University of Nevada, Reno Resolving Anonymous Routers Hakan KARDES CS 790g Complex Networks.

Slides:



Advertisements
Similar presentations
Network Research at Avaya Labs Research The ExpertNet and Chatter Teams Akshay Adhikari Mark Bearden Lorraine Denby Bengi Karacali Jean Meloche Balaji.
Advertisements

University of Nevada, Reno Router-level Internet Topology Mapping CS790 Presentation Modified from Dr. Gunes slides by Talha OZ.
The Wireless Routing Protocol (WRP) Invented by J.J.Garcia Luna Aceves and S. Murthy Belongs to a general class of algorithms called Path Finding Algorithms.
 Data mining has emerged as a critical tool for knowledge discovery in large data sets. It has been extensively used to analyze business, financial,
1 Asian Institute of Technology May 2009 MULTI-CONSTRAINED OPTIMAL PATH QUALITY OF SERVICE (QoS) ROUTING WITH INACCURATE LINK STATE INFORMATION AIT Master.
Data Communications and Computer Networks Chapter 4 CS 3830 Lecture 22 Omar Meqdadi Department of Computer Science and Software Engineering University.
Internet Topology Mapping
Router-level Internet Topology Mapping By Talha OZ.
1 A survey of Internet Topology Discovery. 2 Outline Motivations Internet topology IP Interface Level Router Level AS Level PoP Level.
Traffic Engineering With Traditional IP Routing Protocols
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 22 Introduction to Computer Networks.
© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets with Internet Applications, 4e By Douglas.
Heuristics for Internet Map Discovery R. Govindan, H. Tangmunarunkit Presented by Zach Schneirov.
Network Measurement Bandwidth Analysis. Why measure bandwidth? Network congestion has increased tremendously. Network congestion has increased tremendously.
Measuring ISP topologies with Rocketfuel Ratul Mahajan Neil Spring David Wetherall University of Washington ACM SIGCOMM 2002.
1CS 6401 Peer-to-Peer Networks Outline Overview Gnutella Structured Overlays BitTorrent.
1 Network Topology Measurement Yang Chen CS 8803.
PALMTREE M. Engin TozalKamil Sarac The University of Texas at Dallas.
INTERNET TOPOLOGY MAPPING INTERNET MAPPING PROBING OVERHEAD MINIMIZATION  Intra- and inter-monitor redundancy reduction IBRAHIM ETHEM COSKUN University.
S305 – Network Infrastructure Chapter 5 Network and Transport Layers.
TRACENET M.Engin TozalKamil Sarac The University of Texas at Dallas.
Introduction to Routing and Routing Protocols By Ashar Anwar.
Measuring ISP Toplogies with Rocketfuel Neil Spring, Ratul Mahajan, and David Wetherall Presented By: David Deschenes March 25, 2003.
1 Pertemuan 20 Teknik Routing Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
Quantifying the Causes of Path Inflation Neil Spring, Ratul Mahajan, and Thomas Anderson Presented by Luv Kohli COMP November 24, 2003.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 2 Module 8 TCP/IP Suite Error and Control Messages.
Objectives: Chapter 5: Network/Internet Layer  How Networks are connected Network/Internet Layer Routed Protocols Routing Protocols Autonomous Systems.
Network and Communications Ju Wang Chapter 5 Routing Algorithm Adopted from Choi’s notes Virginia Commonwealth University.
Network Layer4-1 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside a router r 4.4 IP: Internet.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Chapter 5 Network Layer.
A Routing Underlay for Overlay Networks Akihiro Nakao Larry Peterson Andy Bavier SIGCOMM’03 Reviewer: Jing lu.
S305 – Network Infrastructure Chapter 5 Network and Transport Layers.
Infrastructure adapted from Mark Crovella and Balachander Krishnamurthy.
Inference, monitoring and recovery of large scale networks CSE Department PennState University Institute for Networking and Security Research Faculty:
Using Virtual Links to Discover Network Topology Brett Holbert, Thomas F. La Porta Topology Discovery -Network topology may only be partially known -Want.
1 Week 5 Lecture 2 IP Layer. 2 Network layer functions transport packet from sending to receiving hosts transport packet from sending to receiving hosts.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 6: Static Routing Routing and Switching Essentials.
Chelebi: Subnet-level Internet Mapper Mehmet H. Gunes University of Nevada, Reno.
Engineering Workshops Purposes of Neighbor Solicitation.
University at BuffaloThe State University of New York Lei Shi Department of Computer Science and Engineering State University of New York at Buffalo Frequent.
Lecture 14 Internet Measurements. 2 Web of interconnected networks Grows with no central authority Autonomous Systems optimize local communication efficiency.
Routing and Routing Protocols
1 Computer Communication & Networks Lecture 21 Network Layer: Delivery, Forwarding, Routing Waleed.
Internet Measurements. 2 Web of interconnected networks Grows with no central authority Autonomous Systems optimize local communication efficiency The.
Patterns around Gnutella Network Nodes Sui-Yu Wang.
ICS 156: Networking Lab Magda El Zarki Professor, ICS UC, Irvine.
1 G-REMiT: An Algorithm for Building Energy Efficient Multicast Trees in Wireless Ad Hoc Networks Bin Wang and Sandeep K. S. Gupta Computer Science and.
Lecture 14: Internet Measurement CS 765: Complex Networks.
Internet Protocols. ICMP ICMP – Internet Control Message Protocol Each ICMP message is encapsulated in an IP packet – Treated like any other datagram,
On the Impact of Clustering on Measurement Reduction May 14 th, D. Saucez, B. Donnet, O. Bonaventure Thanks to P. François.
Lecture 17 Internet Measurements. 2 Web of interconnected networks Grows with no central authority Autonomous Systems optimize local communication efficiency.
Transport Layer3-1 Network Layer Every man dies. Not every man really lives.
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
Internet Measurements. 2 Web of interconnected networks Grows with no central authority Autonomous Systems optimize local communication efficiency The.
S305 – Network Infrastructure Chapter 5 Network and Transport Layers.
CS 6401 Intra-domain Routing Outline Introduction to Routing Distance Vector Algorithm.
Construction of Optimal Data Aggregation Trees for Wireless Sensor Networks Deying Li, Jiannong Cao, Ming Liu, and Yuan Zheng Computer Communications and.
Router-level Internet Topology Discovery Mehmet H. Gunes.
Lecture 2: Internet Measurement CS 790g: Complex Networks.
Monitoring Persistently Congested Internet Links
COMPUTER NETWORKS CS610 Lecture-33 Hammad Khalid Khan.
Chapter 5 Network and Transport Layers
RESOLVING IP ALIASES USING DISTRIBUTED SYSTEMS
CS 457 – Lecture 12 Routing Spring 2012.
Measured Impact of Crooked Traceroute
ECE453 – Introduction to Computer Networks
COMPUTER NETWORKS CS610 Lecture-42 Hammad Khalid Khan.
Lecture 26: Internet Topology CS 765: Complex Networks.
EE 122: Intra-domain routing: Distance Vector
Topology Mapping Bo Sheng Sept. 15.
Presentation transcript:

University of Nevada, Reno Resolving Anonymous Routers Hakan KARDES CS 790g Complex Networks

Outline Introduction Anonymous router resolution – Problem – Previous approaches Anonymity types Anonymity resolution via graph-based induction (GBI) Conclusions 2 CS 790g: Complex Networks

Internet Topology Measurement: Internet topology measurement studies Involves topology collection / construction / analysis Current state of the research activities Distributed topology data collection studies/platforms – Skitter, AMP, iPlane, Dimes, DipZoom, … – 20M path traces with over 20M nodes Issues in topology construction 1.Verifying accuracy of path traces 2.IP alias resolution 3.Subnet inference 4.Anonymous router resolution CS 790g: Complex Networks 3

Topology Collection (traceroute) Probe packets are carefully constructed to elicit intended response from a probe destination traceroute probes all nodes on a path towards a given destination – TTL-scoped probes obtain ICMP error messages from routers on the path – ICMP messages includes the IP address of intermediate routers as its source Merging end-to-end path traces yields the network map Internet Topology Discovery 4 S DABC Destination TTL=1 IP A TTL=2 IP B TTL=3 IP C TTL=4 IP D Vantage Point Details

Outline Introduction Anonymous router resolution – Problem – Previous approaches Anonymity types Anonymity resolution via graph-based induction (GBI) Conclusions 5 CS 790g: Complex Networks

Anonymous routers do not respond to traceroute probes and appear as  in traceroute output – Same router may appear as  in multiple traces. Internet Topology Discovery 6 y: S – L – H – x x: H – L – S – y y: S –  – H – x x: H –  – S – y S L H y x S L H y x y S 11 22 H x Current daily raw topology data sets include ~ 20 million path traces with ~ 20 million occurrences of  s along with ~ 500K public IP addresses The raw topology data is far from representing the underlying sampled network topology Problem

7 Internet2 backbone Traces x - H - L - S - y x - H - A - W - N - z y - S - L - H - x y - S - U - K - C - N - z z - N - C - K- H - x z - N - C - K - U - S - y S L U K C H A W N y x z CS 790g: Complex Networks Problem

Internet2 backbone S L U K C H A W N y x z Traces x -  - L - S - y x -  - A - W -  - z y - S - L -  - x y - S - U -  - C -  - z z -  - C -  -  - x z -  - C -  - U - S - y CS 790g: Complex Networks 6 Problem

Internet Topology Discovery 9 UKCN LHAW S d e f Sampled network d e f S U L C A W Resulting network Traces d -  - L - S - e d -  - A - W -  - f e - S - L -  - d e - S - U -  - C -  - f f -  - C -  -  - d f -  - C -  - U - S - e Problem

Basic heuristics – IP: Combine anonymous nodes between same known nodes [Bilir 05] Limited resolution – NM: Combine all anonymous neighbors of a known node [Jin 06] High false positives More theoretic approaches – Graph minimization approach [Yao 03] Combine  s as long as they do not violate two accuracy conditions: (1) Trace preservation condition and (2) distance preservation condition High complexity O(n 5 ) – n is number of  s – ISOMAP based dimensionality reduction approach [Jin 06] Build an n x n distance matrix then use ISOMAP to reduce it to a n x 5 matrix Distance: (1) hop count or (2) link delay High complexity O(n 3 ) – n is number of nodes 10 UK C N L HA W S x y z Sampled network x y z S U L C A W After resolution x y z S U L C A W H x y z S U L C A W Resulting network CS 790g: Complex Networks Previous Approaches

Outline Introduction Anonymous router resolution – Problem – Previous approaches Anonymity types Anonymity resolution via graph-based induction (GBI) Conclusions 11 CS 790g: Complex Networks

Anonymity Types Type 1: Do not send any ICMP responses Type 2: Rate limit ICMP responses Type 3: Do not send ICMP responses when congested Type 4: Filtered ICMP responses at border routers Type 5: ICMP responses with private source IP address 12 CS 790g: Complex Networks

Graph Based Induction (GBI) - Our Approach Graph based induction – A graph data mining technique Find frequent substructures in a graph data Commonly used in mining biological and chemical graph data Use of GBI for anonymous router resolution – Observe common graph structures due to anonymous routers – Develop localized algorithms with manageable computational and storage overhead – Trace Preservation Condition Merge anonymous nodes as long as they cause no loops in path traces 13 CS 790g: Complex Networks

Common Structures 14 A x C y2 A x C Parallel  -substring y1 y3 y1 y3     DA wx C y E z DA wx C y E z Star     A C x y D w F v E z A C x y D w F v E z Complete Bipartite        A C x y D w E z A C x y D w E z Clique        CS 790g: Complex Networks

Parallel  -substring Algorithm For each  -substrings (a,  i,c), represent it as a tuple (a||c,  i ) – a||c is the tuple identifier and a<c Read path traces and build the sorted list L of two tuples Subsequently read tuples are compared to the ones in the list based on tuple identifiers and duplicates are excluded from L Handling anonymity due to ICMP rate limiting or congestion A second scan of path traces looking for substrings of the form (a,b,c) corresponding to (a,  i,c) in L 15 a c b a c b     CS 790g: Complex Networks

Clique Generate a new graph G* = (V*,E*) – For each  -substring of type (a,  e, b), V* ← V* U {a, b} E* ← E* U {e(a,b)} First identify 4-cliques and grow them by adding nodes that are connected to at least 4 nodes of the structure – Helps in tolerating few missing links in large cliques Then, process all 3-cliques 16 a c d e a c d e a c d e        CS 790g: Complex Networks

Complete Bipartite First search for a small size, i.e., K 2,3, complete bipartite structure in G* and then grow it to a larger one – Take each pair of nodes and look whether they are in a K 2,3 – Identifying a K 2,3, look for larger complete bipartite graphs K 2,m and then K n,m that contain the identified K 2,3. Then, process all K 2,2 ’s 17 A C D F E A C D F E In G C D F E In G* In G A        CS 790g: Complex Networks

Star Combine anonymous neighbors of a known node under trace preservation condition – Starting from ones with smallest number of anonymous neighbors 18 DA w C y E z DA w C y E z Note: Operate on G and not on G*     CS 790g: Complex Networks

Outline Introduction Anonymous router resolution – Problem – Previous approaches Anonymity types Anonymity resolution via graph-based induction (GBI) Conclusions CS 790g: Complex Networks 19

Summary Internet Topology Discovery20 DA C E GBI DA C E Underlying   DA C E Collected   DA C E Neighbor Matching  Responsiveness reduced in the last decade NP-hard problem Graph Based Induction Technique Practical approach for anonymous router resolution Identifies common structures Handles all anonymity types Helpful in resolving multiple anonymous routers in a locality Uses subnet info to reduce the false postives

References M. H. Gunes and K. Sarac. Resolving anonymous routers in internet topology measurement studies. In IEEE INFOCOM, Apr S. Bilir, K. Sarac, and T. Korkmaz. Intersection characteristics of end-to-end Internet paths and trees. IEEE International Conference on Network Protocols (ICNP), Boston, MA, USA, November A. Broido and K. Claffy. Internet topology: Connectivity of IP graphs. Proceedings of SPIE ITCom Conference, Denver, CO, USA, August B. Cheswick, H. Burch, and S. Branigan. Mapping and visualizing the Internet. ACM USENIX,San Diego, CA, USA, June B. Yao, R. Viswanathan, F. Chang, and D. Waddington. Topology inference in the presence of anonymous routers. IEEE INFOCOM, San Francisco, CA, USA, March P. Tan, M. Steinbach, and V. Kumar. Introduction to data mining. Addison-Wesley, Reading, MA, USA, X. Jin, W.-P. K. Yiu, S.-H. G. Chan, and Y. Wang. Network topology inference based on end-to-end measurements. IEEE Journal on Selected Areas in Communications special issue on Sampling the Internet, 24(12):2182{2195, Dec D. Cook and L. Holder. Mining graph data. John Wiley & Sons, T. Matsuda, H. Motoda, and T.Washio. Graph-based induction and its applications. Advanced Engineering Informatics, 16(2):135{1434, April Michihiro Kuramochi, George Karypis, "Frequent Subgraph Discovery," Data Mining, IEEE International Conference on, pp. 313, First IEEE International Conference on Data Mining (ICDM'01), Michihiro Kuramochi, George Karypis, "An Efficient Algorithm for Discovering Frequent Subgraphs," IEEE Transactions on Knowledge and Data Engineering, vol. 16, no. 9, pp , September, Inokuchi, A., Washio, T., and Motoda, H Complete Mining of Frequent Patterns from Graphs: Mining Graph Data.Mach. Learn. 50, 3 (Mar.2003), DOI= Inokuchi, A., Washio, T., and Motoda, H A General Framework for Mining Frequent Subgraphs from Labeled Graphs.Fundam. Inf. 66, 1-2 (Nov. 2004),

QUESTIONS