Back to Search Start Over

Predicting catastrophic BGP routing instabilities

Authors :
Nguyen, Lien K.
Xie, Geoffrey
Fulp, J. D.
Naval Postgraduate School (U.S.).
Department of Computer Science
Publication Year :
2004
Publisher :
Monterey, California. Naval Postgraduate School, 2004.

Abstract

Inter-domain routing connects individual pieces of Internet topology, creating an integral, global data delivery infrastructure. Currently, this critical function is performed by the Border Gateway Protocol (BGP) version 4 [RFC1771]. Like all routing protocols, BGP is vulnerable to instabilities that reduce its effectiveness. Among the causes of these instabilities are those which are maliciously induced. Although there are other causes, e.g., natural events and network anomalies, this thesis will focus exclusively on maliciously induced instabilities. Most current models that attempt to predict a BGP routing instability confine their focus to either macro- or micro-level metrics, but not to both. The inherent limitations of each of these forms of metric gives rise to an excessive rate of spurious alerts, both false positives and false negatives. It is the original intent of this thesis to develop an improved BGP instability prediction model by statistically combining BGP instability metrics with user level performance metrics. The motivation for such a model is twofold. 1) To provide sufficient prior warning of impending failure to facilitate proactive protection measures. 2) To improve warning reliability beyond existing models, by demonstrably reducing both false positives and false negatives. However, our analysis of actual network trace data shows that a widely used BGP instability metric, the total number of update messages received in a time period, is not a good indicator of future user level performance. http://archive.org/details/predictingcatast109451642 Civilian, Department of Defense Approved for public release; distribution is unlimited.

Details

ISSN :
10945164
Database :
OpenAIRE
Accession number :
edsair.od......2778..e85e7ad6ba04e99b12e04b11a13883d0