On the impact of route monitor selection
- 24 October 2007
- conference paper
- Published by Association for Computing Machinery (ACM)
- p. 215-220
- https://doi.org/10.1145/1298306.1298336
Abstract
Several route monitoring systems have been set up to help understand the Internet routing system. They operate by gathering real-time BGP updates from different networks. Many studies have relied on such data sources by assuming reasonably good coverage and thus representative visibility into the Internet routing system. However, different deployment strategies of route monitors directly impact the accuracy and generality of conclusions. Our work is the first to critically examine the visibility constraints imposed by the deployment of route monitors on various applications. We study the difference due to diverse deployment schemes on three important classes of applications: (1) discovery of relatively stable Internet properties such as the AS topology and prefix to origin AS mappings, (2) discovery of dynamic routing behavior such as IP prefix hijack attacks and routing instability, and (3) inference of important network properties such as AS relationships and AS-level paths. We study several simple schemes of route monitor selection and provide insights on improving monitor placement.Keywords
This publication has 13 references indexed in Scilit:
- Accurate Real-time Identification of IP Prefix HijackingPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2007
- AS relationshipsACM SIGCOMM Computer Communication Review, 2007
- Building an AS-topology model that captures route diversityPublished by Association for Computing Machinery (ACM) ,2006
- On AS-level path inferencePublished by Association for Computing Machinery (ACM) ,2005
- Collecting the internet AS-level topologyACM SIGCOMM Computer Communication Review, 2005
- Locating internet routing instabilitiesPublished by Association for Computing Machinery (ACM) ,2004
- Towards capturing representative AS-level Internet topologiesComputer Networks, 2004
- Computing the types of the relationships between autonomous systemsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2004
- Characterizing the Internet hierarchy from multiple vantage pointsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- On the marginal utility of network topology measurementsPublished by Association for Computing Machinery (ACM) ,2001