Results 1 - 10
of
74
Detecting the Unintended in BGP Policies
"... to implement the requirements of business contracts, manage traffic, address security concerns and increase scalability of their network. These routing policies are often a high-level expression of strategies or intentions of the ISP. They have meaning when viewed from a network-wide perspective (e. ..."
Abstract
- Add to MetaCart
at the high-level. This language aims at bridging the gap between router configurations and abstract mathematical models capable of capturing complex policies. The language can be used to verify desired properties of routing protocols and hence detect potential unintended states of BGP. The language
Detecting BGP Configuration Faults with Static Analysis
- in Proc. Networked Systems Design and Implementation
, 2005
"... The Internet is composed of many independent autonomous systems (ASes) that exchange reachability information to destinations using the Border Gateway Protocol (BGP). Network operators in each AS configure BGP routers to control the routes that are learned, selected, and announced to other routers. ..."
Abstract
-
Cited by 188 (15 self)
- Add to MetaCart
. Faults in BGP configuration can cause forwarding loops, packet loss, and unintended paths between hosts, each of which constitutes a failure of the Internet routing infrastructure. This paper describes the design and implementation of rcc, the router configuration checker, a tool that finds faults in BGP
Utilizing Semantic Policies for Secure BGP Route Dissemination
"... Abstract — Policies in BGP are expressed as routing configurations that determine how route information is shared among neighbors to control traffic flows across networks. This process is limited in its expressibility, time consuming and error prone which can lead to configurations where policies ar ..."
Abstract
- Add to MetaCart
are violated or there are unintended consequences that are difficult to detect and resolve. In this paper, we propose an alternate mechanism for policy based networking that relies on using additional semantic information associated with routes expressed in an OWL ontology. Policies are expressed using SWRL
Dynamic detection and resolution of BGP oscillations
"... Autonomous Systems (AS) in the Internet use different protocols for internal and external routing. BGP is the only external protocol. It allows ASes to define their own routing policy independently. Many papers cited in reference deal with a divergence behavior due to this flexibility. In fact, when ..."
Abstract
- Add to MetaCart
distributed dy-namic method for detecting and solving oscillations of BGP. It respects private policy choices and requires only a few low level constraints in order to converge to a stable solution. Essentially, a router has to maintain only local path stateful information to detect instabilities
Detecting Unsafe BGP Policies in a Flexible World
, 2012
"... Internet Service Providers (ISPs) need to balance multiple opposing objectives. On one hand, they strive to offer innovative services to obtain competitive advantages; on the other, they have to interconnect with potentially competing ISPs to achieve reachability, and coordinate with them for certai ..."
Abstract
- Add to MetaCart
to use a richer set of policies, (2) do not modify the BGP protocol itself, and (3) detect not only instability, but also multiple stable states. Our methodology is based on the extension of current theoretical frameworks to relax their constraints and use incomplete data. We believe that this provides a
Making sense of BGP
- In Nanog presentation
, 2004
"... Abstract — In today’s Internet, BGP is extremely chatty — the most minor connectivity change produces hundreds of updates and a significant peering loss can generate millions. While gigahertz processors and terabyte disks have made it possible to capture and record BGP events via passive peering, ma ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
did it happen? ” and “how does it affect me?”. These tools can also be used to provide real-time views of an ISP’s or an enterprise’s interdomain topology that help rapidly diagnose problems like misconfigured community tags, policy filters with unintended consequences, unexpected or unwanted leaked
The Temporal and Topological Characteristics of BGP Path Changes
- IN PROCEEDINGS OF IEEE ICNP
, 2003
"... BGP has been deployed in Internet for more than a decade. However, the events that cause BGP topological changes are not well understood. Although large traces of routing updates seen in BGP operation are collected by RIPE RIS and University of Oregon RouteViews, previous work examines this data set ..."
Abstract
-
Cited by 44 (3 self)
- Add to MetaCart
BGP has been deployed in Internet for more than a decade. However, the events that cause BGP topological changes are not well understood. Although large traces of routing updates seen in BGP operation are collected by RIPE RIS and University of Oregon RouteViews, previous work examines this data
Leveraging BGP Dynamics to Reverse-Engineer Routing Policies
, 2006
"... Abstract Inter-domain routing policies are an important component of today's routing infrastructure. Knowledge about thesepolicies can be used for better traffic engineering, detecting misconfiguration, preventing policy conflicts and also, in understanding Internet routing. However, many domai ..."
Abstract
- Add to MetaCart
convergenceprocess, can be leveraged to infer route selection policies of domains. We discuss the results of using our proposed technique with archived BGP protocol data. We also describe the applicability of our proposed technique in achievingbetter traffic engineering and detecting policy conflicts. 1 Introduction
A Theoretical Method for BGP Policy Verification
"... Since BGP broadly determines the flow of data over today’s Internet, ensuring that autonomous systems (ASes) throughout the network properly implement the protocol is crucial. However, serious anomalous behavior continues to occur because BGP lacks explicit rules for enforcement or tools for policy ..."
Abstract
- Add to MetaCart
Since BGP broadly determines the flow of data over today’s Internet, ensuring that autonomous systems (ASes) throughout the network properly implement the protocol is crucial. However, serious anomalous behavior continues to occur because BGP lacks explicit rules for enforcement or tools for policy
A Randomized Solution to BGP Divergence
, 2004
"... The Border Gateway Protocol (BGP) is an interdomain routing protocol that allows each Autonomous System (AS) to define its own routing policies independently and use them to select the best routes. By means of policies, ASes are able to prevent some traffic from accessing their resources, or direct ..."
Abstract
- Add to MetaCart
approach to providing safety in BGP. The proposed algorithm dynamically detects policy conflicts, and tries to eliminate the conflict by changing the local preference of the paths involved. Both the detection and elimination of policy conflicts are performed locally, i.e. by using only local information
Results 1 - 10
of
74