Detecting the Unintended in BGP Policies
Debbie Perouli , Timothy G. Griffin , Olaf Maennel , Sonia Fahmy , Iain Phillips and Cristel Pelsser
Abstract
Internet Service Providers (ISPs) use routing policies to implement the requirements of business contracts, manage traffic, address security concerns and increase scalability of their network. These routing policies are often a high-level expression of strategies or intentions of the ISP. They have meaning when viewed from a network-wide perspective (e.g., mark on ingress, filter on egress). However, configuring these policies for the Border Gateway Protocol (BGP) is undertaken at a low-level, on a per router basis. Unintended routing outcomes have been observed. In this work, we define a language that allows analysis of network-wide configurations at the high-level. This language aims at bridging the gap between router configurations and abstract mathematical models capable of capturing complex policies. The language can be used to verify desired properties of routing protocols and hence detect potential unintended states of BGP. The language is accompanied by a tool suite that parses router configuration languages (which by their nature are vendor-dependent) and translates them into vendor-independent representations of policies.
Publication Details
- Publication Type
- poster
- Publication Date
- October 2012
- Published In
- 20th IEEE International Conference on Network Protocols (ICNP) (Poster session)
- Location
- Austin, TX, USA
- Digital Object Identifier (DOI)
- 10.1109/icnp.2012.6459955
BibTeX Citation
@poster{Perouli2012c,
title = {Detecting the Unintended in BGP Policies},
author = {Debbie Perouli and Timothy G. Griffin and Olaf Maennel and Sonia Fahmy and Iain Phillips and Cristel Pelsser},
year = 2012,
month = oct,
booktitle = {20th IEEE International Conference on Network Protocols ({ICNP}) (Poster session)},
address = {Austin, TX, USA},
doi = {10.1109/icnp.2012.6459955},
abstract = {Internet Service Providers (ISPs) use routing policies to implement the requirements of business contracts, manage traffic, address security concerns and increase scalability of their network. These routing policies are often a high-level expression of strategies or intentions of the ISP. They have meaning when viewed from a network-wide perspective (e.g., mark on ingress, filter on egress). However, configuring these policies for the Border Gateway Protocol (BGP) is undertaken at a low-level, on a per router basis. Unintended routing outcomes have been observed. In this work, we define a language that allows analysis of network-wide configurations at the high-level. This language aims at bridging the gap between router configurations and abstract mathematical models capable of capturing complex policies. The language can be used to verify desired properties of routing protocols and hence detect potential unintended states of BGP. The language is accompanied by a tool suite that parses router configuration languages (which by their nature are vendor-dependent) and translates them into vendor-independent representations of policies.},
groups = {Posters},
keywords = {bgp, routing policy, policy analysis, isp}
}
Related publications
Detecting unsafe BGP policies in a flexible world
Debbie Perouli, Timothy G. Griffin, and Olaf Maennel, et al.
2012 20th IEEE International Conference on Network Protocols (ICNP), 2012
Reducing the complexity of BGP stability analysis with hybrid combinatorial-algebraic models
Debbie Perouli, Stefano Vissicchio, and Alexander Gurney, et al.
2012 The 2nd International Workshop on Rigorous Protocol Engineering (WRiPE), 2012
The Multiple Benefits of a Secure Transport for BGP
Thomas Wirtgen, Nicolas Rybowski, and Cristel Pelsser, et al.
Proceedings of the ACM on Networking, 2024
The BGP Visibility Toolkit: Detecting Anomalous Internet Routing Behavior
Andra Lutu, Marcelo Bagnulo, and Cristel Pelsser, et al.
IEEE/ACM Transactions on Networking, 2015