The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The correct functioning of inter-domain routing is of vital importance to the ever expanding Internet. As a common threat to the Internet, prefix hijackings often hijack traffic destined to some Autonomous Systems(ASes), leading to routing black holes or traffic interception. In this paper, we study two typical categories of prefix hijackings, namely false origin hijacking and man-in-the-middle interception,...
The incompleteness of the Internet AS-level topology is the most serious pitfall of research studies concerning the Internet inter-domain ecosystem. In this demo we show two projects aimed at filling this gap by offering services to different type of users. The first is Portolan, a smartphone-based crowdsourcing system which provides an app for Android that volunteers can install to run traceroute...
Due to the inherent design faults of the Border Gateway Protocol (BGP), BGP prefix hijacking remains a serious security threat to the Internet routing system. AS hijacking enables an attacker to pass the prefix ownership validation mechanism, it is more sophisticated than IP prefix hijacking. So far, many efforts have been done on the detection of prefix hijacking, however, AS hijacking has not received...
The Internet Autonomous System (AS) topology has important implications on end-to-end routing, network economics and security. Despite the significance of the AS topology research, it has not been possible to collect a complete map of the AS interconnections due to the difficulties involved in discovering peering links. The problem of topology incompleteness is amplified by the increasing popularity...
Although there have been a plethora of studies on TCP performance in supporting of various applications, relatively little is known about the interaction between TCP and BGP, which is a specific application running on top of TCP. This paper investigates BGP's slow route propagation by analyzing packet traces collected from a large ISP and Route Views Oregon collector. In particular we focus on the...
The AS path prep ending approach in BGP is commonly used to perform inter-domain traffic engineering, such as inbound traffic load-balancing for multi-homed ASes. It artificially increases the length of the AS level path in BGP announcements by inserting its local AS number multiple times into outgoing announcements. In this work, we study how the AS path prep ending mechanism can be exploited to...
Root cause analysis of BGP updates is the key to debug and troubleshoot BGP routing problems. However, inferring the root cause with high accuracy is challenge. Although correlating multiple vantage points is a validate method, how many vantage points are truly necessary to pinpoint the root cause is not resolved. In this paper, we propose a new method to explore two independent vantage points to...
The AS path prepending approach in BGP is commonly used to perform inter-domain traffic engineering, such as inbound traffic load-balancing for multi-homed ASes. It artificially increases the length of the AS level path in BGP announcements by inserting its local AS number multiple times into outgoing EBGP announcement messages. In this work, we first present a comprehensive study on the characterization...
RFD and MRAI are the only two built-in mechanisms in BGP router against unstable routes, they can however negatively impact the convergence. In this paper, we propose a churn aggregation approach CAGG to stabilize BGP routing without harming convergence. CAGG is based on the observation that AS PATH change is the dominant cause for BGP updates and only a small number of AS PATHs are explored by each...
Internet is known as the net of networks. It is a huge decentralized network composed by smaller inter-connected networks named autonomous systems (AS). The autonomous systems's interconnection is done by the Border Gateway Protocol (BGP). Several tools have been proposed to monitor BGP problems. Even though there is no long term indicator to rank Internet routes's health based on long term BGP problems...
The scalability limitations of BGP have been a major concern in the networking community lately. An important issue in this respect is the rate of routing updates (churn) that BGP routers must process. This paper presents an analysis of the evolution of churn in four networks in the backbone of the Internet over the last six years, using update traces from the Routeviews project. The churn rate varies...
Inter-domain routing system is the critical infrastructure of Internet. Make sure that autonomous system (AS) announces and prefers authentic routing information is very important to the security of inter-domain routing system. Due to BGP's opaqueness and AS's autonomy, it is difficult for AS to identify whether an incoming BGP route is valid. We design a reputation mechanism based on Bayesian probability...
The security of inter-domain routing system greatly depends on the trustworthiness of routing information and routing behavior of autonomous system (AS). Many researches on e-commerce, grid, and p2p have proven that reputation mechanism is helpful to inhibit the spread of false route and the occurrence of malicious routing behavior. To increase AS resistance to malicious routing attack, we designs...
The Internet routing system plays an essential role of gluing together tens of thousands of individual networks to create a global data delivery substrate. Over the years many efforts have been devoted to securing the routing system and a plethora of solutions have been proposed. Yet none of the solutions has seen wide adoption in the operational Internet and the routing system security remains a...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.