Skip to main content

Reputation Rating Algorithm for BGP Links

  • Conference paper
  • First Online:
  • 836 Accesses

Abstract

BGP is a dynamic protocol used by Autonomous Systems (AS) constituting the Internet to exchange information in order to set up or remove links between AS. It takes into account the status of existing links and the internal policy of the AS. New links can be either legitimate or malicious. Having an objective way to detect route-leaks and/or route-hijacks could be a good starting point for deciding to accept or reject newly advertised links. In this work, an algorithm has been developed to evaluate link reputation on the basis of metrics. The work proceeded in three steps: first, BGPStream is used to overcome difficulties related to the collection of BGP record files from various collectors and projects. In the analysis phase (second phase), the algorithm is applied on collected data. The final phase is to visualize the results with a modified version of BGPlayJs to display the links reputation by coloring them from green to red. This algorithm could be used for baseline leak/hijack detection.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Biersack, E., et al.: Visual analytics for BGP monitoring and prefix hijacking identification. IEEE Netw. 26(6), 33–39 (2012)

    Article  Google Scholar 

  2. Butler, K., Farley, T.R., McDaniel, P., Rexford, J.: A survey of BGP security issues and solutions. Proc. IEEE 98(1), 100–122 (2010)

    Article  Google Scholar 

  3. CAIDA: List-of-challenges. https://github.com/CAIDA/bgp-hackathon/wiki/List-of-Challenges#linkrank-1

  4. Chang, J., et al.: AS-TRUST: a trust quantification scheme for autonomous systems in BGP. In: McCune, J.M., Balacheff, B., Perrig, A., Sadeghi, A.R., Sasse, A., Beres, Y. (eds.) Trust 2011. LNCS, vol. 6740, pp. 262–276. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-21599-5_20

    Chapter  Google Scholar 

  5. Chang, J., et al.: AS-CRED: reputation and alert service for interdomain routing. IEEE Syst. J. 7(3), 396–409 (2013)

    Article  Google Scholar 

  6. Colitti, L., Di Battista, G., Mariani, F., Patrignani, M., Pizzonia, M.: Visualizing interdomain routing with BGPlay. J. Graph Algorithms Appl. 9(1), 117–148 (2005)

    Article  Google Scholar 

  7. Cymru, T.: The bogon reference. http://www.team-cymru.org/bogon-reference.html

  8. Dainotti, A., et al.: Analysis of country-wide internet outages caused by censorship. In: Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference, IMC 2011, pp. 1–18. ACM, New York (2011). https://doi.org/10.1145/2068816.2068818

  9. Huston, G., Rossi, M., Armitage, G.: Securing BGP - a literature survey. IEEE Commun. Surv. Tutor. 13(2), 199–222 (2011)

    Article  Google Scholar 

  10. Konte, M., Perdisci, R., Feamster, N.: ASwatch: an as reputation system to expose bulletproof hosting ASes. ACM SIGCOMM Comput. Commun. Rev. 45(4), 625–638 (2015)

    Article  Google Scholar 

  11. Lad, M., Zhang, L., Massey, D.: Link-Rank: a graphical tool for capturing BGP routing dynamics. In: 2004 IEEE/IFIP Network Operations and Management Symposium, NOMS 2004, vol. 1, pp. 627–640. IEEE (2004)

    Google Scholar 

  12. Orsini, C., King, A., Giordano, D., Giotsas, V., Dainotti, A.: BGPStream: a software framework for live and historical BGP data analysis. In: Proceedings of the 2016 ACM on Internet Measurement Conference, pp. 429–444. ACM (2016)

    Google Scholar 

  13. Rekhter, Y., Li, T., Hares, S.: A border gateway protocol 4 (BGP-4) RFC 4271. Technical report (2005)

    Google Scholar 

  14. Prem Sankar, A.U., Poornachandran, P., Ashok, A., Manu, R.K., Hrudya, P.: B-Secure: a dynamic reputation system for identifying anomalous BGP paths. In: Satapathy, S.C., Bhateja, V., Udgata, S.K., Pattnaik, P.K. (eds.) Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications. AISC, vol. 515, pp. 767–775. Springer, Singapore (2017). https://doi.org/10.1007/978-981-10-3153-3_76

    Chapter  Google Scholar 

  15. Yu, H., Rexford, J., Felten, E.W.: A distributed reputation approach to cooperative internet routing protection. In: 1st IEEE ICNP Workshop on Secure Network Protocols (NPSec), pp. 73–78. IEEE (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hospice Alfred Arouna .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Arouna, H.A., Metongnon, L., Lobelle, M. (2018). Reputation Rating Algorithm for BGP Links. In: Odumuyiwa, V., Adegboyega, O., Uwadia, C. (eds) e-Infrastructure and e-Services for Developing Countries. AFRICOMM 2017. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 250. Springer, Cham. https://doi.org/10.1007/978-3-319-98827-6_33

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-98827-6_33

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-98826-9

  • Online ISBN: 978-3-319-98827-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics