skip to main content
10.1145/2815675.2815712acmconferencesArticle/Chapter ViewAbstractPublication PagesimcConference Proceedingsconference-collections
short-paper

Investigating Interdomain Routing Policies in the Wild

Published:28 October 2015Publication History

ABSTRACT

Models of Internet routing are critical for studies of Internet security, reliability and evolution, which often rely on simulations of the Internet's routing system. Accurate models are difficult to build and suffer from a dearth of ground truth data, as ISPs often treat their connectivity and routing policies as trade secrets. In this environment, researchers rely on a number of simplifying assumptions and models proposed over a decade ago, which are widely criticized for their inability to capture routing policies employed in practice.

In this study we put Internet topologies and models under the microscope to understand where they fail to capture real routing behavior. We measure data plane paths from thousands of vantage points, located in eyeball networks around the globe, and find that between 14-35% of routing decisions are not explained by existing models. We then investigate these cases, and identify root causes such as selective prefix announcement, misclassification of undersea cables, and geographic constraints. Our work highlights the need for models that address such cases, and motivates the need for further investigation of evolving Internet connectivity.

References

  1. H. Ballani, P. Francis, and X. Zhang. A study of prefix hijacking and interception in the Internet. In SIGCOMM, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. M. Berman, J. S. Chase, L. Landweber, A. Nakao, M. Ott, D. Raychaudhuri, R. Ricci, and I. Seskar. GENI: A Federated Testbed for Innovative Network Experiments. Computer Networks, 61:5--23, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. R. Bush, O. Maennel, M. Roughan, and S. Uhlig. Internet optometry: Assessing broken glasses in internet reachability. In ACM IMC, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. X. Cai, J. Heidemann, B. Krishnamurthy, and W. Willinger. Towards an AS-to-organization map. In ACM IMC, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. M. Calder, X. F. Z. Hu, E. K.-B. J. Heidemann, and R. Govindan. Mapping the Expansion of Google's Serving Infrastructure. In Proceedings of the ACM Internet Measurement Conference (IMC '13), October 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. B. Chandrasekaran, M. Bai, M. Schoenfield, A. Berger, N. Caruso, G. Economou, S. Gilliss, B. Maggs, K. Moses, D. Duff, K. Ng, E. G. Sirer, R. Weber, and B. Wong. Alidade: Ip geolocation without active probing. Department of Computer Science, Duke University, Technical Report, 2015.Google ScholarGoogle Scholar
  7. K. Chen, D. Choffnes, R. Potharaju, Y. Chen, F. Bustamante, D. Pei, and Y. Zhao. Where the sidewalk ends: Extending the internet AS graph using traceroutes from P2P users. In CoNEXT '09, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Cisco. BGP Best Path Selection Algorithm: How the Best Path Algorithm Works. Document ID: 13753, May 2012.Google ScholarGoogle Scholar
  9. L. Colitti. Internet Topology Discovery Using Active Probing. Ph.D. thesis, University di Roma Tre, 2006.Google ScholarGoogle Scholar
  10. L. Gao, T. Griffin, and J. Rexford. Inherently safe backup routing with BGP. IEEE INFOCOM, 2001.Google ScholarGoogle Scholar
  11. L. Gao and J. Rexford. Stable Internet routing without global coordination. Trans. Netw., 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. P. Gill, S. Goldberg, and M. Schapira. A survey of interdomain routing policies. ACM CCR, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. P. Gill, M. Schapira, and S. Goldberg. Let the market drive deployment: A strategy for transistioning to BGP security. SIGCOMM'11, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. P. Gill, M. Schapira, and S. Goldberg. Modeling on quicksand: dealing with the scarcity of ground truth in interdomain routing data. SIGCOMM Comput. Commun. Rev., 42(1):40--46, Jan. 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. V. Giotsas, M. Luckie, B. Huffier, and K. Claffy. Inferring Complex AS Relationships. In ACM IMC, November 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. S. Goldberg, M. Schapira, P. Hummon, and J. Rexford. How secure are secure interdomain routing protocols? In SIGCOMM'10, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. T. Griffin, F. B. Shepherd, and G. Wilfong. The stable paths problem and interdomain routing. Trans. Netw., 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. G. Huston. Peering and settlements - Part I. The Internet Protocol Journal (Cisco), 2(1), March 1999.Google ScholarGoogle Scholar
  19. G. Huston. Peering and settlements - Part II. The Internet Protocol Journal (Cisco), 2(2), June 1999.Google ScholarGoogle Scholar
  20. U. Javed, I. Cunha, D. R. Choffnes, E. Katz-Bassett, T. Anderson, and A. Krishnamurthy. Poiroot: Investigating the root cause of interdomain path changes. In SIGCOMM, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. J. Karlin, S. Forrest, and J. Rexford. Nation-state routing: Censorship, wiretapping, and BGP. CoRR, 2009.Google ScholarGoogle Scholar
  22. E. Katz-Bassett, C. Scott, D. R. Choffnes, I. Cunha, V. Valancius, N. Feamster, H. V. Madhyastha, T. Anderson, and A. Krishnamurthy. LIFEGUARD: Practical repair of persistent route failures. In SIGCOMM, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. C. Labovitz, S. Iekel-Johnson, D. McPherson, J. Oberheide, and F. Jahanian. Internet inter-domain traffic. In SIGCOMM'10, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. M. Lad, D. Massey, D. Pei, Y. Wu, B. Zhang, and L. Zhang. PHAS: A prefix hijack alert system. In Proc. USENIX Security Symposium, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. M. Luckie, B. Huffaker, A. Dhamdhere, and V. Giotsas. AS relationships, customer cones, and validation. In ACM Internet Measurement Conference, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. R. Lychev, S. Goldberg, and M. Schapira. Is the juice worth the squeeze? BGP security in partial deployment. In SIGCOMM'13, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. H. Madhyastha, E. Katz-Bassett, T. Anderson, A. Krishnamurthy, and A. Venkataramani. iPlane Nano: Path prediction for peer-to-peer applications. In Usenix NSDI, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. R. Mazloum, M. Buob, J. Auge, B. Baynat, D. Rossi, and T. Friedman. Violation of Interdomain Routing Assumptions. In Passive and Active Measurement Conference, March 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. W. Mühlbauer, A. Feldmann, O. Maennel, M. Roughan, and S. Uhlig. Building an AS-topology model that captures route diversity. In SIGCOMM, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. R. Oliveira, D. Pei, W. Willinger, B. Zhang, and L. Zhang. Quantifying the completeness of the observed internet AS-level structure. UCLA Computer Science Department - Techical Report TR-080026-2008, Sept 2008.Google ScholarGoogle Scholar
  31. Quantcast. http://www.quantcast.com.Google ScholarGoogle Scholar
  32. RIPE ASN Neighbor History. https://stat.ripe.net/widget/asn-neighbours-history.Google ScholarGoogle Scholar
  33. RIPE RIS raw data. http://www.ripe.net/data-tools/stats/ris/ris-raw-data.Google ScholarGoogle Scholar
  34. RIPE Network Coordination Center. RIPE Routing Information Service. http://www.ripe.net/data-tools/stats/ris/routing-information-service.Google ScholarGoogle Scholar
  35. M. Roughan, W. Willinger, O. Maennel, D. Perouli, and R. Bush. 10 lessons from 10 years of measuring and modeling the Internet's autonomous systems. JSAC, 2011.Google ScholarGoogle Scholar
  36. Sandvine. Fall 2012 global internet phenomena, 2012.Google ScholarGoogle Scholar
  37. B. Schlinker, K. Zarifis, I. Cunha, N. Feamster, and E. Katz-Bassett. PEERING: An AS for Us. In Proc. ACM HotNets, Los Angeles, CA, October 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. TeleGeography Submarine Cable Map. http://www.submarinecablemap.com/.Google ScholarGoogle Scholar
  39. University of Oregon Route Views Project. http://www.routeviews.org/.Google ScholarGoogle Scholar
  40. V. Valancius, N. Feamster, J. Rexford, and A. Nakao. Wide-area route control for distributed services. In USENIX ATC, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. J. Wu, Y. Zhang, Z. M. Mao, and K. Shin. Internet routing resilience to failures: Analysis and implications. In CoNEXT, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Investigating Interdomain Routing Policies in the Wild

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      IMC '15: Proceedings of the 2015 Internet Measurement Conference
      October 2015
      550 pages
      ISBN:9781450338486
      DOI:10.1145/2815675

      Copyright © 2015 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 28 October 2015

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • short-paper

      Acceptance Rates

      IMC '15 Paper Acceptance Rate31of96submissions,32%Overall Acceptance Rate277of1,083submissions,26%

      Upcoming Conference

      IMC '24
      ACM Internet Measurement Conference
      November 4 - 6, 2024
      Madrid , AA , Spain

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader