Detecting the Unintended in BGP Policies

被引:0
|
作者
Perouli, Debbie [1 ]
Griffin, Timothy G. [2 ]
Maennel, Olaf [3 ]
Fahmy, Sonia [1 ]
Phillips, Iain [3 ]
Pelsser, Cristel [4 ]
机构
[1] Purdue Univ, W Lafayette, IN 47907 USA
[2] Univ Cambridge, Comp Lab, Cambridge CB2 1TN, England
[3] Univ Loughborough, Loughborough, Leics, England
[4] IIJ, Tokyo, Japan
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Internet Service Providers (ISPs) use routing policies to implement the requirements of business contracts, manage traffic, address security concerns and increase scalability of their network. These routing policies are often a high-level expression of strategies or intentions of the ISP. They have meaning when viewed from a network-wide perspective (e. g., mark on ingress, filter on egress). However, configuring these policies for the Border Gateway Protocol (BGP) is undertaken at a low-level, on a per router basis. Unintended routing outcomes have been observed. In this work, we define a language that allows analysis of network-wide configurations at the high-level. This language aims at bridging the gap between router configurations and abstract mathematical models capable of capturing complex policies. The language can be used to verify desired properties of routing protocols and hence detect potential unintended states of BGP. The language is accompanied by a tool suite that parses router configuration languages (which by their nature are vendor-dependent) and translates them into vendor-independent representations of policies.
引用
收藏
页数:2
相关论文
共 50 条
  • [1] Detecting Unsafe BGP Policies in a Flexible World
    Perouli, Debbie
    Griffin, Timothy G.
    Maennel, Olaf
    Fahmy, Sonia
    Pelsser, Cristel
    Gurney, Alexander
    Phillips, Iain
    2012 20TH IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP), 2012,
  • [2] Detecting BGP misconfiguration for BGP/MPLS VPNs
    Liang, HY
    Teng, GW
    Wang, HJ
    Gao, Y
    PDCAT 2005: SIXTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS, 2005, : 168 - 170
  • [3] Detecting BGP anomalies with wavelet
    Mai, Jianning
    Yuan, Lihua
    Chuah, Chen-Nee
    2008 IEEE NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, VOLS 1 AND 2, 2008, : 465 - 472
  • [4] BGP routing, policies in ISP networks
    Caesar, M
    Rexford, J
    IEEE NETWORK, 2005, 19 (06): : 5 - 11
  • [5] Analyzing BGP policies: Methodology and tool
    Siganos, G
    Faloutsos, N
    IEEE INFOCOM 2004: THE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-4, PROCEEDINGS, 2004, : 1640 - 1651
  • [6] A Hierarchical Model for BGP Routing Policies
    Vanbever, Laurent
    Quoitin, Bruno
    Bonaventure, Olivier
    2ND ACM SIGCOMM WORKSHOP ON PROGRAMMABLE ROUTERS FOR EXTENSIBLE SERVICES OF TOMORROW - PRESTO 09, 2009, : 61 - 66
  • [7] Detecting selective dropping attacks in BGP
    Chuah, M.
    Huang, K.
    31ST IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS, PROCEEDINGS, 2006, : 959 - +
  • [8] Unintended population consequences of policies
    Anderson, BA
    POPULATION AND ENVIRONMENT, 2004, 25 (04) : 377 - 390
  • [9] Unintended population consequences of policies
    Anderson B.A.
    Population and Environment, 2004, 25 (4) : 377 - 390
  • [10] Temporal Representations for Detecting BGP Blackjack Attacks
    Copstein, Rafael
    Zincir-Heywood, Nur
    2020 16TH INTERNATIONAL CONFERENCE ON NETWORK AND SERVICE MANAGEMENT (CNSM), 2020,