Detecting unsafe BGP policies in a flexible world
Debbie Perouli , Timothy G. Griffin , Olaf Maennel , Sonia Fahmy , Cristel Pelsser , Alexander J. T. Gurney and Iain Phillips
Abstract
Internet Service Providers (ISPs) need to balance multiple opposing objectives. On one hand, they strive to offer innovative services to obtain competitive advantages; on the other, they have to interconnect with potentially competing ISPs to achieve reachability, and coordinate with them for certain services. The complexity of balancing these objectives is reflected in the diversity of policies of the Border Gateway Protocol (BGP), the standard inter-domain routing protocol. Unforeseen interactions among the BGP policies of different ISPs can cause routing anomalies. In this work, we propose a methodology to allow ISPs to check their BGP policy configurations for guaranteed convergence to a single stable state. This requires that a set of ISPs share their configurations with each other, or with a trusted third party. Compared to previous approaches to BGP safety, we (1) allow ISPs to use a richer set of policies, (2) do not modify the BGP protocol itself, and (3) detect not only instability, but also multiple stable states. Our methodology is based on the extension of current theoretical frameworks to relax their constraints and use incomplete data. We believe that this provides a rigorous foundation for the design and implementation of safety checking tools.
Publication Details
- Publication Type
- Conference Paper
- Publication Date
- November 2012
- Published In
- 2012 20th IEEE International Conference on Network Protocols (ICNP)
- Pages
- 1--10
- Publisher
- IEEE Computer Society
- Location
- Austin, TX, USA
- Digital Object Identifier (DOI)
- 10.1109/icnp.2012.6459974
BibTeX Citation
@inproceedings{Perouli2012,
title = {Detecting unsafe BGP policies in a flexible world},
author = {Debbie Perouli and Timothy G. Griffin and Olaf Maennel and Sonia Fahmy and Cristel Pelsser and Alexander J. T. Gurney and Iain Phillips},
year = 2012,
month = nov,
journal = {2012 20th IEEE International Conference on Network Protocols (ICNP)},
booktitle = {20th IEEE International Conference on Network Protocols (ICNP)},
publisher = {{IEEE} Computer Society},
address = {Austin, TX, USA},
pages = {1--10},
doi = {10.1109/icnp.2012.6459974},
isbn = {978-1-4673-2446-5},
issn = {1092-1648},
abstract = {Internet Service Providers (ISPs) need to balance multiple opposing objectives. On one hand, they strive to offer innovative services to obtain competitive advantages; on the other, they have to interconnect with potentially competing ISPs to achieve reachability, and coordinate with them for certain services. The complexity of balancing these objectives is reflected in the diversity of policies of the Border Gateway Protocol (BGP), the standard inter-domain routing protocol. Unforeseen interactions among the BGP policies of different ISPs can cause routing anomalies. In this work, we propose a methodology to allow ISPs to check their BGP policy configurations for guaranteed convergence to a single stable state. This requires that a set of ISPs share their configurations with each other, or with a trusted third party. Compared to previous approaches to BGP safety, we (1) allow ISPs to use a richer set of policies, (2) do not modify the BGP protocol itself, and (3) detect not only instability, but also multiple stable states. Our methodology is based on the extension of current theoretical frameworks to relax their constraints and use incomplete data. We believe that this provides a rigorous foundation for the design and implementation of safety checking tools.},
bibsource = {dblp computer science bibliography, https://dblp.org},
biburl = {https://dblp.org/rec/conf/icnp/PerouliGMFPGP12.bib},
eventdate = {30 Oct.-2 Nov. 2012},
eventtitleaddon = {Austin, TX, USA},
file = {:https\://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6459974:PDF},
groups = {International Conferences},
keywords = {Routing, Safety, Peer-to-peer computing, Guidelines, Electronic mail, Internet, Protocols}
}
Related publications
The BGP Visibility Toolkit: Detecting Anomalous Internet Routing Behavior
Andra Lutu, Marcelo Bagnulo, and Cristel Pelsser, et al.
IEEE/ACM Transactions on Networking, 2015
Detecting the Unintended in BGP Policies
Debbie Perouli, Timothy G. Griffin, and Olaf Maennel, et al.
20th IEEE International Conference on Network Protocols (ICNP) (Poster session), 2012
Route Flap Damping Made Usable
Cristel Pelsser, Olaf Maennel, and Pradosh Mohapatra, et al.
Passive and Active Measurement - 12th International Conference, PAM 2011, 2011
Filtering the Noise to Reveal Inter-Domain Lies
Julián Martín Del Fiore, Pascal Mérindol, and Valerio Persico, et al.
2019 Network Traffic Measurement and Analysis Conference (TMA), 2019