skip to main content
10.1145/3603269.3610852acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
poster

Poster: LeMon: Global Route Leak Monitoring Service

Published: 01 September 2023 Publication History

Abstract

We develop LeMon for real-time detection of route leaks and explain how we resolved the shortcomings in previous approaches. We perform extensive evaluations of LeMon on heuristically derived datasets as well as on live BGP traffic demonstrating its performance and accuracy. We also confirm the events identified by LeMon with survey of network operators. We provide access1 to our implementation of LeMon and to the datasets.

References

[1]
Alexander Aximov, Eugene Bogomazov, Randy Bush, Keyur Patel, and Job Snijders. Verification of as_path using the resource certificate public key infrastructure and autonomous system provider authorization. Network Working Group Internet Draft. November, 2020.
[2]
Marcelo Bagnulo, Alberto García-Martínez, Stefano Angieri, Andra Lutu, and Jinze Yang. Practicable route leak detection and protection with asiria. Computer Networks, 211:108966, 2022.
[3]
CAIDA. https://catalog.caida.org/. Accessed: 01.2023.
[4]
Shivani Deshpande, Marina Thottan, Tin Kam Ho, and Biplab Sikdar. An online mechanism for bgp instability detection and analysis. IEEE transactions on Computers, 58(11):1470--1484, 2009.
[5]
Romain Fontugne, Anant Shah, and Emile Aben. The (thin) bridges of as connectivity: Measuring dependency using as hegemony. In International Conference on Passive and Active Network Measurement, pages 216--227. Springer, 2018.
[6]
Lixin Gao. On inferring autonomous system relationships in the internet. IEEE/ACM Transactions on networking, 9(6):733--745, 2001.
[7]
Vasileios Giotsas and Shi Zhou. Valley-free violation in internet routing---analysis based on bgp community data. In 2012 IEEE International Conference on Communications (ICC), pages 1193--1197. IEEE, 2012.
[8]
Geoff Huston. Leaking routes. https://labs.apnic.net/blabs/?p=139/. Accessed: 29.07.2022.
[9]
IHR. Internet health report. https://ihr.iijlab.net/ihr/. Accessed: 01.2023.
[10]
Yuchen Jin, Colin Scott, Amogh Dhamdhere, Vasileios Giotsas, Arvind Krishnamurthy, and Scott Shenker. Stable and practical as relationship inference with problink. In NSDI, volume 19, pages 581--598, 2019.
[11]
Qrator Lab. Qrator Blog. https://blog.qrator.net, 2022. [Online; accessed 19-November-2022].
[12]
Qrator Labs. Q4 2022 ddos attacks and bgp incidents. https://blog.qrator.net/en/q4-2022-ddos-attacks-and-bgp-incidents-report_163/. Accessed: 04.2023.
[13]
Matthew Luckie, Bradley Huffaker, Amogh Dhamdhere, Vasileios Giotsas, and KC Claffy. As relationships, customer cones, and validation. In Proceedings of the 2013 conference on Internet measurement conference, pages 243--256, 2013.
[14]
Pablo Moriano, Raquel Hill, and L Jean Camp. Using bursty announcements for detecting bgp routing anomalies. Computer Networks, 188:107835, 2021.
[15]
Chiara Orsini, Alistair King, Danilo Giordano, Vasileios Giotsas, and Alberto Dainotti. Bgpstream: a software framework for live and historical bgp data analysis. In Proceedings of the 2016 Internet Measurement Conference, pages 429--444, 2016.
[16]
Yakov Rekhter, Susan Hares, and Tony Li. A Border Gateway Protocol 4 (BGP-4). RFC 4271, January 2006.
[17]
RIPE RIS. Ris route collectors. https://ris.ripe.net/docs/10_routecollectors.html. Accessed: 25.04.2023.
[18]
Routeviews. Routeview bgp collectors. http://www.routeviews.org/routeviews/index.php/collectors/. Accessed: 25.07.2022.
[19]
Muhammad Shuaib Siddiqui, D Montero, Marcelo Yannuzzi, René Serral-Gracià, Xavier Masip-Bruin, and Wilson Ramírez. Route leak detection using real-time analytics on local bgp information. In 2014 IEEE Global Communications Conference, pages 1942--1948. IEEE, 2014.
[20]
Muhammad Shuaib Siddiqui, Diego Montero, René Serral-Gracià, and Marcelo Yannuzzi. Self-reliant detection of route leaks in inter-domain routing. Computer Networks, 82:135--155, 2015.
[21]
Kotikalapudi Sriram. Design Discussion of Route Leaks Solution Methods. Internet-Draft draft-sriram-idr-route-leak-solution-discussion-07, Internet Engineering Task Force. Work in Progress.
[22]
Kotikalapudi Sriram, Doug Montgomery, Danny R. McPherson, Eric Osterweil, and Brian Dickson. Problem Definition and Classification of BGP Route Leaks. RFC 7908, June 2016.
[23]
Andree Toonk. Massive route leak causes internet slowdown. https://www.bgpmon.net/massive-route-leak-cause-internet-slowdown/. Accessed: 29.07.2022.
[24]
Man Zeng, Dandan Li, Pei Zhang, Kun Xie, and Xiaohong Huang. Federated route leak detection in inter-domain routing with privacy guarantee. ACM Transactions on Internet Technology, 23(1):1--22, 2023.

Cited By

View all
  • (2025)LeakFocus: Catching the perpetrator in routing leak eventComputers & Security10.1016/j.cose.2024.104300150(104300)Online publication date: Mar-2025
  • (2024)Exploring the Benefit of Path Plausibility Algorithms in BGPNOMS 2024-2024 IEEE Network Operations and Management Symposium10.1109/NOMS59830.2024.10575088(1-10)Online publication date: 6-May-2024

Index Terms

  1. Poster: LeMon: Global Route Leak Monitoring Service

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    ACM SIGCOMM '23: Proceedings of the ACM SIGCOMM 2023 Conference
    September 2023
    1217 pages
    ISBN:9798400702365
    DOI:10.1145/3603269
    Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the owner/author(s).

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 01 September 2023

    Check for updates

    Author Tags

    1. BGP
    2. route leaks

    Qualifiers

    • Poster

    Funding Sources

    • German Federal Ministry of Education and Research
    • Hessen State Ministry for Higher Education, Research and Art

    Conference

    ACM SIGCOMM '23
    Sponsor:
    ACM SIGCOMM '23: ACM SIGCOMM 2023 Conference
    September 10, 2023
    NY, New York, USA

    Acceptance Rates

    Overall Acceptance Rate 462 of 3,389 submissions, 14%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)103
    • Downloads (Last 6 weeks)24
    Reflects downloads up to 05 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2025)LeakFocus: Catching the perpetrator in routing leak eventComputers & Security10.1016/j.cose.2024.104300150(104300)Online publication date: Mar-2025
    • (2024)Exploring the Benefit of Path Plausibility Algorithms in BGPNOMS 2024-2024 IEEE Network Operations and Management Symposium10.1109/NOMS59830.2024.10575088(1-10)Online publication date: 6-May-2024

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media