Stable and Practical AS Relationship Inference with ProbLink

Knowledge of the business relationships between Autonomous Systems (ASes) is essential to understanding the behavior of the Internet routing system. Despite significant progress in the development of sophisticated relationship inference algorithms, the resulting datasets are impractical for many critical real-world applications, cannot offer adequate predictability in the configuration of routing policies, and suffer from inference oscillations. To achieve more practical and stable relationship inferences we first illuminate the root causes of the contradictions between these shortcomings and the near-perfect validation results of AS-Rank, the state-of-the-art relationship inference algorithm. Using a "naive" inference approach as a benchmark, we find that the available validation datasets over-represent AS links with easier inference requirements. We identify which types of links are harder to infer, and we develop appropriate validation subsets to enable more representative evaluation. We then develop a probabilistic algorithm, ProbLink, to overcome the inference barriers for hard links, such as non-valley-free routing, limited visibility, and non-conventional peering practices. To this end, we identify key interconnection features that provide stochastically informative and highly predictive relationship inference signals. Compared to AS-Rank, our approach reduces the error rate for all links by 1.6\times×, and importantly, by up to 6.1 times for different types of hard links. We demonstrate the practical significance of our improvements by evaluating their impact on three applications. Compared to the current state-of-the-art, ProbLink increases the precision and recall of route leak detection by 4.1 times and 3.4 times respectively, reveals 27% more complex relationships, and increases the precision of predicting the impact of selective advertisements by 34%.

[1]  Nick Feamster,et al.  ASwatch: An AS Reputation System to Expose Bulletproof Hosting ASes , 2015, SIGCOMM.

[2]  Dmitri V. Krioukov,et al.  Inferring AS Relationships: Dead End or Lively Beginning? , 2005, WEA.

[3]  J. Friedman Greedy function approximation: A gradient boosting machine. , 2001 .

[4]  Ítalo S. Cunha,et al.  Machiavellian routing: improving internet availability with BGP poisoning , 2011, HotNets-X.

[5]  Walter Willinger,et al.  Internet Topology Research Redux , 2013 .

[6]  Thomas Engel,et al.  The state of affairs in BGP security: A survey of attacks and defenses , 2018, Comput. Commun..

[7]  Paul Laskowski,et al.  Network monitors and contracting systems: competition and innovation , 2006, SIGCOMM 2006.

[8]  Lixin Gao,et al.  On the evaluation of AS relationship inferences [Internet reachability/traffic flow applications] , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..

[9]  Peyman Faratin,et al.  The Growing Complexity of Internet Interconnection , 2008 .

[10]  Irina Rish,et al.  An empirical study of the naive Bayes classifier , 2001 .

[11]  Aemen Lodhi The economics of internet peering interconnections , 2014 .

[12]  Hinrich Schütze,et al.  Introduction to information retrieval , 2008 .

[13]  G. Di Battista,et al.  Computing the types of the relationships between autonomous systems , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[14]  Lixin Gao,et al.  On inferring autonomous system relationships in the Internet , 2000, Globecom '00 - IEEE. Global Telecommunications Conference. Conference Record (Cat. No.00CH37137).

[15]  Olivier Bonaventure,et al.  Interdomain traffic engineering with redistribution communities , 2004, Comput. Commun..

[16]  Nikita Borisov,et al.  Defending Tor from Network Adversaries: A Case Study of Network Path Prediction , 2014, Proc. Priv. Enhancing Technol..

[17]  Vasileios Giotsas,et al.  Valley-free violation in Internet routing — Analysis based on BGP Community data , 2012, 2012 IEEE International Conference on Communications (ICC).

[18]  Jennifer Rexford,et al.  BGP routing policies in ISP networks , 2005, IEEE Network.

[19]  Michael Schapira,et al.  Measuring and Mitigating AS-level Adversaries Against Tor , 2016, NDSS.

[20]  Dario Rossi,et al.  Violation of Interdomain Routing Assumptions , 2014, PAM.

[21]  Sharon Goldberg,et al.  Let the market drive deployment: a strategy for transitioning to BGP security , 2011, SIGCOMM.

[22]  Vaibhav Bajpai,et al.  Inferring persistent interdomain congestion , 2018, SIGCOMM.

[23]  Vasileios Giotsas,et al.  Inferring Complex AS Relationships , 2014, Internet Measurement Conference.

[24]  Florian Schmidt,et al.  Unikernels Everywhere: The Case for Elastic CDNs , 2017, VEE.

[25]  Michalis Faloutsos,et al.  Lord of the links: a framework for discovering missing links in the internet topology , 2009, IEEE/ACM Trans. Netw..

[26]  J. Tiedje,et al.  Naïve Bayesian Classifier for Rapid Assignment of rRNA Sequences into the New Bacterial Taxonomy , 2007, Applied and Environmental Microbiology.

[27]  Lu Ruan,et al.  Computing Customer Cones of Peering Networks , 2016, ANRW '16.

[28]  Anja Feldmann,et al.  Detecting Peering Infrastructure Outages in the Wild , 2017, SIGCOMM.

[29]  Ítalo S. Cunha,et al.  Investigating Interdomain Routing Policies in the Wild , 2015, Internet Measurement Conference.

[30]  Dmitri V. Krioukov,et al.  AS relationships: inference and validation , 2006, CCRV.

[31]  Randy H. Katz,et al.  Characterizing the Internet hierarchy from multiple vantage points , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.

[32]  Amir Herzberg,et al.  Jumpstarting BGP Security with Path-End Validation , 2016, SIGCOMM.

[33]  Olivier Bonaventure,et al.  On BGP communities , 2008, CCRV.

[34]  Olivier Bonaventure,et al.  Interdomain traffic engineering with BGP , 2003, IEEE Commun. Mag..

[35]  Vasileios Giotsas,et al.  Inferring multilateral peering , 2013, CoNEXT.

[36]  Paul N. Bennett Assessing the Calibration of Naive Bayes Posterior Estimates , 2000 .

[37]  Yongqiang Lyu,et al.  Video delivery networks: Challenges, solutions and future directions , 2017, Comput. Electr. Eng..

[38]  Grenville Armitage,et al.  BGP Anomaly Detection Techniques: A Survey , 2017, IEEE Communications Surveys & Tutorials.

[39]  Sebastian Thrun,et al.  Text Classification from Labeled and Unlabeled Documents using EM , 2000, Machine Learning.

[40]  Zongpeng Li,et al.  The Flattening Internet Topology: Natural Evolution, Unsightly Barnacles or Contrived Collapse? , 2008, PAM.

[41]  Anja Feldmann,et al.  Building an AS-topology model that captures route diversity , 2006, SIGCOMM 2006.

[42]  Mark Crovella,et al.  Detecting Unusually-Routed ASes: Methods and Applications , 2016, Internet Measurement Conference.

[43]  Vasileios Giotsas,et al.  AS relationships, customer cones, and validation , 2013, Internet Measurement Conference.

[44]  Harry Zhang,et al.  The Optimality of Naive Bayes , 2004, FLAIRS.