Detecting the Unintended in BGP Policies

被引:0
|
作者
Perouli, Debbie [1 ]
Griffin, Timothy G. [2 ]
Maennel, Olaf [3 ]
Fahmy, Sonia [1 ]
Phillips, Iain [3 ]
Pelsser, Cristel [4 ]
机构
[1] Purdue Univ, W Lafayette, IN 47907 USA
[2] Univ Cambridge, Comp Lab, Cambridge CB2 1TN, England
[3] Univ Loughborough, Loughborough, Leics, England
[4] IIJ, Tokyo, Japan
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Internet Service Providers (ISPs) use routing policies to implement the requirements of business contracts, manage traffic, address security concerns and increase scalability of their network. These routing policies are often a high-level expression of strategies or intentions of the ISP. They have meaning when viewed from a network-wide perspective (e. g., mark on ingress, filter on egress). However, configuring these policies for the Border Gateway Protocol (BGP) is undertaken at a low-level, on a per router basis. Unintended routing outcomes have been observed. In this work, we define a language that allows analysis of network-wide configurations at the high-level. This language aims at bridging the gap between router configurations and abstract mathematical models capable of capturing complex policies. The language can be used to verify desired properties of routing protocols and hence detect potential unintended states of BGP. The language is accompanied by a tool suite that parses router configuration languages (which by their nature are vendor-dependent) and translates them into vendor-independent representations of policies.
引用
收藏
页数:2
相关论文
共 50 条
  • [41] Unintended Consequential Effects of Overlapping Carbon Reduction Policies
    Ramasra, Raynier
    Nathwani, Jatin
    Electricity Journal, 2013, 26 (01): : 17 - 26
  • [42] Detecting the Detectable: Unintended Consequences of Cryptographic Election Verification
    Essex A.
    IEEE Security and Privacy, 2017, 15 (03): : 30 - 38
  • [43] Bigfoot: A Geo-based Visualization Methodology for Detecting BGP Threats
    Syamkumar, Meenakshi
    Durairajan, Ramakrishnan
    Barford, Paul
    2016 IEEE SYMPOSIUM ON VISUALIZATION FOR CYBER SECURITY (VIZSEC), 2016,
  • [44] Adaptive mechanism to solve BGP divergence resulted from policies conflict
    Department of Computer Science and Technology, Tsinghua University, Beijing 100084, China
    Ruan Jian Xue Bao, 2008, 6 (1465-1472):
  • [45] Detecting bogus BGP route information: Going beyond prefix hijacking
    Qiu, Jian
    Gao, Lixin
    Ranjan, Supranamaya
    Nucci, Antonio
    2007 THIRD INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS AND WORKSHOPS, 2007, : 381 - +
  • [46] Victims arrested for domestic violence: unintended consequences of arrest policies
    Hovmand, Peter S.
    Ford, David N.
    Flom, Ingrid
    Kyriakakis, Stavroula
    SYSTEM DYNAMICS REVIEW, 2009, 25 (03) : 161 - 181
  • [47] Detecting Unintended Memorization in Language-Model-Fused ASR
    Huang, W. Ronny
    Chien, Steve
    Thakkar, Om
    Mathews, Rajiv
    INTERSPEECH 2022, 2022, : 2808 - 2812
  • [48] Unintended environmental consequences of place-based economic policies
    Fan, Maoyong
    Tang, Qu
    Wu, Jianxin
    Xiao, Junji
    AMERICAN JOURNAL OF AGRICULTURAL ECONOMICS, 2023, 105 (01) : 291 - 315
  • [49] Unintended effects of accountability policies and the quality of assessment and evaluation formats
    Skedsmo, Guri
    Huber, Stephan Gerhard
    EDUCATIONAL ASSESSMENT EVALUATION AND ACCOUNTABILITY, 2020, 32 (04) : 427 - 429
  • [50] Unintended Consequences of Housing Policies: Evidence from South Korea
    Kim, Chunil
    Ko, Jinsoo
    SUSTAINABILITY, 2023, 15 (04)