Abstract
The IP space has been divided and assigned as a set of IP prefixes. Due to the longest prefix match forwarding rule, a single assigned IP prefix can be further divided into multiple distinct IP spaces; resulting in a BGP routing table that contains over half a million distinct, but overlapping entries. Another side-effect of this forwarding rule is that any anomalous announcement can result in a denial of service for the prefix owner. It is thus essential to describe and clarify the use of these overlapping prefixes. In order to do this, we use Internet Routing Registries (IRR) databases as semantic data to group IP prefixes into families of prefixes that are owned by the same organization. We use BGP data in order to populate these families with prefixes that are announced on the Internet. We introduce several metrics which enable us to study how these families behave. With these metrics, we detail how organisations prefer to subdivide their IP space, underlining global trends in IP space management. We show that there is a large amount of information in the IRR that appears to be actively maintained by a number of ISPs.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
APNIC: Using Whois: Quick Beginners Guide. http://www.apnic.net/apnic-info/whois_search/using-whois/guide
Bu, T., et al.: On characterizing BGP routing table growth. Comput. Netw. 45, 45–54 (2004)
Bush, R., Hiebert, J., Maennel, O., Roughan, M., Uhlig, S.: Testing the reachability of (new) address space. In: Proceedings of the 2007 SIGCOMM Workshop on Internet Network Management, INM 2007, pp. 236–241 (2007)
Cittadini, L., Muhlbauer, W., Uhlig, S., Bush, R., Francois, P., Maennel, O.: Evolution of internet address space deaggregation: myths and reality. IEEE J. Sel. A. Commun. 28(8), 1238–1249 (2010)
Hu, X., Mao, Z.: Accurate real-time identification of ip prefix hijacking. In: IEEE Symposium on Security and Privacy, May 2007
Huston, G.: BGP Reports. http://bgp.potaroo.net/
Khan, A., Kim, H., Kwon, T., Choi, Y.: A comparative study on IP prefixes and their origin ases in BGP and the IRR. Comput. Commun. Rev. 43, 16–24 (2013)
Ripe, N.C.C.: Routing Information Service. http://www.ripe.net/ris/
Ripe, N.C.C.: YouTube Hijacking: A RIPE NCC RIS case study, March 2008. http://www.ripe.net/internet-coordination/news/industry-developments/youtube-hijacking-a-ripe-ncc-ris-case-study
Siganos, G., Faloutsos, M.: Analyzing bgp policies: methodology and tool. In: INFOCOM 2004, vol. 3, pp. 1640–1651, March 2004
Siganos, G., Faloutsos, M.: Neighborhood watch for internet routing: can we improve the robustness of internet routing today?. In: IEEE INFOCOM (2007)
Toonk, A.: Looking at the spamhaus DDOS from a BGP perspective, March 2013. http://www.bgpmon.net/looking-at-the-spamhouse-ddos-from-a-bgp-perspective/
Vervier, P.A., Jacquemart, Q., Schlamp, J., Thonnard, O., Carle, G., Urvoy Keller, G., Biersack, E., Dacier, M.: Malicious BGP hijacks: appearances can be deceiving. In: IEEE International Conference on Communications, ICC CISS 2014, Sydney, Australia, June 2014
Vervier, P.A., Thonnard, O., Dacier, M.: Mind your blocks: on the stealthiness of malicious BGP hijacks. In: Network and Distributed System Security Symposium, NDSS 2015, 8–11 February 2015, San Diego, California, USA, February 2015
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Jacquemart, Q., Urvoy-Keller, G., Biersack, E. (2016). Behind IP Prefix Overlaps in the BGP Routing Table. In: Karagiannis, T., Dimitropoulos, X. (eds) Passive and Active Measurement. PAM 2016. Lecture Notes in Computer Science(), vol 9631. Springer, Cham. https://doi.org/10.1007/978-3-319-30505-9_22
Download citation
DOI: https://doi.org/10.1007/978-3-319-30505-9_22
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-30504-2
Online ISBN: 978-3-319-30505-9
eBook Packages: Computer ScienceComputer Science (R0)