skip to main content
10.1145/1298306.1298336acmconferencesArticle/Chapter ViewAbstractPublication PagesimcConference Proceedingsconference-collections
Article

On the impact of route monitor selection

Published: 24 October 2007 Publication History

Abstract

Several route monitoring systems have been set up to help understand the Internet routing system. They operate by gathering real-time BGP updates from different networks. Many studies have relied on such data sources by assuming reasonably good coverage and thus representative visibility into the Internet routing system. However, different deployment strategies of route monitors directly impact the accuracy and generality of conclusions.
Our work is the first to critically examine the visibility constraints imposed by the deployment of route monitors on various applications. We study the difference due to diverse deployment schemes on three important classes of applications: (1) discovery of relatively stable Internet properties such as the AS topology and prefix to origin AS mappings, (2) discovery of dynamic routing behavior such as IP prefix hijack attacks and routing instability, and (3) inference of important network properties such as AS relationships and AS-level paths. We study several simple schemes of route monitor selection and provide insights on improving monitor placement.

References

[1]
"University of Oregon Route Views Archive Project." www.routeviews.org.
[2]
"Ripe NCC." http://www.ripe.net/ripencc/pub-services/np/ris/.
[3]
Y. He, G. Siganos, M. Faloutsos, and S. V. Krishnamurthy, "A systematic framework for unearthing the missing links: Measurements and Impact," in Proc. of NSDI, 2007.
[4]
X. Dimitropoulos and G. Riley, "Modeling Autonomous System Relationships," in Proc. of PADS, 2006.
[5]
X. Dimitropoulos, D. Krioukov, M. Fomenkov, B. Huffaker, Y. Hyun, k. c. claffy, and G. Riley, "AS Relationships: Inference and Validation," ACM Computer Communication Review, vol. 37, no. 1, 2007.
[6]
G. Battista, M. Patrignani, and M. Pizzonia, "Computing the Types of the Relationships Between Autonomous Systems," in Proc. IEEE INFOCOM, March 2003.
[7]
L. Subramanian, S. Agarwal, J. Rexford, and R. H. Katz, "Characterizing the Internet hierarchy from multiple vantagepoints," in Proc. IEEE INFOCOM, 2002.
[8]
L. Gao, "On Inferring Autonomous System Relationships in the Internet," in Proc. IEEE Global Internet Symposium, 2000.
[9]
Z. M. Mao, L. Qiu, J. Wang, and Y. Zhang, "On AS-Level Path Inference," in Proc. ACM SIGMETRICS, 2005.
[10]
W. Muhlbauer, A. Feldmann, O. Maennel, M. Roughan, and S. Uhlig, "Building an AS-Topology Model," in Proc. of ACM SIGCOMM, 2006.
[11]
A. Feldmann, O. Maennel, Z. M. Mao, A. Berger, and B. Maggs, "Locating Internet Routing Instabilities," in Proc. ACM SIGCOMM, 2004.
[12]
X. Hu and Z. M. Mao, "Accurate Real-time Identification of IP Prefix Hijacking," in Proc. of IEEE Security and Privacy, 2007.
[13]
M. Lad, D. Massey, D. Pei, Y. Wu, B. Zhang, and L. Zhang, "PHAS: A Prefix Hijack Alert System," in Proc. of USENIX Security Symposium, 2006.
[14]
M. Lad, R. Oliveira, B. Zhang, and L. Zhang, "Understanding resiliency of internet topology against prefix hijack attacks," in Proc. of DSN, 2007.
[15]
J. Karlin, J. Karlin, S. Forrest, and J. Rexford, "Pretty Good BGP: Improving BGP by Cautiously Adopting Routes," in Proc. of ICNP, 2006.
[16]
Y. Shinoda, K. Ikai, and M. Itoh, "Vulnerabilities of passive internet threat monitors," in 14th USENIX Security Symposium, August 2005.
[17]
P. Barford, A. Bestavros, J. Byers, and M. Crovella, "On the marginal utility of network topology measurements," in Proceedings of the 1st ACM SIGCOMM Workshop on Internet Measurement, 2001.
[18]
D. Raz and R. Cohen, "The internet dark matter: on the missing links in the as connectivity map," in Proc. IEEE INFOCOM, 2006.
[19]
B. Zhang, R. Liu, D. Massey, and L. Zhang, "Collecting the internet as-level topology," SIGCOMM Comput. Commun. Rev., vol. 35, no. 1, pp. 53--61, 2005.
[20]
R. Oliveira, M. Lad, B. Zhjang, D. Pei, D. Massey, and L. Zhang, "Placing BGP Monitors in the Internet." Technical Report, UCLA CS Department, TR 060017, May 2006.
[21]
H. Chang, R. Govindan, S. Jamin, S. Shenker, and W. Willinger, "Towards capturing representative AS-level Internet topologies," Computer Networks, 2004.
[22]
B. Zhang, R. Liu, D. Massey, and L. Zhang, "Collecting the Internet AS-level Topology," ACM SIGCOMM Computer Communication Review, special issue on Internet Vital Statistics, 2005.
[23]
W. Muhlbauer, A. Feldmann, O. Maennel, M. Roughan, and S. Uhlig, "Building an AS-topology model that captures route diversity," in Proc. ACM SIGCOMM, 2006.

Cited By

View all
  • (2024)A Survey of Advanced Border Gateway Protocol Attack Detection TechniquesSensors10.3390/s2419641424:19(6414)Online publication date: 3-Oct-2024
  • (2024)People’s Republic of China, Confucius, Communist Party of China: To the peculiarities of developmentGosudarstvo i pravo10.31857/S1026945224050169(153-161)Online publication date: 14-Aug-2024
  • (2024)What is the next hop to more granular routing models?Proceedings of the 23rd ACM Workshop on Hot Topics in Networks10.1145/3696348.3696859(343-351)Online publication date: 18-Nov-2024
  • Show More Cited By

Index Terms

  1. On the impact of route monitor selection

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    IMC '07: Proceedings of the 7th ACM SIGCOMM conference on Internet measurement
    October 2007
    390 pages
    ISBN:9781595939081
    DOI:10.1145/1298306
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 24 October 2007

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. bgp
    2. internet measurement

    Qualifiers

    • Article

    Conference

    IMC07
    Sponsor:
    IMC07: Internet Measurement Conference
    October 24 - 26, 2007
    California, San Diego, USA

    Acceptance Rates

    Overall Acceptance Rate 277 of 1,083 submissions, 26%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)8
    • Downloads (Last 6 weeks)2
    Reflects downloads up to 13 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)A Survey of Advanced Border Gateway Protocol Attack Detection TechniquesSensors10.3390/s2419641424:19(6414)Online publication date: 3-Oct-2024
    • (2024)People’s Republic of China, Confucius, Communist Party of China: To the peculiarities of developmentGosudarstvo i pravo10.31857/S1026945224050169(153-161)Online publication date: 14-Aug-2024
    • (2024)What is the next hop to more granular routing models?Proceedings of the 23rd ACM Workshop on Hot Topics in Networks10.1145/3696348.3696859(343-351)Online publication date: 18-Nov-2024
    • (2016)A Measurement Study on the Distribution Disparity of BGP Instabilities2016 IEEE 41st Conference on Local Computer Networks (LCN)10.1109/LCN.2016.13(19-27)Online publication date: Nov-2016
    • (2013)Inferring multilateral peeringProceedings of the ninth ACM conference on Emerging networking experiments and technologies10.1145/2535372.2535390(247-258)Online publication date: 9-Dec-2013
    • (2013)Characterizing and analysis of the flattening Internet topology2013 IEEE Symposium on Computers and Communications (ISCC)10.1109/ISCC.2013.6754949(000219-000225)Online publication date: Jul-2013
    • (2013)Improving the discovery of IXP peering links through passive BGP measurements2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)10.1109/INFCOMW.2013.6562878(121-126)Online publication date: Apr-2013
    • (2013)Improving the discovery of IXP peering links through passive BGP measurements2013 Proceedings IEEE INFOCOM10.1109/INFCOM.2013.6567146(3249-3254)Online publication date: Apr-2013
    • (2012)Anatomy of a large european IXPACM SIGCOMM Computer Communication Review10.1145/2377677.237771442:4(163-174)Online publication date: 13-Aug-2012
    • (2012)Anatomy of a large european IXPProceedings of the ACM SIGCOMM 2012 conference on Applications, technologies, architectures, and protocols for computer communication10.1145/2342356.2342393(163-174)Online publication date: 13-Aug-2012
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media