Inference of Borders Between IP Networks

Inference of Borders Between IP Networks

bdrmap: Inference of Borders Between IP Networks Matthew Luckie Amogh Dhamdhere Bradley Huffaker University of Waikato CAIDA / UC San Diego CAIDA / UC San Diego [email protected] [email protected] [email protected] David Clark kc claffy MIT CAIDA / UC San Diego [email protected] [email protected] ABSTRACT 1. INTRODUCTION We tackle the tedious and unsolved problem of auto- Every Internet researcher and operator is familiar matically and correctly inferring network boundaries in with traceroute, but not everyone is aware of the infer- traceroute. We explain why such a conceptually sim- ential challenges in interpreting traceroute output, the ple task is so hard in the real world, and how lack of diverse barriers to developing a more accurate Inter- progress has impeded a wide range of research and de- net path inference capability, and the resulting imped- velopment efforts for decades. We develop and validate iments to a range of research and development efforts. a method that uses targeted traceroutes, knowledge of Despite these impediments, researchers have relied on traceroute idiosyncrasies, and codification of topologi- traceroute to support measurement and analysis of In- cal constraints in a structured set of heuristics, to cor- ternet router-level topologies for two decades. rectly identify interdomain links at the granularity of Internet router-level topology discovery and inference individual border routers. In this study we focus on the is tedious and error-prone for at least five classes of rea- network boundaries we have most confidence we can sons. Most obviously, the TCP/IP architecture has no accurately infer in the presence of sampling bias: in- notion of interdomain boundaries at the network layer. terdomain links attached to the network launching the In fact, the architecture does not even have any mecha- traceroute. We develop a scalable implementation of nism to identify a complete router { an IP address iden- our algorithm and validate it against ground truth infor- tifies only a single interface on a router, and routers may mation provided by four networks on 3,277 links, which have hundreds of (or thousands of virtual) interfaces. showed 96.3% { 98.9% of our inferences were correct. Second, the measurement tool used for IP topology With 19 vantage points (VPs) distributed across a discovery implements a 30-year old clever hack in which large U.S. broadband provider, we use our method to re- an end host sends customized probe packets along a for- veal the tremendous density of router-level interconnec- ward path toward a destination to trick each router into tion between some ASes. In January 2016, the broad- revealing one of their interface IP addresses to the end band provider had 45 router-level links with a Tier-1 host. Constructing an Internet-scale topology requires peer. We also quantify the VP deployment required superimposing millions of such measurements from mul- to observe this ISP's interdomain connectivity, with 17 tiple sources, onto an interface topology graph, and VPs required to observe all 45 links. Our method forms then applying heuristic techniques to infer which IP the cornerstone of the system we are building to map addresses are interfaces on the same physical router, interdomain performance, and we release our code. i.e., alias resolution. Failure to accurately resolve such aliases for the same router will result in an inflated in- Keywords ference of the number of links between networks. Third, operator address assignment and router imple- Internet topology; Router ownership mentation practices limit the accuracy of the canonical approach of mapping an IP address observed in tracer- Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or oute to the organization that announces the longest distributed for profit or commercial advantage and that copies bear this notice matching prefix for that IP address in BGP [44]. Fourth, and the full citation on the first page. Copyrights for components of this work traceroute measurements repeatedly sample links close owned by others than ACM must be honored. Abstracting with credit is per- mitted. To copy otherwise, or republish, to post on servers or to redistribute to to the vantage point [22], resulting in topologies where lists, requires prior specific permission and/or a fee. Request permissions from links farther from the network are less likely to be ob- [email protected]. served. This sampling bias can reduce the accuracy IMC 2016, November 14–16, Santa Monica, CA, USA. of router ownership inferences because there are fewer c 2016 ACM. ISBN 978-1-4503-4526-2/16/11. $15.00 topological constraints available. DOI: http://dx.doi.org/10.1145/2987443.2987467 381 Finally, operators could overcome all of these issues the presence of an astounding 45 interdomain links with by assigning hostnames to router interfaces that identify one of the ISP's Tier-1 peers, geographically distributed the router itself, but concerns about revealing network throughout the ISP's network, with 25 of these links topology information to competitors, or to prospective only visible from a vantage point (VP) in specific re- attackers, align operator incentives away from trans- gions. For 73% of measured prefixes, we observed 5 { parency about their internal network topologies. 15 distinct border routers carrying probe traffic. These challenges impede many Internet research and (5) We publicly release the source code imple- development efforts, from realistic network modeling, mentation. To promote further validation and use of protocol design, to assessment of real-world network our network border mapping measurement and analy- properties such as interdomain congestion, infrastruc- sis algorithm, which we call bdrmap, we publicly release ture resiliency, and identifying vulnerabilities due to in- our source code implementation as part of scamper [23]. adequate security policies. In light of these challenges, Our method infers all interdomain links directly con- this paper makes the following five contributions: nected to and visible from the network hosting a single (1) We introduce a scalable method for accu- VP. Accurately inferring the parties involved in all inter- rately inferring the boundaries of a given net- domain links observed in traceroute requires overcoming work, and the other networks attached at each the natural sample bias in traceroute [22], i.e., poorer boundary. Our approach efficiently infers forward IP visibility into distant networks, which limits our abil- paths from traceroute measurements, resolves IP aliases ity to assemble constraints. We build on years of prior to construct a router-level topology [15, 40, 21], and work in topology discovery (e.g. [10, 2]), alias resolution then uses this topology as well as topological constraints (e.g. [15, 40, 5, 21]), AS relationship inference [25], and inferred from BGP data [25] to narrow the possible set active probing systems (e.g. [23]). Our contributions are of links and associated IP addresses that represent bor- a scalable system that synthesizes this prior work, and ders between networks. Our approach builds on gen- a set of novel heuristics that correctly infer router-level erally accepted assumptions about industry practices, interdomain links and the involved parties. such as numbering border router interfaces with IP ad- dresses that belong to an upstream provider's network. Our method explicitly accommodates known limitations 2. MOTIVATION of traceroute, e.g., sometimes a border router responds Network Modeling and Resilience: Early models to a traceroute probe using a source address belonging of Internet topology considered each AS a node, and an to a third-party AS, i.e., one that maps to neither net- interdomain link an edge between two ASes [43]. While work constituting the border. Even when a neighbor this simplistic model does not reflect the complexity of network does not respond to our probes, our algorithm Internet interconnection, it has reflected the inferential can still pinpoint where they interconnect. capabilities of the research community [43]. Our work (2) We develop an efficient system to allow enables the construction of a router-level map of in- deployment of our method on resource-limited terdomain connectivity, which will empirically ground devices. We show that the probing our algorithm uses efforts to accurately model AS topology evolution. obtains a complete and accurate router-level interdo- The capability to correctly identify the interdomain main map, but the densest measurement infrastructure links of a network also enables analysis of network re- deployments use resource-limited devices that cannot siliency and robustness in a way not previously possi- maintain state for the entire map themselves. We ex- ble. For instance, we can use comprehensive traceroutes tend our measurement tools to support low-resource (from archives or targeted) to estimate which routers, devices by interactively offloading data and state to a links, and interconnection facilities carry traffic to a sig- centrally-operated system. nificant fraction of the Internet [37], and the potential (3) We validate our algorithm's correctness us- of an attack or outage to disrupt connectivity. ing ground truth from four network operators Interdomain congestion: Exploding demand for as well as databases of IXP address use. We used high-bandwidth content (e.g., streaming video) has fu- ground truth provided by a research

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    16 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us