• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 74
Next 10 →

Detecting the Unintended in BGP Policies

by Debbie Perouli, Timothy G. Griffin, Olaf Maennel, Sonia Fahmy, Iain Phillips, Cristel Pelsser
"... to implement the requirements of business contracts, manage traffic, address security concerns and increase scalability of their network. These routing policies are often a high-level expression of strategies or intentions of the ISP. They have meaning when viewed from a network-wide perspective (e. ..."
Abstract - Add to MetaCart
at the high-level. This language aims at bridging the gap between router configurations and abstract mathematical models capable of capturing complex policies. The language can be used to verify desired properties of routing protocols and hence detect potential unintended states of BGP. The language

Detecting BGP Configuration Faults with Static Analysis

by Nick Feamster, Hari Balakrishnan - in Proc. Networked Systems Design and Implementation , 2005
"... The Internet is composed of many independent autonomous systems (ASes) that exchange reachability information to destinations using the Border Gateway Protocol (BGP). Network operators in each AS configure BGP routers to control the routes that are learned, selected, and announced to other routers. ..."
Abstract - Cited by 188 (15 self) - Add to MetaCart
. Faults in BGP configuration can cause forwarding loops, packet loss, and unintended paths between hosts, each of which constitutes a failure of the Internet routing infrastructure. This paper describes the design and implementation of rcc, the router configuration checker, a tool that finds faults in BGP

Utilizing Semantic Policies for Secure BGP Route Dissemination

by Sethuram Balaji Kodeswaran, Palanivel Kodeswaran, Anupam Joshi
"... Abstract — Policies in BGP are expressed as routing configurations that determine how route information is shared among neighbors to control traffic flows across networks. This process is limited in its expressibility, time consuming and error prone which can lead to configurations where policies ar ..."
Abstract - Add to MetaCart
are violated or there are unintended consequences that are difficult to detect and resolve. In this paper, we propose an alternate mechanism for policy based networking that relies on using additional semantic information associated with routes expressed in an OWL ontology. Policies are expressed using SWRL

Dynamic detection and resolution of BGP oscillations

by Ehoud Ahronovitz, Jean-claude K ¨onig
"... Autonomous Systems (AS) in the Internet use different protocols for internal and external routing. BGP is the only external protocol. It allows ASes to define their own routing policy independently. Many papers cited in reference deal with a divergence behavior due to this flexibility. In fact, when ..."
Abstract - Add to MetaCart
distributed dy-namic method for detecting and solving oscillations of BGP. It respects private policy choices and requires only a few low level constraints in order to converge to a stable solution. Essentially, a router has to maintain only local path stateful information to detect instabilities

Detecting Unsafe BGP Policies in a Flexible World

by Debbie Perouli, Timothy G. Griffin, Olaf Maennel, Sonia Fahmy, Cristel Pelsser, Alexander Gurney, Iain Phillips , 2012
"... Internet Service Providers (ISPs) need to balance multiple opposing objectives. On one hand, they strive to offer innovative services to obtain competitive advantages; on the other, they have to interconnect with potentially competing ISPs to achieve reachability, and coordinate with them for certai ..."
Abstract - Add to MetaCart
to use a richer set of policies, (2) do not modify the BGP protocol itself, and (3) detect not only instability, but also multiple stable states. Our methodology is based on the extension of current theoretical frameworks to relax their constraints and use incomplete data. We believe that this provides a

Making sense of BGP

by Tina Wong, Van Jacobson, Cengiz Alaettinoglu - In Nanog presentation , 2004
"... Abstract — In today’s Internet, BGP is extremely chatty — the most minor connectivity change produces hundreds of updates and a significant peering loss can generate millions. While gigahertz processors and terabyte disks have made it possible to capture and record BGP events via passive peering, ma ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
did it happen? ” and “how does it affect me?”. These tools can also be used to provide real-time views of an ISP’s or an enterprise’s interdomain topology that help rapidly diagnose problems like misconfigured community tags, policy filters with unintended consequences, unexpected or unwanted leaked

The Temporal and Topological Characteristics of BGP Path Changes

by Di-Fa Chang , Ramesh Govindan, John Heidemann - IN PROCEEDINGS OF IEEE ICNP , 2003
"... BGP has been deployed in Internet for more than a decade. However, the events that cause BGP topological changes are not well understood. Although large traces of routing updates seen in BGP operation are collected by RIPE RIS and University of Oregon RouteViews, previous work examines this data set ..."
Abstract - Cited by 44 (3 self) - Add to MetaCart
BGP has been deployed in Internet for more than a decade. However, the events that cause BGP topological changes are not well understood. Although large traces of routing updates seen in BGP operation are collected by RIPE RIS and University of Oregon RouteViews, previous work examines this data

Leveraging BGP Dynamics to Reverse-Engineer Routing Policies

by Sridhar Machirajurandy, H. Katz, Sridhar Machiraju, Y H. Katzuc Berkeley , 2006
"... Abstract Inter-domain routing policies are an important component of today's routing infrastructure. Knowledge about thesepolicies can be used for better traffic engineering, detecting misconfiguration, preventing policy conflicts and also, in understanding Internet routing. However, many domai ..."
Abstract - Add to MetaCart
convergenceprocess, can be leveraged to infer route selection policies of domains. We discuss the results of using our proposed technique with archived BGP protocol data. We also describe the applicability of our proposed technique in achievingbetter traffic engineering and detecting policy conflicts. 1 Introduction

A Theoretical Method for BGP Policy Verification

by Raj Kumar Rajendran, et al.
"... Since BGP broadly determines the flow of data over today’s Internet, ensuring that autonomous systems (ASes) throughout the network properly implement the protocol is crucial. However, serious anomalous behavior continues to occur because BGP lacks explicit rules for enforcement or tools for policy ..."
Abstract - Add to MetaCart
Since BGP broadly determines the flow of data over today’s Internet, ensuring that autonomous systems (ASes) throughout the network properly implement the protocol is crucial. However, serious anomalous behavior continues to occur because BGP lacks explicit rules for enforcement or tools for policy

A Randomized Solution to BGP Divergence

by Selma Yilmaz Ibrahim , 2004
"... The Border Gateway Protocol (BGP) is an interdomain routing protocol that allows each Autonomous System (AS) to define its own routing policies independently and use them to select the best routes. By means of policies, ASes are able to prevent some traffic from accessing their resources, or direct ..."
Abstract - Add to MetaCart
approach to providing safety in BGP. The proposed algorithm dynamically detects policy conflicts, and tries to eliminate the conflict by changing the local preference of the paths involved. Both the detection and elimination of policy conflicts are performed locally, i.e. by using only local information
Next 10 →
Results 1 - 10 of 74
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University