On the impact of route monitor selection

Several route monitoring systems have been set up to help understand the Internet routing system. They operate by gathering real-time BGP updates from different networks. Many studies have relied on such data sources by assuming reasonably good coverage and thus representative visibility into the Internet routing system. However, different deployment strategies of route monitors directly impact the accuracy and generality of conclusions. Our work is the first to critically examine the visibility constraints imposed by the deployment of route monitors on various applications. We study the difference due to diverse deployment schemes on three important classes of applications: (1) discovery of relatively stable Internet properties such as the AS topology and prefix to origin AS mappings, (2) discovery of dynamic routing behavior such as IP prefix hijack attacks and routing instability, and (3) inference of important network properties such as AS relationships and AS-level paths. We study several simple schemes of route monitor selection and provide insights on improving monitor placement.

[1]  Anja Feldmann,et al.  Locating internet routing instabilities , 2004, SIGCOMM 2004.

[2]  Dmitri V. Krioukov,et al.  AS relationships: inference and validation , 2006, CCRV.

[3]  Thomas Erlebach,et al.  Computing the types of the relationships between autonomous systems , 2007, IEEE/ACM Trans. Netw..

[4]  Anja Feldmann,et al.  Building an AS-topology model that captures route diversity , 2006, SIGCOMM.

[5]  Xenofontas A. Dimitropoulos,et al.  Modeling Autonomous-System Relationships , 2006, 20th Workshop on Principles of Advanced and Distributed Simulation (PADS'06).

[6]  Rami Cohen,et al.  The Internet Dark Matter - on the Missing Links in the AS Connectivity Map , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[7]  Michalis Faloutsos,et al.  A Systematic Framework for Unearthing the Missing Links: Measurements and Impact , 2007, NSDI.

[8]  Daniel Massey,et al.  Collecting the internet AS-level topology , 2005, CCRV.

[9]  Zhuoqing Morley Mao,et al.  Accurate Real-time Identification of IP Prefix Hijacking , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[10]  Randy H. Katz,et al.  Characterizing the Internet hierarchy from multiple vantage points , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.

[11]  Yin Zhang,et al.  On AS-level path inference , 2005, SIGMETRICS '05.

[12]  Daniel Massey,et al.  Placing BGP Monitors in the Internet ∗ , 2006 .

[13]  Jennifer Rexford,et al.  Pretty Good BGP: Improving BGP by Cautiously Adopting Routes , 2006, Proceedings of the 2006 IEEE International Conference on Network Protocols.

[14]  Walter Willinger,et al.  Towards capturing representative AS-level Internet topologies , 2002, SIGMETRICS '02.

[15]  Lixia Zhang,et al.  Understanding Resiliency of Internet Topology against Prefix Hijack Attacks , 2007, 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'07).

[16]  Yoichi Shinoda,et al.  Vulnerabilities of Passive Internet Threat Monitors , 2005, USENIX Security Symposium.

[17]  Daniel Massey,et al.  PHAS: A Prefix Hijack Alert System , 2006, USENIX Security Symposium.

[18]  Azer Bestavros,et al.  On the marginal utility of network topology measurements , 2001, IMW '01.

[19]  Lixin Gao On inferring autonomous system relationships in the internet , 2001, TNET.