Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article

The (in)completeness of the observed internet AS-level structure

Published:01 February 2010Publication History
Skip Abstract Section

Abstract

Despite significant efforts to obtain an accurate picture of the Internet's connectivity structure at the level of individual autonomous systems (ASes), much has remained unknown in terms of the quality of the inferred AS maps that have been widely used by the research community. In this paper, we assess the quality of the inferred Internet maps through case studies of a sample set of ASes. These case studies allow us to establish the ground truth of connectivity between this set of ASes and their directly connected neighbors. A direct comparison between the ground truth and inferred topology maps yield insights into questions such as which parts of the actual topology are adequately captured by the inferred maps, which parts are missing and why, and what is the percentage of missing links in these parts. This information is critical in assessing, for each class of real-world networking problems, whether the use of currently inferred AS maps or proposed AS topology models is, or is not, appropriate. More importantly, our newly gained insights also point to new directions towards building realistic and economically viable Internet topology maps.

References

  1. AOL Peering Requirements, {Online}. Available: http://www.atdn.net/ settlement_free_int.shtmlGoogle ScholarGoogle Scholar
  2. AT&T Peering Requirements, {Online}. Available: http://www.corp.att. com/peering/Google ScholarGoogle Scholar
  3. CERNET BGP Feeds, {Online}. Available: http://bgpview.6test.edu.cn/ bgp-view/Google ScholarGoogle Scholar
  4. European Internet Exchange Association, {Online}. Available: http:// www.euro-ix.netGoogle ScholarGoogle Scholar
  5. Geant2 Looking Glass, {Online}. Available: http://stats.geant2.net/lg/Google ScholarGoogle Scholar
  6. Good Practices in Internet Exchange Points, {Online}. Available: http://www.pch.net/resources/papers/ix-documentation-bcp/ix-documentation-bcp-v14en.pdfGoogle ScholarGoogle Scholar
  7. Internet Routing Registry, {Online}. Available: http://www.irr.net/Google ScholarGoogle Scholar
  8. Packet Clearing House IXP Directory, {Online}. Available: http://www.pch.net/ixpdir/Main.plGoogle ScholarGoogle Scholar
  9. PeeringDB Website, {Online}. Available: http://www.peeringdb.com/Google ScholarGoogle Scholar
  10. Personal Communication with Bill Woodcock at PCH.Google ScholarGoogle Scholar
  11. RIPE Routing Information Service Project, {Online}. Available: http:// www.ripe.net/Google ScholarGoogle Scholar
  12. RouteViews Routing Table Archive, {Online}. Available: http://www. routeviews.org/Google ScholarGoogle Scholar
  13. Skitter AS Adjacency List, {Online}. Available: http://www.caida.org/ tools/measurement/skitter/as_adjacencies.xmlGoogle ScholarGoogle Scholar
  14. The Abilene Observatory Data Collections, {Online}. Available: http:// abilene.internet2.edu/observatory/data-collections.htmlGoogle ScholarGoogle Scholar
  15. H. Ballani, P. Francis, and X. Zhang, "A study of prefix hijacking and interception in the Internet," in Proc. ACM SIGCOMM, 2007, pp. 265-276. Google ScholarGoogle Scholar
  16. H. Chang, "An economic-based empirical approach to modeling the Internet inter-domain topology and traffic matrix," Ph.D. dissertation, Univ. Michigan, Ann Arbor, MI, 2006. Google ScholarGoogle Scholar
  17. H. Chang, R. Govindan, S. Jamin, S. J. Shenker, and W.Willinger, "Towards capturing representative AS-level Internet topologies," Comput. Netw. J., vol. 44, no. 6, pp. 737-755, 2004. Google ScholarGoogle Scholar
  18. H. Chang, S. Jamin, and W. Willinger, "Inferring AS-level Internet topology from router-level path traces," in SPIE ITCom, 2001.Google ScholarGoogle Scholar
  19. H. Chang and W. Willinger, "Difficulties measuring the Internet's AS-level ecosystem," in Proc. Annu. CISS, 2006, pp. 1479-1483.Google ScholarGoogle Scholar
  20. X. Dimitropoulos, D. Krioukov, M. Fomenkov, B. Huffaker, Y. Hyun, kc claffy, and G. Riley, "AS relationships: Inference and validation," Comput. Commun. Rev., vol. 37, no. 1, pp. 29-40, 2007. Google ScholarGoogle Scholar
  21. D. Dolev, S. Jamin, O. Mokryn, and Y. Shavitt, "Internet resiliency to attacks and failures under BGP policy routing," Comput. Netw., vol. 50, no. 16, pp. 3183-3196, 2006. Google ScholarGoogle Scholar
  22. L. Gao, "On inferring autonomous system relationships in the Internet," IEEE/ACM Trans. Netw., vol. 9, no. 6, pp. 733-745, Dec. 2001. Google ScholarGoogle Scholar
  23. B. Hummel and S. Kosub, "Acyclic type-of-relationship problems on the internet: An experimental analysis," in Proc. ACM IMC, 2007, pp. 221-226. Google ScholarGoogle Scholar
  24. Y. Hyun, A. Broido, and kc claffy, "On third-party addresses in traceroute paths," presented at the PAM Workshop, 2003.Google ScholarGoogle Scholar
  25. M. Lad, R. Oliveira, B. Zhang, and L. Zhang, "Understanding the resiliency of Internet topology against false origin attacks," presented at the IEEE DSN, 2007. Google ScholarGoogle Scholar
  26. H. Madhyastha, T. Isdal, M. Piatek, C. Dixon, T. Anderson, A. Krishnamurthy, and A. Venkataramani, "iPlane: An information plane for distributed services," in Proc. OSDI, 2006, pp. 367-380. Google ScholarGoogle Scholar
  27. R. Mahajan, D. Wetherall, and T. Anderson, "Understanding BGP misconfiguration," in Proc. ACM SIGCOMM, 2002, pp. 3-16. Google ScholarGoogle Scholar
  28. Z. M. Mao, L. Qiu, J. Wang, and Y. Zhang, "On AS-level path inference," in Proc. SIGMETRICS, 2005, pp. 339-349. Google ScholarGoogle Scholar
  29. Z. M. Mao, J. Rexford, J. Wang, and R. H. Katz, "Towards an accurate AS-level traceroute tool," in Proc. ACM SIGCOMM, 2003, pp. 365-378. Google ScholarGoogle Scholar
  30. W. Mühlbauer, A. Feldmann, O. Maennel, M. Roughan, and S. Uhlig, "Building an AS-topology model that captures route diversity," in Proc. ACM SIGCOMM, 2006, pp. 195-206. Google ScholarGoogle Scholar
  31. W. Mühlbauer, S. Uhlig, B. Fu, M. Meulle, and O. Maennel, "In search for an appropriate granularity to model routing policies," in Proc. ACM SIGCOMM, 2007, pp. 145-156. Google ScholarGoogle Scholar
  32. R. Oliveira, B. Zhang, D. Pei, R. Izhak-Ratzin, and L. Zhang, "Quantifying path exploration in the Internet," in Proc. ACM IMC, Oct. 2006, pp. 269-282. Google ScholarGoogle Scholar
  33. R. Oliveira, B. Zhang, and L. Zhang, "Observing the evolution of Internet AS topology," in Proc. ACM SIGCOMM, 2007, pp. 313-324. Google ScholarGoogle Scholar
  34. D. Raz and R. Cohen, "The Internet dark matter: On the missing links in the AS connectivity map," in Proc. IEEE INFOCOM, 2006, pp. 1-12.Google ScholarGoogle Scholar
  35. Y. Rekhter, T. Li, and S. Hares, "Border Gateway Protocol 4," Internet Engineering Task Force, 2006, RFC 4271.Google ScholarGoogle Scholar
  36. M. Roughan, S. J. Tuke, and O. Maennel, "Bigfoot, sasquatch, the yeti and other missing links: What we don't know about the as graph," in Proc. ACM IMC, 2008, pp. 325-330. Google ScholarGoogle Scholar
  37. Y. Shavitt and E. Shir, "DIMES: Let the Internet measure itself," Comput. Commun. Rev., vol. 35, no. 5, pp. 71-74, 2005. Google ScholarGoogle Scholar
  38. G. Siganos and M. Faloutsos, "Analyzing BGP policies: Methodology and tool," in Proc. IEEE INFOCOM, 2004, pp. 1640-1651.Google ScholarGoogle Scholar
  39. L. Subramanian, S. Agarwal, J. Rexford, and R. Katz, "Characterizing the Internet hierarchy from multiple vantage points," in Proc. IEEE INFOCOM, 2002, pp. 618-627.Google ScholarGoogle Scholar
  40. L. Subramanian, M. Caesar, C. T. Ee, M. Handley, M. Mao, S. Shenker, and I. Stoica, "HLP: A next generation inter-domain routing protocol," in Proc. ACM SIGCOMM, 2005, pp. 13-24. Google ScholarGoogle Scholar
  41. L. Wang, M. Saranu, J. M. Gottlieb, and D. Pei, "Understanding BGP session failures in a large ISP," in Proc. IEEE INFOCOM, 2007, pp. 348-356.Google ScholarGoogle Scholar
  42. J. Wu, Y. Zhang, Z. Mao, and K. Shin, "Internet routing resilience to failures: Analysis and implications," in Proc. ACM CoNEXT, 2007, Article No. 25. Google ScholarGoogle Scholar
  43. Y. He, G. Siganos, M. Faloutsos, and S. V. Krishnamurthy, "A systematic framework for unearthing the missing links: Measurements and impact," presented at the NSDI, 2007. Google ScholarGoogle Scholar
  44. B. Zhang, R. Liu, D. Massey, and L. Zhang, "Collecting the Internet AS-level topology," Comput. Commun. Rev., vol. 35, no. 1, pp. 53-61, Jan. 2005. Google ScholarGoogle Scholar
  45. C. Zheng, L. Ji, D. Pei, J. Wang, and P. Francis, "A light-weight distributed scheme for detecting IP prefix hijacks in real-time," in Proc. ACM SIGCOMM, 2007, pp. 277-288. Google ScholarGoogle Scholar

Index Terms

  1. The (in)completeness of the observed internet AS-level structure

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader