BGP route prediction within ISPs

被引:7
|
作者
Flavel, Ashley
McMahon, Jeremy [1 ]
Shaikh, Aman
Roughan, Matthew [2 ]
Bean, Nigel [2 ]
机构
[1] Univ Adelaide, TRC Math Modelling, Adelaide, SA 5005, Australia
[2] Univ Adelaide, Sch Math Sci, Adelaide, SA 5005, Australia
关键词
iBGP; Route prediction;
D O I
10.1016/j.comcom.2010.01.011
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet Service Providers (ISPs) often collect routing data to troubleshoot, analyze and predict the behavior of their network. However, data collected from multiple interacting routing protocols is often incomplete and difficult to manually analyze. In this paper we present a systematic approach to combine the pieces of measured routing data to obtain a more complete picture of a network's routing state. Our technique is efficient, has no assumptions about router configuration and is accurate. We present a case-study of a large Tier-2 ISP, finding that for those routers with adequate measurement infrastructure, we consistently find the egress location for 99.9999% of (router,prefix) pairs. Further, for the 85% of routers without measurement infrastructure we predict their decisions. This technique has been successfully applied in a 'what-if' scenario and has future applications in the real-time analysis of routing decisions. (C) 2010 Elsevier B.V. All rights reserved.
引用
收藏
页码:1180 / 1190
页数:11
相关论文
共 50 条
  • [21] On the Quality of BGP Route Collectors for iBGP Policy Inference
    Cittadini, Luca
    Vissicchio, Stefano
    Donnet, Benoit
    2014 IFIP NETWORKING CONFERENCE, 2014,
  • [22] Time-efficient algorithms for BGP route configuration
    Chim, TW
    Yeung, KL
    2004 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-7, 2004, : 1197 - 1201
  • [23] Towards Detecting BGP Route Hijacking using the RPKI
    Waehlisch, Matthias
    Maennel, Olaf
    Schmidt, Thomas C.
    ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2012, 42 (04) : 103 - 104
  • [24] Utilizing route correlation to improve BGP routing convergence
    Wang Lijun
    Wu Jianping
    Ke, Xu
    CONTEL 2007: PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS, 2007, : 211 - +
  • [25] Towards detecting BGP route hijacking using the RPKI
    Wählisch, Matthias
    Maennel, Olaf
    Schmidt, Thomas C.
    SIGCOMM'12 - Proceedings of the ACM SIGCOMM 2012 Conference Applications, Technologies, Architectures, and Protocols for Computer Communication, 2012, : 103 - 104
  • [26] A Flexible and Lightweight BGP Route Injector to Multiple Peers
    Pan, Jialiang
    Liu, Yaoqing
    2015 IEEE 14th International Symposium on Network Computing and Applications (NCA), 2015, : 147 - 150
  • [27] A study of BGP path vector route looping behavior
    Pei, D
    Zhao, XL
    Massey, D
    Zhang, LX
    24TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2004, : 720 - 729
  • [28] ARTEMIS: Neutralizing BGP Hijacking Within a Minute
    Sermpezis, Pavlos
    Kotronis, Vasileios
    Gigis, Petros
    Dimitropoulos, Xenofontas
    Cicalese, Danilo
    King, Alistair
    Dainotti, Alberto
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2018, 26 (06) : 2471 - 2486
  • [29] Effectiveness and acceptance of the intelligent speeding prediction system (ISPS)
    Zhao, Guozhen
    Wu, Changxu
    ACCIDENT ANALYSIS AND PREVENTION, 2013, 52 : 19 - 28
  • [30] ARTEMIS: Neutralizing BGP Hijacking within a Minute
    Sermpezis, Pavlos
    Kotronis, Vasileios
    Gigis, Petros
    Dimitropoulos, Xenofontas
    Cicalese, Danilo
    King, Alistair
    Dainotti, Alberto
    PROCEEDINGS OF THE 2018 APPLIED NETWORKING RESEARCH WORKSHOP (ANRW '18), 2018, : 6 - 6