s) relationships.

3 Motivation Evolution of the Internet. Evolution of the Internet. –What are the economics of the Internet and their role in shaping it? Connectivity doesn’t mean reachability. Connectivity doesn’t mean reachability. –AS relationships determine the valid paths along which packets can flow. Finding a provider or peer for ISPs. Finding a provider or peer for ISPs. –Details of peering relationships aren’t widely available. –Want to make a more informed decision based on actual relationships and connectivity instead of “brand name”. Determining AS rank. Determining AS rank. –What is the relative importance of the Internet players? –Useful for determining order for security notifications.

4 Valley-free model AS paths have the following hierarchical structure: AS paths have the following hierarchical structure: 1.zero or more customer-provider (or sibling) links. 2.zero or one peer-peer link. 3.zero or more provider-customer (or sibling) links. GAO: “On Inferring Autonomous Systems relationships in the Internet” L. Gao ACM IEEE Transactions on Networking Customer-provider link Customer-provider links Peer-peer link

5 Previous Works GAO GAO –Based on hierarchical property of AS paths. –Use AS degree to find top of the hill and assign transit relationships to the side-hill links. SARK SARK –Introduce the Type-of-Relationships (ToR) problem: Given an undirected graph G derived from a set of BGP paths P, assign the edge type (customer-provider or peering) to every edge in G such that the total number of valid paths in P is maximized. –Provide a heuristic solution. SARK: “Characterizing the Internet hierarchy from multiple vantage points” L. Subramanian et. al INFOCOM 2002.

6 Previous Works DPP and EHS: DPP and EHS: –No peering can be inferred in ToR. –ToR is NP-complete (by reducing to MAX2SAT). –Mathematically rigorous approximations to ToR. DPP: "Computing the types of the relationships between Autonomous Systems", G. Di Battista et al. IEEE INFOCOM EHS: “Classifying customer-provider relationships in the Internet”, T. Erlebach et al. IASTED CCN 2002.

7 ToR limitations ToR does not provide a deterministic solution, because some links can be directed either way and produce the same number of valid paths. ToR does not provide a deterministic solution, because some links can be directed either way and produce the same number of valid paths. ToR solutions may treat anomalous paths as valid, which results in incorrect AS relationships. ToR solutions may treat anomalous paths as valid, which results in incorrect AS relationships. –BGP misconfigurations and complex polices can violate the valley free model

8 Our customer to provider algorithm Generate Input: Generate Input: 1.Produce AS graph (with no relationships). 2.Assign weight to edges based on node degree. Formulate c2p inference as a multiobjective optimization problem: Formulate c2p inference as a multiobjective optimization problem: –O1: Maximize number of valid paths. –O2: Maximize the sum of weights over all edges. Intuition: Intuition: –Paths are now colored by their edges weights which allows to detect anomalous paths Valid with small weight Invalid with large weight W = 0 W > 0

9 Work in progress Inference of p2p links. Inference of p2p links. Inference of s2s links. Inference of s2s links. Validation of links. Validation of links. Create AS Rank based on AS relationships. Create AS Rank based on AS relationships.

10 Thanks! ? Inferring AS Relationships: Dead End or Lively Beginning? 4th Workshop on Efficient and Experimental Algorithms (WEA),