ABSTRACT
Models of Internet routing are critical for studies of Internet security, reliability and evolution, which often rely on simulations of the Internet's routing system. Accurate models are difficult to build and suffer from a dearth of ground truth data, as ISPs often treat their connectivity and routing policies as trade secrets. In this environment, researchers rely on a number of simplifying assumptions and models proposed over a decade ago, which are widely criticized for their inability to capture routing policies employed in practice.
In this study we put Internet topologies and models under the microscope to understand where they fail to capture real routing behavior. We measure data plane paths from thousands of vantage points, located in eyeball networks around the globe, and find that between 14-35% of routing decisions are not explained by existing models. We then investigate these cases, and identify root causes such as selective prefix announcement, misclassification of undersea cables, and geographic constraints. Our work highlights the need for models that address such cases, and motivates the need for further investigation of evolving Internet connectivity.
- H. Ballani, P. Francis, and X. Zhang. A study of prefix hijacking and interception in the Internet. In SIGCOMM, 2007. Google ScholarDigital Library
- M. Berman, J. S. Chase, L. Landweber, A. Nakao, M. Ott, D. Raychaudhuri, R. Ricci, and I. Seskar. GENI: A Federated Testbed for Innovative Network Experiments. Computer Networks, 61:5--23, 2014. Google ScholarDigital Library
- R. Bush, O. Maennel, M. Roughan, and S. Uhlig. Internet optometry: Assessing broken glasses in internet reachability. In ACM IMC, 2009. Google ScholarDigital Library
- X. Cai, J. Heidemann, B. Krishnamurthy, and W. Willinger. Towards an AS-to-organization map. In ACM IMC, 2010. Google ScholarDigital Library
- M. Calder, X. F. Z. Hu, E. K.-B. J. Heidemann, and R. Govindan. Mapping the Expansion of Google's Serving Infrastructure. In Proceedings of the ACM Internet Measurement Conference (IMC '13), October 2013. Google ScholarDigital Library
- B. Chandrasekaran, M. Bai, M. Schoenfield, A. Berger, N. Caruso, G. Economou, S. Gilliss, B. Maggs, K. Moses, D. Duff, K. Ng, E. G. Sirer, R. Weber, and B. Wong. Alidade: Ip geolocation without active probing. Department of Computer Science, Duke University, Technical Report, 2015.Google Scholar
- K. Chen, D. Choffnes, R. Potharaju, Y. Chen, F. Bustamante, D. Pei, and Y. Zhao. Where the sidewalk ends: Extending the internet AS graph using traceroutes from P2P users. In CoNEXT '09, 2009. Google ScholarDigital Library
- Cisco. BGP Best Path Selection Algorithm: How the Best Path Algorithm Works. Document ID: 13753, May 2012.Google Scholar
- L. Colitti. Internet Topology Discovery Using Active Probing. Ph.D. thesis, University di Roma Tre, 2006.Google Scholar
- L. Gao, T. Griffin, and J. Rexford. Inherently safe backup routing with BGP. IEEE INFOCOM, 2001.Google Scholar
- L. Gao and J. Rexford. Stable Internet routing without global coordination. Trans. Netw., 2001. Google ScholarDigital Library
- P. Gill, S. Goldberg, and M. Schapira. A survey of interdomain routing policies. ACM CCR, 2014. Google ScholarDigital Library
- P. Gill, M. Schapira, and S. Goldberg. Let the market drive deployment: A strategy for transistioning to BGP security. SIGCOMM'11, 2011. Google ScholarDigital Library
- P. Gill, M. Schapira, and S. Goldberg. Modeling on quicksand: dealing with the scarcity of ground truth in interdomain routing data. SIGCOMM Comput. Commun. Rev., 42(1):40--46, Jan. 2012. Google ScholarDigital Library
- V. Giotsas, M. Luckie, B. Huffier, and K. Claffy. Inferring Complex AS Relationships. In ACM IMC, November 2014. Google ScholarDigital Library
- S. Goldberg, M. Schapira, P. Hummon, and J. Rexford. How secure are secure interdomain routing protocols? In SIGCOMM'10, 2010. Google ScholarDigital Library
- T. Griffin, F. B. Shepherd, and G. Wilfong. The stable paths problem and interdomain routing. Trans. Netw., 2002. Google ScholarDigital Library
- G. Huston. Peering and settlements - Part I. The Internet Protocol Journal (Cisco), 2(1), March 1999.Google Scholar
- G. Huston. Peering and settlements - Part II. The Internet Protocol Journal (Cisco), 2(2), June 1999.Google Scholar
- U. Javed, I. Cunha, D. R. Choffnes, E. Katz-Bassett, T. Anderson, and A. Krishnamurthy. Poiroot: Investigating the root cause of interdomain path changes. In SIGCOMM, 2013. Google ScholarDigital Library
- J. Karlin, S. Forrest, and J. Rexford. Nation-state routing: Censorship, wiretapping, and BGP. CoRR, 2009.Google Scholar
- E. Katz-Bassett, C. Scott, D. R. Choffnes, I. Cunha, V. Valancius, N. Feamster, H. V. Madhyastha, T. Anderson, and A. Krishnamurthy. LIFEGUARD: Practical repair of persistent route failures. In SIGCOMM, 2012. Google ScholarDigital Library
- C. Labovitz, S. Iekel-Johnson, D. McPherson, J. Oberheide, and F. Jahanian. Internet inter-domain traffic. In SIGCOMM'10, 2010. Google ScholarDigital Library
- M. Lad, D. Massey, D. Pei, Y. Wu, B. Zhang, and L. Zhang. PHAS: A prefix hijack alert system. In Proc. USENIX Security Symposium, 2006. Google ScholarDigital Library
- M. Luckie, B. Huffaker, A. Dhamdhere, and V. Giotsas. AS relationships, customer cones, and validation. In ACM Internet Measurement Conference, 2013. Google ScholarDigital Library
- R. Lychev, S. Goldberg, and M. Schapira. Is the juice worth the squeeze? BGP security in partial deployment. In SIGCOMM'13, 2013. Google ScholarDigital Library
- H. Madhyastha, E. Katz-Bassett, T. Anderson, A. Krishnamurthy, and A. Venkataramani. iPlane Nano: Path prediction for peer-to-peer applications. In Usenix NSDI, 2009. Google ScholarDigital Library
- R. Mazloum, M. Buob, J. Auge, B. Baynat, D. Rossi, and T. Friedman. Violation of Interdomain Routing Assumptions. In Passive and Active Measurement Conference, March 2014. Google ScholarDigital Library
- W. Mühlbauer, A. Feldmann, O. Maennel, M. Roughan, and S. Uhlig. Building an AS-topology model that captures route diversity. In SIGCOMM, 2006. Google ScholarDigital Library
- R. Oliveira, D. Pei, W. Willinger, B. Zhang, and L. Zhang. Quantifying the completeness of the observed internet AS-level structure. UCLA Computer Science Department - Techical Report TR-080026-2008, Sept 2008.Google Scholar
- Quantcast. http://www.quantcast.com.Google Scholar
- RIPE ASN Neighbor History. https://stat.ripe.net/widget/asn-neighbours-history.Google Scholar
- RIPE RIS raw data. http://www.ripe.net/data-tools/stats/ris/ris-raw-data.Google Scholar
- RIPE Network Coordination Center. RIPE Routing Information Service. http://www.ripe.net/data-tools/stats/ris/routing-information-service.Google Scholar
- M. Roughan, W. Willinger, O. Maennel, D. Perouli, and R. Bush. 10 lessons from 10 years of measuring and modeling the Internet's autonomous systems. JSAC, 2011.Google Scholar
- Sandvine. Fall 2012 global internet phenomena, 2012.Google Scholar
- B. Schlinker, K. Zarifis, I. Cunha, N. Feamster, and E. Katz-Bassett. PEERING: An AS for Us. In Proc. ACM HotNets, Los Angeles, CA, October 2014. Google ScholarDigital Library
- TeleGeography Submarine Cable Map. http://www.submarinecablemap.com/.Google Scholar
- University of Oregon Route Views Project. http://www.routeviews.org/.Google Scholar
- V. Valancius, N. Feamster, J. Rexford, and A. Nakao. Wide-area route control for distributed services. In USENIX ATC, 2010. Google ScholarDigital Library
- J. Wu, Y. Zhang, Z. M. Mao, and K. Shin. Internet routing resilience to failures: Analysis and implications. In CoNEXT, 2007. Google ScholarDigital Library
Index Terms
- Investigating Interdomain Routing Policies in the Wild
Recommendations
A survey of interdomain routing policies
Researchers studying the inter-domain routing system typically rely on models to fill in the gaps created by the lack of information about the business relationships and routing policies used by individual autonomous systems. To shed light on this ...
Architecture of the remote routing validation tool for BGP anomaly detection
RACS '12: Proceedings of the 2012 ACM Research in Applied Computation SymposiumThe Border Gateway Protocol (BGP) is an Inter-domain routing protocol that has gradually evolved over the past few decades. The main functionality of BGP is to exchange Network Layer Reachability Information (NLRI) between ASes so that a BGP speaker can ...
On understanding transient interdomain routing failures
The convergence time of the interdomain routing protocol, BGP, can last as long as 30 minutes. Yet, routing behavior during BGP route convergence is poorly understood. During route convergence, an end-to-end Internet path can experience a transient loss ...
Comments