A Strategy for Transitioning to BGP Security
|
|
|
- Melvin Chapman
- 10 years ago
- Views:
Transcription
1 NANOG 52 Denver, CO June 14, 2011 A Strategy for Transitioning to BGP Security Sharon Goldberg Boston University Phillipa Gill University of Toronto Michael Schapira Princeton University Princeton University This work supported by NSF Trustworthy computing grant S and a gift from Cisco.
2 Incentives for BGP Security What happens after we deploy RPKI? Are we done? NO! Many attacks on BGP even with RPKI (See my NANOG 49 talk) Also need path validation with S*BGP (e.g, BGPsec / sobgp) What are the incentives to deploy path validation? The pessimistic view: Why should I bother deploying S*BGP in my network? No security benefits until many other ASes deploy. Worse yet, I can t make money from it. Our view: Calm down. Things aren t so bad. You can use S*BGP to make money by attracting customers to your ISP.
3 Overview Goal of this work: We want to engineer the S*BGP deployment process so ISPs can make money after they deploy S*BGP. And we end up with global S*BGP deployment We present & evaluate guidelines for S*BGP deployment. Evaluate: model & simulation on [Cyclops UCLA] AS graph data This talk show results directly from our simulations Caveat: We do not predict how S*BGP deployment will go. Our goal is to understand key issues affecting deployment.
4 Talk Organization Background: BGP, attacks and defenses like RPKI & BGPsec A Strategy for S*BGP deployment Evaluating our strategy 1. Model 2. Simulation results on [UCLA Cyclops] AS graph data Conclusions and recommendations
5 Traffic Attraction & Interception Attacks An interesting incident from April 8, 2010 ChinaTel path is shorter ChinaTel /24 China Telecom? ISP 1 Level3, VZW, /24 Level 3 VZW, /24 Verizon Wireless This prefix and 50K others were announced by the faulty China Telecom router (Also VZW) * Next 3 slides based on empirical data, see slide 50 for details on data sources /24
6 Traffic Attraction & Interception Attacks An interesting incident from April 8, 2010 ChinaTel path is shorter ChinaTel /24 China Telecom? ISP 1 Level3, VZW, /24 Level 3 VZW, /24 Verizon Wireless This prefix and 50K others were announced by the faulty China Telecom router (Also VZW) /24
7 Traffic Attraction & Interception Attacks An interesting incident from April 8, 2010 ChinaTel path is shorter ChinaTel /24 China Telecom? ISP 1 Level3, VZW, /24 Level 3 VZW, /24 Verizon Wireless This prefix and 50K others were announced by the faulty China Telecom router Traffic for some prefixes was possibly intercepted (Also VZW) /24
8 S*BGP (e.g., BGPsec) can stop this attack BGPsec: RPKI + Cannot announce a path that was not announced to you. ISP 1 Level 3 China Telecom VZW: (22394, Prefix) Level3: (VZW, 22394, Prefix) VZW: (22394, Prefix) Verizon Wireless Public Key Signature: Anyone with s public key can validate that the message was sent by Prefix
9 S*BGP (e.g., BGPsec) can stop this attack BGPsec: RPKI + Cannot announce a path that was not announced to you. VZW: (22394, Prefix) ISP 1 Level3: (VZW, 22394, Prefix) ISP 1: (Level3, VZW, 22394, Prefix) Level 3 China Telecom VZW: (22394, Prefix) Level3: (VZW, 22394, Prefix) VZW: (22394, Prefix) Verizon Wireless Public Key Signature: Anyone with s public key can validate that the message was sent by Prefix
10 But what happens in partial deployment? VZW: (22394, Prefix) ChinaTel, Prefix China Telecom ISP 1 Level3: (VZW, 22394, Prefix) ISP 1: (Level3, VZW, 22394, Prefix) Level 3 Verizon Wireless A malicious router can still attack if ISP1 doesn t incorporate security in his routing policies! Prefix
11 But what happens in partial deployment? China Telecom path is shorter VZW: (22394, Prefix) RPKI shows valid origin.? Level3: (VZW, 22394, Prefix) ChinaTel, ISP 1: (Level3, VZW, 22394, Prefix) Prefix ISP 1 Level 3 China Telecom Verizon Wireless A malicious router can still attack if ISP1 doesn t incorporate security in his routing policies! Prefix
12 Bottom Line: It s not enough just to sign & validate! If we want security, S*BGP must also impact BGP routing policy.
13 Key idea: S*BGP impacts routing & revenue (1) Ideally (security geek): Routing Policy: 1. Prefer secure routes 2. Local Pref 3. AS path Arbitrary tiebreaks I know you don t like changing routing policies this much, so instead we assumed: Routing Policy: 1. Local Pref 2. AS path Prefer secure routes 5. Arbitrary tiebreaks i.e., Secure ISPs at least break ties in favor of secure routes.
14 Talk Organization Background: BGP, attacks and defenses like RPKI & BGPsec A Strategy for S*BGP deployment Evaluating our strategy 1. Model 2. Simulation results on [UCLA Cyclops] AS graph data Conclusions and recommendations
15 Let s switch gears. Instead of security, let s start thinking about economics.
16 AS-level Business Relationships A simple model of AS-level business relationships. provider 8359 Sprint $ customer 18608
17 AS-level Business Relationships A simple model of AS-level business relationships Sprint $ $ 18608
18 AS-level Business Relationships A simple model of AS-level business relationships Sprint peer peer $ $ 18608
19 Stubs vs ISPs: Stubs are 85% of the Internet s ASes! A stub is an AS with no customers. Stubs shouldn t transit traffic. They only originate their own prefixes. ISP 8359 ISP Sprint ISP $ $ Stub X Loses $$! 85% of ASes are stubs! We call the rest (15%) ISPs.
20 How to drive S*BGP deployment: An ISP attracts more customer traffic = It earns more revenue
21 Key idea: S*BGP impacts routing & thus revenue (1) Assume: Secure ISPs at least break ties in favor of secure paths , Sprint 13789, $ $ ISPs can use S*BGP to attract customer traffic & thus money
22 Key idea: S*BGP impacts routing & thus revenue (1) Assume: Secure ISPs at least break ties in favor of secure paths 8359, , Sprint ISP 8359 wins the tiebreak & gets more customer traffic and thus more revenue $ $ ISPs can use S*BGP to attract customer traffic & thus money
23 Key idea: S*BGP impacts routing & thus revenue (2) Assume: Secure ISPs at least break ties in favor of secure paths 13789: (18608) , Sprint Sprint: (13789, 18608) $ $ : (18608) ISPs can use S*BGP to attract customer traffic & thus money
24 Key idea: S*BGP impacts routing & thus revenue (2) Assume: Secure ISPs at least break ties in favor of secure paths 13789: (18608) , Sprint Sprint: (13789, 18608) ISP 8359 loses tiebreak b/c his route is insecure, loses customer traffic, & feels pressure to deploy S*BGP. $ $ ISPs can use S*BGP to attract customer traffic & thus money
25 Our Main Result: A Strategy for Deploying S*BGP 1. Secure ISPs at least break ties in favor of secure paths 2. A few early adopters initially deploy S*BGP (gov t incentives, regulations, security concerns, etc.) (A least 5 of the biggest Tier 1s) 3. ISPs deploy simplex S*BGP in their stub customers ISP Bank of A Boston U Stub with Simplex S*BGP: Need only sign; trusts provider to validate. Minor security impact No hardware upgrade! (Gov ts should subsidize ISPs that do this.) Crucial, since 85% of ASes are stubs!
26 Talk Organization Background: BGP, attacks and defenses like RPKI & BGPsec A Strategy for S*BGP deployment Evaluating our strategy 1. Model 2. Simulation results on [UCLA Cyclops] AS graph data Conclusions and recommendations
27 A model of the S*BGP deployment process To start the process: Early adopter ASes become secure Their stub customers become secure (e.g. simplex S*BGP) Each round: ISP n Compute customer traffic volume for every insecure ISP If ISP nits s customer traffic can increase by more than θ% when it deploys S*BGP, Then ISP n decides to secure itself & all its stub customers Stop when no new ISPs decide to become secure.
28 How do we compute customer traffic volume? $ ISP n Number of source ASes routing through ISP nn to all customer destinations. $ To determine routing, we run simulations on the [UCLA Cyclops] AS graph with these routing policies: BGP Routing Policy Model: 1. Prefer customer paths over peer paths over provider paths 2. Prefer shorter paths 3. If secure, prefer secure paths. 4. Arbitrary tiebreak
29 Talk Organization Background: BGP, attacks and defenses like RPKI & BGPsec A Strategy for S*BGP deployment Evaluating our strategy 1. Model 2. Simulation results on [UCLA Cyclops] data Conclusions and recommendations
30 Simulation: Deployment Case Study Ten early adopters: Five Tier 1s: Sprint (AS 1239) Verizon (AS 701) AT&T (AS 7018) Level 3 (AS 3356) Cogent (AS 174) Five Content Providers: Google (AS 15169) Microsoft (AS 8075) Facebook (AS 32934) Akamai (AS 22822) Limelight (AS 20940) The five content providers source 10% of all Internet traffic All nodes have the same threshold θ = 5%. This leads to 85% of ASes deploying S*BGP (65% of ISPs)
31 Bottom Line: It works. Let s see why with an excerpt from our simulations.
32 Simulation: Market pressure drives deployment (1) Sprint Round Stub Notice that Sprint is offered two equally good (customer, 2 hop) paths to stub AS The tiebreak algorithm prefers AS AS8359 is happy because he gets revenue from traffic from Sprint to AS18608.
33 Simulation: Market pressure drives deployment (1) Sprint Round Stub
34 Simulation: Market pressure drives deployment (1) Sprint Round Stub Now, AS deploys S*BGP in himself and his stub to draw traffic away from AS (This is only a fraction of the traffic AS steals from competitors; for clarity we only show a small subgraph where he steals traffic here. Remember we compute traffic flow to ALL 36K ASes in the Internet, so AS13879 could have stolen traffic to many stubs. )
35 Simulation: Market pressure drives deployment (1) Sprint Round Stub Now, AS 8359 deploys S*BGP to get back the traffic he lost to AS13789!
36 Simulation: Market pressure drives deployment (2) Sprint Round Now let s look at the path to stub AS Stub Sprint has two equally good paths to this stub, but the tiebreak algorithm prefers AS Stub 30733
37 Simulation: Market pressure drives deployment (2) Sprint Round Stub Stub
38 Simulation: Market pressure drives deployment (2) Sprint Round Stub Stub
39 Simulation: Market pressure drives deployment (2) Sprint Round Stub Now AS 6731 deploys S*BGP in himself and his stub to draw the traffic from Sprint! Notice Sprint now has a secure path to stub because AS 8359 deployed in the previous round Stub
40 Simulation: Market pressure drives deployment (3) Sprint Round Stub Stub Stub Sprint has 2 equally good paths to stub `
41 Simulation: Market pressure drives deployment (3) Sprint Round Stub Stub Stub
42 Simulation: Market pressure drives deployment (3) Sprint Round Stub Stub Stub ISP deploys S*BGP in himself and his stub to get Sprint s traffic.
43 Changes in traffic volume during deployment (1) Sprint Let s zoom in on the traffic volume at each of these three ISPs
44 Changes in traffic volume during deployment (2) AS 8359 AS 6731 AS 8342 current utility/utility at start Change in traffic volume round round
45 Changes in traffic volume during deployment (3) current utility/utility at start Change in traffic volume AS 8359 AS 6731 AS 8342 ISPs that deploy see initial gains But return to approx. the original value round round ISPs that do not deploy cannot gain traffic
46 Who should the early adopters be? At minimum, we need the 5 biggest Tier 1s. Content providers help, but not as much, (since they don t have many stub customers) We ran lots of simulations to figure this out. See our tech report.
47 % of Secure ASes So who should the early adopters be? θ=5% 5 Content Providers 5 Biggest Tier 1s 5 T1s + 5 CPs 10 Biggest Tier 1s 100 Biggest ISPs θ=10% In ISPs are willing to re-invest θ% of new revenue from increases in attracted traffic in S*BGP, then only a few early adopters are enough to drive (almost) global deployment.
48 Observations and Recommendations To improve security, S*BGP should impact route selection 1. Thus it has an impact on traffic engineering. 2. But it s also an opportunity to offer differentiated services and attract customers away from your competitors so that deployment at your ISP pays for itself. Where should gov t funding and regulation go? 1. Subsidize early adopters: Tier 1s / content providers 2. Subsidize ISPs that upgrade stubs to simplex S*BGP Crucial since 85% of ASes are stubs ISPs, it s really important you involve your customers. This work is not predictive! Instead, our goal was to capture key issues affecting deployment.
49 Thanks! This work will also appear at SIGCOMM 11 Detailed results are in our tech report: Also, download our interactive results browser console app at the above url & browse our full simulation results.
50 Data Sources for ChinaTel Incident of April 2010 Example topology derived from Routeviews messages observed at the LINX Routeviews monitor on April BGP announcements & topology was simplified to remove prepending We anonymized the large ISP in the Figure. Actual announcements at the large ISP were: From faulty ChinaTel router: for /24 From Level 3: for /24 Traffic interception was observed by Renesys blog We don t have data on the exact prefixes for which this happened. AS relationships: inferred by UCLA Cyclops
51 85% of the Internet s ASes are stubs. A stub never transits traffic! Thus, it only sends BGP messages for its own prefixes, and for paths that are exactly 0 hops long. $ $ Stub Loses X $$! 2 options for deploying S*BGP in stubs: 1. Have providers sign for stub customers. (Stubs do nothing) 2. Stubs run simplex S*BGP. (Stub only signs, provider validates) 1. No hardware upgrade required Sign for ~1 prefix, not ~300K prefixes Use ~1 private key, not ~36K public keys 2. Security impact is minor (we evaluated this): Stub vulnerable to attacks by its direct provider.
52 Tiebreak Sets: The Source of Competition (1) Sprint Sprint s tiebreak set to destination AS18608 is {AS 13789, AS 8357} Thus, these two ISPs compete for traffic!
53 Tiebreak Sets: The Source of Competition (2) P[X=x] 1e 07 1e 05 1e 03 1e 01 80% of tiebreak sets have only 1 path! ISP ISP ISP stub stub ISP stub stub tie break set size
54 Tiebreak Sets: The Source of Competition (3) P[X=x] 1e 07 1e 05 1e 03 1e 01 80% of tiebreak sets have only 1 path! ISP ISP ISP stub stub ISP stub stub 1. Average tiebreak set size is tiny = 1.18! 2. We also get ~same results (not shown) if only ISPs break ties on secure paths (i.e., 15% of ASes) Global deployment even if 96% of routing decisions are unaffected by security tie break set size
55 So who should be the early adopters? fraction of ASes that deploy S*BGP Small target set suffices for small threshold top 200 top 100 top 10 5 CP+top 5 top random 5 CP none Higher threshold requires a larger target set θ
56 Simplex S*BGP vs. Market-pressure fraction of ISPs that deploy S*BGP Market pressure top 200 top 100 top 10 5 CP+top 5 top random 5 CP none Few ISPs on. Most adoption via Simplex S*BGP Turning on just the content providers doesn t do much! θ
BGP Prefix Hijack: An Empirical Investigation of a Theoretical Effect Masters Project
BGP Prefix Hijack: An Empirical Investigation of a Theoretical Effect Masters Project Advisor: Sharon Goldberg Adam Udi 1 Introduction Interdomain routing, the primary method of communication on the internet,
Characterizing Large-scale Routing Anomalies: A Case Study of the China Telecom Incident
Characterizing Large-scale Routing Anomalies: A Case Study of the China Telecom Incident Rahul Hiran 1, Niklas Carlsson 1, and Phillipa Gill 2 1 Linköping University, Sweden 2 Citizen Lab, Munk School
Exterior Gateway Protocols (BGP)
Exterior Gateway Protocols (BGP) Internet Structure Large ISP Large ISP Stub Dial-Up ISP Small ISP Stub Stub Stub Autonomous Systems (AS) Internet is not a single network! The Internet is a collection
How Secure are Secure Interdomain Routing Protocols?
How Secure are Secure Interdomain Routing Protocols?. Full version from February 23, 2 Sharon Goldberg Microsoft Research Michael Schapira Yale & UC Berkeley Peter Hummon Princeton Jennifer Rexford Princeton
Outline. EE 122: Interdomain Routing Protocol (BGP) BGP Routing. Internet is more complicated... Ion Stoica TAs: Junda Liu, DK Moon, David Zats
Outline EE 22: Interdomain Routing Protocol (BGP) Ion Stoica TAs: Junda Liu, DK Moon, David Zats http://inst.eecs.berkeley.edu/~ee22/fa9 (Materials with thanks to Vern Paxson, Jennifer Rexford, and colleagues
BREAKING HTTPS WITH BGP HIJACKING. Artyom Gavrichenkov R&D Team Lead, Qrator Labs [email protected]
BREAKING HTTPS WITH BGP HIJACKING Artyom Gavrichenkov R&D Team Lead, Qrator Labs [email protected] ABSTRACT OVERVIEW OF BGP HIJACKING GLOBAL AND LOCAL HIJACKING HIJACKING A CERTIFICATE AUTHORITY MITIGATIONS
Inter-domain Routing
Inter-domain Routing The structure of Internet Qinsi Wang Computer Science Department, Carnegie Mellon September 15, 2010 Outline Lecture 4: Interdomain Routing; L. Gao, On inferring autonomous system
DD2491 p1 2008. Load balancing BGP. Johan Nicklasson KTHNOC/NADA
DD2491 p1 2008 Load balancing BGP Johan Nicklasson KTHNOC/NADA Dual home When do you need to be dual homed? How should you be dual homed? Same provider. Different providers. What do you need to have in
Towards a Next- Generation Inter-domain Routing Protocol. L. Subramanian, M. Caesar, C.T. Ee, M. Handley, Z. Mao, S. Shenker, and I.
Towards a Next- Generation Inter-domain Routing Protocol L. Subramanian, M. Caesar, C.T. Ee, M. Handley, Z. Mao, S. Shenker, and I. Stoica Routing 1999 Internet Map Coloured by ISP Source: Bill Cheswick,
BGP1 Multihoming and Traffic Engineering
83950 Telecommunications Laboratory Course BGP1 BGP1 Multihoming and Traffic Engineering date & time student # name 1 2 bgp-tyo.tex,v 1.11 2005/04/18 14:09:14 ams Exp 1/17 Part I Home Assignment 1 General
LINX History. ISP Workshops
LINX History ISP Workshops Background p Slide set based on experiences of one founding participant of LINX p Covers history of LINX during the 90s n More recent history covered well on the LINX website
Multihoming and Multi-path Routing. CS 7260 Nick Feamster January 29. 2007
Multihoming and Multi-path Routing CS 7260 Nick Feamster January 29. 2007 Today s Topic IP-Based Multihoming What is it? What problem is it solving? (Why multihome?) How is it implemented today (in IP)?
Outline. Outline. Outline
Network Forensics: Network Prefix Scott Hand September 30 th, 2011 1 What is network forensics? 2 What areas will we focus on today? Basics Some Techniques What is it? OS fingerprinting aims to gather
Border Gateway Protocol (BGP)
Border Gateway Protocol (BGP) Petr Grygárek rek 1 Role of Autonomous Systems on the Internet 2 Autonomous systems Not possible to maintain complete Internet topology information on all routers big database,
Network Security. Mobin Javed. October 5, 2011
Network Security Mobin Javed October 5, 2011 In this class, we mainly had discussion on threat models w.r.t the class reading, BGP security and defenses against TCP connection hijacking attacks. 1 Takeaways
Effect of anycast on K-root
Effect of anycast on K-root Some early results 1 K root anycast deployment 3 global nodes (BGP transit) LINX... 5459 25152 25152 i AMS-IX... 25152 25152 25152 i Tokyo (since 5/2005)... 25152 25152 25152
How To Understand The Power Of Icdn
MobiArch 2014 R-iCDN: an Approach Supporting Flexible Content Routing for ISP-operated CDN Song Ci High Performance Network Lab, Institute of Acoustics, Chinese Academy of Sciences Outline I. Background
The Benefits. Locator/ID Separation
INL: IP Networking Lab Université Catholique de Louvain The Benefits of Locator/ID Separation AGAVE: A lightweight Approach for Viable End-to-end IP-based QoS Services Joint Work: L. Iannone, O.Bonaventure,
BGP route monitoring. Mar, 25, 2008 Matsuzaki maz Yoshinobu <[email protected]>, <[email protected]>
BGP route monitoring Mar, 25, 2008 Matsuzaki maz Yoshinobu , 1 abstract BGP prefix hijack is a serious security issue in the internet, and these events have been widely
Week 4 / Paper 1. Open issues in Interdomain Routing: a survey
Week 4 / Paper 1 Open issues in Interdomain Routing: a survey Marcelo Yannuzzi, Xavier Masip-Bruin, Olivier Bonaventure IEEE Network, Nov.-Dec. 2005, vol. 19, no. 6, pp. 49 56 Main point There are many
Policy-Based AS Path Verification with Enhanced Comparison Algorithm to Prevent 1-Hop AS Path Hijacking in Real Time
, pp.11-22 http://dx.doi.org/10.14257/ijmue.2016.11.1.02 Policy-Based AS Path Verification with Enhanced Comparison Algorithm to Prevent 1-Hop AS Path Hijacking in Real Time Je-Kuk Yun 1 and Jin-Hee Song
Bloom Filter based Inter-domain Name Resolution: A Feasibility Study
Bloom Filter based Inter-domain Name Resolution: A Feasibility Study Konstantinos V. Katsaros, Wei Koong Chai and George Pavlou University College London, UK Outline Inter-domain name resolution in ICN
Distributed Systems. 23. Content Delivery Networks (CDN) Paul Krzyzanowski. Rutgers University. Fall 2015
Distributed Systems 23. Content Delivery Networks (CDN) Paul Krzyzanowski Rutgers University Fall 2015 November 17, 2015 2014-2015 Paul Krzyzanowski 1 Motivation Serving web content from one location presents
Peering in General and in Europe. Frank Orlowski DE-CIX Internet Exchange
Peering in General and in Europe Frank Orlowski DE-CIX Internet Exchange myself Currently I work for the DE-CIX Internet Exchange in Frankfurt/Germany. Before that I was a Peering Manager at Deutsche Telekom
Good VoIP vs. Bad VoIP
Good VoIP vs. Bad VoIP The term Voice over IP, or VoIP has been thrown around in a lot of different cirlces around the telecom industry. There seems to be growing confusion about what it is, whether or
Lecture 18: Border Gateway Protocol"
Lecture 18: Border Gateway Protocol" CSE 123: Computer Networks Alex C. Snoeren HW 3 due Wednesday! Some figures courtesy Mike Freedman Lecture 18 Overview" Path-vector Routing Allows scalable, informed
Computing, Python and Robots Net Neutrality
Department of Computer Science University of San Francisco p. 1/? Computing, Python and Robots Net Neutrality Chris Brooks Department of Computer Science University of San Francisco Department of Computer
co Characterizing and Tracing Packet Floods Using Cisco R
co Characterizing and Tracing Packet Floods Using Cisco R Table of Contents Characterizing and Tracing Packet Floods Using Cisco Routers...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1
Static IP Routing and Aggregation Exercises
Politecnico di Torino Static IP Routing and Aggregation xercises Fulvio Risso August 0, 0 Contents I. Methodology 4. Static routing and routes aggregation 5.. Main concepts........................................
The Joint Degree Distribution as a Definitive Metric of the Internet AS-level Topologies
The Joint Degree Distribution as a Definitive Metric of the Internet AS-level Topologies Priya Mahadevan, Dimitri Krioukov, Marina Fomenkov, Brad Huffaker, Xenofontas Dimitropoulos, kc claffy, Amin Vahdat
Bell Aliant. Business Internet Border Gateway Protocol Policy and Features Guidelines
Bell Aliant Business Internet Border Gateway Protocol Policy and Features Guidelines Effective 05/30/2006, Updated 1/30/2015 BGP Policy and Features Guidelines 1 Bell Aliant BGP Features Bell Aliant offers
Doing Don ts: Modifying BGP Attributes within an Autonomous System
Doing Don ts: Modifying BGP Attributes within an Autonomous System Luca Cittadini, Stefano Vissicchio, Giuseppe Di Battista Università degli Studi RomaTre IEEE/IFIP Network Operations and Management Symposium
BGP and Traffic Engineering with Akamai. Caglar Dabanoglu Akamai Technologies AfPIF 2015, Maputo, August 25th
BGP and Traffic Engineering with Akamai Caglar Dabanoglu Akamai Technologies AfPIF 2015, Maputo, August 25th AGENDA Akamai Intelligent Platform Peering with Akamai Traffic Engineering Summary Q&A The Akamai
How More Specifics increase your transit bill (and ways to avoid it)
How More Specifics increase your transit bill (and ways to avoid it) Your Speaker Today... Fredy Künzler CTO & Founder kuenzler at init7.net www.init7.net www.blogg.ch www.bgp-and-beyond.com AS13030 Twitter:
Effective BGP Load Balancing Using "The Metric System" A real-world guide to BGP traffic engineering
Effective BGP Load Balancing Using "The Metric System" A real-world guide to BGP traffic engineering NANOG45 January 26, 2009 Dani Roisman droisman ~ at ~ peakwebconsulting.com Introductions Slide 1 Why
Distributed Systems. 25. Content Delivery Networks (CDN) 2014 Paul Krzyzanowski. Rutgers University. Fall 2014
Distributed Systems 25. Content Delivery Networks (CDN) Paul Krzyzanowski Rutgers University Fall 2014 November 16, 2014 2014 Paul Krzyzanowski 1 Motivation Serving web content from one location presents
The RouteNormalizer and Network Routing Anomalification
A Firewall for Routers: Protecting Against Routing Misbehavior Ying Zhang Z. Morley Mao Jia Wang University of Michigan AT&T Labs Research Abstract In this work, we present the novel idea of route normalization
Interdomain Routing. Outline
Interdomain Routing David Andersen 15-744 Spring 2007 Carnegie Mellon University Outline What does the Internet look like? Relationships between providers Enforced by: Export filters and import ranking
Inter-domain Routing. Outline. Border Gateway Protocol
Inter-domain Routing Outline Border Gateway Protocol Internet Structure Original idea Backbone service provider Consumer ISP Large corporation Consumer ISP Small corporation Consumer ISP Consumer ISP Small
E6998-02: Internet Routing
E6998-02: Internet Routing Lecture 13 Border Gateway Protocol, Part II John Ioannidis AT&T Labs Research [email protected] Copyright 2002 by John Ioannidis. All Rights Reserved. Announcements Lectures
Pretty Good BGP: Improving BGP by Cautiously Adopting Routes
Pretty Good BGP: Improving BGP by Cautiously Adopting Routes Josh Karlin University of New Mexico [email protected] Stephanie Forrest University of New Mexico Santa Fe Institute [email protected] Jennifer
Effective BGP Load Balancing Using "The Metric System" A real-world guide to BGP traffic engineering
Effective BGP Load Balancing Using "The Metric System" A real-world guide to BGP traffic engineering NANOG46 June 14, 2009 Dani Roisman droisman ~ at ~ peakwebconsulting ~ dot ~ com Introductions Slide
The Coremelt Attack. Ahren Studer and Adrian Perrig. We ve Come to Rely on the Internet
The Coremelt Attack Ahren Studer and Adrian Perrig 1 We ve Come to Rely on the Internet Critical for businesses Up to date market information for trading Access to online stores One minute down time =
How To Make A Network Plan Based On Bg, Qos, And Autonomous System (As)
Policy Based QoS support using BGP Routing Priyadarsi Nanda and Andrew James Simmonds Department of Computer Systems Faculty of Information Technology University of Technology, Sydney Broadway, NSW Australia
Improving Rou-ng Security with RPKI
Improving Rou-ng Security with RPKI Russ Clark [email protected] Samuel Norris [email protected] Cas D Angelo, Sco7 Friedrich Ron Hutchins, Aurore Nguenang Thank you to the Na-onal Science Founda-on
How To Make A Route Map On Bpg More Efficient
NIRA: A New Inter-Domain Routing Architecture Xiaowei Yang, David Clark, Arthur W. Berger Rachit Agarwal (Results are by others, any errors are by me) ( Animated slides shamelessly stolen from Prasad s
Measurement Study on the Internet reachability. 3.1 Introduction. 3. Internet Backbone
3. Measurement Study on the Internet reachability Internet reachability can be assessed using control-plane and data-plane measurements. However, there are biases in the results of these two measurement
ATLAS Internet Observatory 2009 Annual Report
ATLAS Internet Observatory 2009 Annual Report C. Labovitz, S. Iekel-Johnson, D. McPherson Arbor Networks, Inc. J. Oberheide, F. Jahanian University of Michigan M. Karir Merit Network, Inc. ATLAS Internet
Network Level Multihoming and BGP Challenges
Network Level Multihoming and BGP Challenges Li Jia Helsinki University of Technology [email protected] Abstract Multihoming has been traditionally employed by enterprises and ISPs to improve network connectivity.
BGP FORGOTTEN BUT USEFUL FEATURES. Piotr Wojciechowski (CCIE #25543)
BGP FORGOTTEN BUT USEFUL FEATURES Piotr Wojciechowski (CCIE #25543) ABOUT ME Senior Network Engineer MSO at VeriFone Inc. Previously Network Solutions Architect at one of top polish IT integrators CCIE
Approaches for DDoS an ISP Perspective. [email protected] [email protected]
Approaches for DDoS an ISP Perspective [email protected] [email protected] Home School How everyone starts It s all up to you It s inexpensive (compared to other forms of education) Quality may not
Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering
Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls
BGP and Traffic Engineering with Akamai. Christian Kaufmann Akamai Technologies MENOG 14
BGP and Traffic Engineering with Akamai Christian Kaufmann Akamai Technologies MENOG 14 The Akamai Intelligent Platform The world s largest on-demand, distributed computing platform delivers all forms
White Paper. Cisco MPLS based VPNs: Equivalent to the security of Frame Relay and ATM. March 30, 2001
The leading edge in networking information White Paper Cisco MPLS based VPNs: Equivalent to the security of Frame Relay and ATM March 30, 2001 Abstract: The purpose of this white paper is to present discussion
Conference Controller Deployment Guide
Conference Controller Deployment Guide BES 5.0/May 2014 Page 2 of 7 1. Introduction This document outlines the processes for wirelessly deploying the LoopUp Conference Controller for BlackBerry to users
Software Defined Networking What is it, how does it work, and what is it good for?
Software Defined Networking What is it, how does it work, and what is it good for? slides stolen from Jennifer Rexford, Nick McKeown, Michael Schapira, Scott Shenker, Teemu Koponen, Yotam Harchol and David
ATLAS Internet Observatory Bandwidth Bandwagon: An ISOC Briefing Panel November 11, 2009, Hiroshima, Japan
ATLAS Internet Observatory Bandwidth Bandwagon: An ISOC Briefing Panel November 11, 2009, Hiroshima, Japan Danny McPherson [email protected] Chief Security Officer ATLAS Observatory Details ISP / Content
Rigorous Performance Testing on the Web. Grant Ellis Senior Performance Architect, Instart Logic
Rigorous Performance Testing on the Web Grant Ellis Senior Performance Architect, Instart Logic Who is Instart Logic? Software company focused on Application Delivery We work with globally known brands
Customized BGP Route Selection Using BGP/MPLS VPNs
Customized BGP Route Selection Using BGP/MPLS VPNs Laurent Vanbever Université catholique de Louvain, BE!"#$%&'()"&*%+%$,#-./#+"0&(*% Pierre Francois (UCLouvain, BE), Olivier Bonaventure (UCLouvain, BE)
Design and Experiments of small DDoS Defense System using Traffic Deflecting in Autonomous System
Design and Experiments of small DDoS Defense System using Traffic Deflecting in Autonomous System Ho-Seok Kang and Sung-Ryul Kim Konkuk University Seoul, Republic of Korea [email protected] and [email protected]
Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs
Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs As a head of the campus network department in the Deanship of Information Technology at King Abdulaziz University for more
CSC458 Lecture 6. Homework #1 Grades. Inter-domain Routing IP Addressing. Administrivia. Midterm will Cover Following Topics
CSC458 Lecture 6 Inter-domain Routing IP Addressing Stefan Saroiu http://www.cs.toronto.edu/syslab/courses/csc458 University of Toronto at Mississauga Homework #1 Grades Fraction of Students 100 80 60
Distributed Systems 19. Content Delivery Networks (CDN) Paul Krzyzanowski [email protected]
Distributed Systems 19. Content Delivery Networks (CDN) Paul Krzyzanowski [email protected] 1 Motivation Serving web content from one location presents problems Scalability Reliability Performance Flash
PORTOLAN. Probing the Internet through Smartphone-based Crowdsourcing
PORTOLAN Probing the Internet through Smartphone-based Crowdsourcing Adriano Faggiani, Enrico Gregori, Alessandro Improta, Luciano Lenzini, Valerio Luconi, Alessio Vecchio RIPE 67 Athens 14-18 October
How to Use Windows Firewall With User Account Control (UAC)
Keeping Windows 8.1 safe and secure 14 IN THIS CHAPTER, YOU WILL LEARN HOW TO Work with the User Account Control. Use Windows Firewall. Use Windows Defender. Enhance the security of your passwords. Security
State of Texas. TEX-AN Next Generation. NNI Plan
State of Texas TEX-AN Next Generation NNI Plan Table of Contents 1. INTRODUCTION... 1 1.1. Purpose... 1 2. NNI APPROACH... 2 2.1. Proposed Interconnection Capacity... 2 2.2. Collocation Equipment Requirements...
Integrating Network. Management for Cloud
Integrating Network Management for Cloud Computing Services Final Public Oral Exam Peng Sun What is Cloud Computing Deliver applications as services over Internet Run applications in datacenters Lower
BGP Security The Human Threat
BGP Security The Human Threat RIPE / Amsterdam 2011.05.02 Randy Bush 2011.05.02 The Human Threat 1 Assume RPKI Cert/IANA CA 98.128.0.0/16 SIA Cert/RIPE CA CA CA Cert/ARIN Cert/APNIC 98.128.0.0/20
Network-Wide Class of Service (CoS) Management with Route Analytics. Integrated Traffic and Routing Visibility for Effective CoS Delivery
Network-Wide Class of Service (CoS) Management with Route Analytics Integrated Traffic and Routing Visibility for Effective CoS Delivery E x e c u t i v e S u m m a r y Enterprise IT and service providers
APNIC elearning: BGP Attributes
APNIC elearning: BGP Attributes Contact: [email protected] erou04_v1.0 Overview BGP Attributes Well-known and Optional Attributes AS Path AS Loop Detection ibgp and ebgp Next Hop Next Hop Best Practice
Moving to the Cloud? DIY VS. MANAGED HOSTING
Moving to the Cloud? DIY VS. MANAGED HOSTING 12 Factors To Consider And Why You Should Be Looking for a Managed Hosting Provider For Your Site or Application as You Move to the Cloud Your site or application
ETHEL THE AARDVARK GOES BGP ROUTING
Fable Of Contents ISP TECH TALK by Avi Freedman ETHEL THE AARDVARK GOES BGP ROUTING In this exciting column we'll actually walk through configuring a Cisco router for BGP. It's very important, however,
How To Understand The Power Of The Internet
DATA COMMUNICATOIN NETWORKING Instructor: Ouldooz Baghban Karimi Course Book: Computer Networking, A Top-Down Approach, Kurose, Ross Slides: - Course book Slides - Slides from Princeton University COS461
