BGPRV: A Library for Fast and Efficient Routing Data Manipulation

Similar documents
Embedded BGP Routing Monitoring. Th. Lévy O. Marcé

A Case Study Design of Border Gateway Routing Protocol Using Simulation Technologies

Border Gateway Protocol BGP4 (2)

Bell Aliant. Business Internet Border Gateway Protocol Policy and Features Guidelines

Inter-domain Routing Basics. Border Gateway Protocol. Inter-domain Routing Basics. Inter-domain Routing Basics. Exterior routing protocols created to:

Towards a virtualized Internet for computer networking assignments

BGP Routing Stability of Popular Destinations

JUNOS Secure BGP Template

Outline. Outline. Outline

Doing Don ts: Modifying BGP Attributes within an Autonomous System

Microsoft Windows PowerShell v2 For Administrators

Understanding Route Aggregation in BGP

Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches

Enhancing Network Monitoring with Route Analytics

MPLS WAN Explorer. Enterprise Network Management Visibility through the MPLS VPN Cloud

DDL Systems, Inc. ACO MONITOR : Managing your IBM i (or AS/400) using wireless devices. Technical White Paper. April 2014

Lecture 18: Border Gateway Protocol"

TEST AUTOMATION FRAMEWORK

Opnet Based simulation for route redistribution in EIGRP, BGP and OSPF network protocols

Pretty Good BGP: Improving BGP by Cautiously Adopting Routes

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

How to Configure BGP Tech Note

Introduction to Routing

Detecting BGP hijacks in 2014

Real-Time Analysis of CDN in an Academic Institute: A Simulation Study

BGP FORGOTTEN BUT USEFUL FEATURES. Piotr Wojciechowski (CCIE #25543)

Firewall Builder Architecture Overview

ASM Educational Center (ASM) Est. 1992

SOFTWARE DEFINED NETWORKS REALITY CHECK. DENOG5, Darmstadt, 14/11/2013 Carsten Michel

Managing BGP Routes with a BGP Session Multiplexer

CSCI-1680 So ware-defined Networking

INCIDENT RESPONSE & COMPUTER FORENSICS, SECOND EDITION

SDX Project Updates GEC 20

Internet infrastructure. Prof. dr. ir. André Mariën

The RouteNormalizer and Network Routing Anomalification

IMPLEMENTING CISCO IP ROUTING V2.0 (ROUTE)

Troubleshooting and Maintaining Cisco IP Networks Volume 1

Supporting Large-scale Deployments through Virtual Directory Technology. A White Paper by Phil Hunt Director, Product Management, OctetString, Inc.

Future Network Monitoring for IXPs

Comprehensive IP Traffic Monitoring with FTAS System

packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.

Testing Network Security Using OPNET

Microsoft Azure ExpressRoute

Secure Network Provenance

Web Security Testing Cookbook*

Designing and Implementing a Server Infrastructure

SPAMfighter Mail Gateway

Monitoring Infrastructure (MIS) Software Architecture Document. Version 1.1

Monitoring BGP and Route Leaks using OpenBMP and Apache Kafka

#41 D A N T E I N P R I N T. TEN-155 Multicast: MBGP and MSDP monitoring. Jan Novak Saverio Pangoli

3. Dataset size reduction. 4. BGP-4 patterns. Detection of inter-domain routing problems using BGP-4 protocol patterns P.A.

ICSA Labs Web Application Firewall Certification Testing Report Web Application Firewall - Version 2.1 (Corrected) Radware Inc. AppWall V5.6.4.

Multihoming and Multi-path Routing. CS 7260 Nick Feamster January

BGPStream: a software framework for live and historical BGP data analysis

BGP Prefix Hijack: An Empirical Investigation of a Theoretical Effect Masters Project

How To Make A Network Plan Based On Bg, Qos, And Autonomous System (As)

Understanding Route Redistribution & Filtering

Distack. Towards Understanding the Global Behavior of DDoS Attacks A Framework for Distributed Attack Detection and Beyond

Week 4 / Paper 1. Open issues in Interdomain Routing: a survey

Avis Fleet Services United Road Towing Arizona

Firewall-on-Demand. GRNET s approach to advanced network security services management via bgp flow-spec and NETCONF. Leonidas Poulopoulos

Cisco Discovery 3: Introducing Routing and Switching in the Enterprise hours teaching time

Course Syllabus. Maintaining a Microsoft SQL Server 2005 Database. At Course Completion

Best Practices for Eliminating Risk from Routing Changes

Web Services for Management Perl Library VMware ESX Server 3.5, VMware ESX Server 3i version 3.5, and VMware VirtualCenter 2.5

Strategies to Protect Against Distributed Denial of Service (DD

COURSE OUTLINE MOC 20413: DESIGNING AND IMPLEMENTING A SERVER INFRASTRUCTURE

EQ-BGP: an efficient inter-domain QoS routing protocol

The Bro Network Security Monitor. Broverview

Introduction to Automated Testing

ns-3 development overview ns-3 GENI Eng. Conf., Nov

Forecasting Traffic Growth and Impact with Cisco MATE Design

How To Load Balance On A Bgg On A Network With A Network (Networking) On A Pc Or Ipa On A Computer Or Ipad On A 2G Network On A Microsoft Ipa (Netnet) On An Ip

Towards a Next- Generation Inter-domain Routing Protocol. L. Subramanian, M. Caesar, C.T. Ee, M. Handley, Z. Mao, S. Shenker, and I.

Network Security Demonstration - Snort based IDS Integration -

Lab Developing ACLs to Implement Firewall Rule Sets

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

SSM6437 DESIGNING A WINDOWS SERVER 2008 APPLICATIONS INFRASTRUCTURE

co Characterizing and Tracing Packet Floods Using Cisco R

B. Quoitin, S. Uhlig, C. Pelsser, L. Swinnen and O. Bonaventure

Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder.

Link-Rank: A Graphical Tool for Capturing BGP Routing Dynamics

Experimentation driven traffic monitoring and engineering research

VESZPROG ANTI-MALWARE TEST BATTERY

How To Write A Policy Based Networking System For Bgg

Agent Languages. Overview. Requirements. Java. Tcl/Tk. Telescript. Evaluation. Artificial Intelligence Intelligent Agents

The Win32 Network Management APIs

KT The Value Networking Company

MCSA/MCITP: Enterprise Windows Server 2008 Course 9952; 14 Days, Instructor-led

Measuring IP Network Routing Convergence. A new approach to the problem

Transcription:

BGPRV: A Library for Fast and Efficient Routing Data Manipulation DETER/EMIST Workshop June 15th, 2006 - Arlington, VA Patrick McDaniel, Sophie Qiu, and Kevin Butler 1

BGP Security Community in the midst of comprehensive effort to evaluate and address the security limitations of BGP, the Internet interdomain routing protocol. Where are we? Enormous body of analysis of the behavior of BGP Many, many security protocol proposals Time-tested operational (protective) procedures Community interest, and involvement Q: Why (technically) don t we have secure BGP? A: Massively complex protocol interactions involving thousands of independent (often untrustworthy) entities A: No way to convincingly evaluate proposals/practices 2

Trace based experiment... Simulation Definition (simulation scope and timeline) Extract Topology Extract Traffic Model Project Attack (simulation model) Visualization Forensic Analysis Simulation (results) (modified attack) 3

Problem The experimental community has a large and increasing corpus of data to use to drive experiments... (PREDICT) However, it is hard to manage data. A large cost of developing an experiment is in dealing with the source data. This is particularly true of BGP data RouteViews, RIPE, etc., all use MRT or other formats which are collected in obtuse structures on remote servers Tools for managing data specialized/rudimentary No comprehensive API for manipulating 4

Requirements Designers of an experiment need flexible access to the real source traces... formats should be transparent... details of collection should be abstracted away... optimize over many uses... fast, reliable, etc.... simplicity Goal state: experimenters should be completely ignorant of the location, format, and access methods of corpus of data Extract Topology Extract Traffic Model 5

BGPRV.pm A perl module that abstracts away all of the details of the RouteViews repository Random access stream of entire history Handles both RIB and UPDATE data routing snapshot (RIB), flows (UPDATES) Automatically interrogates RouteViews repository keeps state of repository in persistent store replicates as needed all data Applications programmer interface makes all files, replication, formats transparent to the user converts everything to ASCII Note: not only RV, but useful for any structured repository 6

bgpdump: an example #!/usr/bin/perl use BGPRV; # Create the RV object my ($mobj,@mrt); $mobj = BGPRV->new; # Check for CLP, then init and walk the stream if ( $ARGV[0] eq "-f" ) { $mobj->online(0); shift; } $mobj->initmrtstream( $ARGV[0], $ARGV[1] ); while ( $mobj->getnextmrt(\@mrt)) { } # Process the BGP Announcements if ( defined $mrt[$bgprv::upd_fields{announces}] ) { foreach my $prefix (@{$mrt[$bgprv::upd_fields{announces}]}) { print "$mrt[$bgprv::upd_fields{time}] A ". "$mrt[$bgprv::upd_fields{srcip}] ". "$BGPRV::ORIGINS[$mrt[$BGPRV::UPD_FIELDS{ORIG}]] ". "$prefix $mrt[$bgprv::upd_fields{path}]\n"; } } 7

Replication Replication: mirroring all remote files locally: 1. Scan all UPDATE and RIB directories once a day, current month once an hour (with dates and times) write to $RV_REPOSITORY/rv_state.dat get all files, inclusively for all dates within the MRT stream range [All web related tools built upon Perl lwp (libwww-perl) interfaces] 2. Read each record 1. Parse MRT formats Convert all MRT data to ASCII Create hash table (w nesting) 3. Return hash to the caller program 8

bgpstab: BGP stability Observes the stability of address space advertisements over a year Stable prefixes Unstable prefixes Pathological instability Categorization by AS type Characterizations of security apparatus Cryptographic methods, route filters sbgp, IRV, RCP, and many, many others... Publication: Sophie Qiu, Patrick McDaniel, Fabian Monrose, and Avi Rubin, Characterizing Address Use Structure and Stability of Origin Advertisement in Interdomain Routing. 11th IEEE Symposium on Computers and Communications, June 2006. Pula-Cagliari, Sardinia, Italy. In Progress: Dan Pei, William Aiello, Anna Gilbert, and Patrick McDaniel, Origin Disturbances in BGP. Technical Report TD-62TJJF8, AT&T Labs - Research, Florham Park, NJ, May 2006 (revised). 9

bgptopo: topology extractor Extracts the IDR state of the network (or subset) Topology uses Prefix assignments Prefix transitions Usage Extract Topology Topology from center-point AS X, diameter Y over period Z bgptopo [-f] <START> <END> <CENTER AS> <DIAMETER> <MAXLINKS> Example:./bgptopo -f "05/24/06 00:00:00" "05/24/06 01:00:00" 5413 3 10 Note: compiles directly into lseb compatible topo file 10

bgpevent: event extractor How do we extract the important events from a corpus of data -- build the script for the evolving environment Inprogress: dual of bgptopo, extracts events from corpus Develops maps of state transition of known topology Currently prefix advertisements prefix withdrawals link state changes working : route filters, policy... Extract Traffic Model Research challenges: how do you reliable determine the difference between failures, changes in configuration, and other events from indirect observations 11

Future work... Implementation enhancements Namespaces: RouteViews, Ripe Experimental sources: use non-bgp event information E.g., AT&T Ruby system provides details of interface level logs throughout AS7018 Useful for more reliable event introspection E.g., Router configurations, CISCO COI Useful for determining real topology, more realistic events Further integration with existing experimental systems lseb (large-scale replayable ebgp experiments) 12

Availability BGPRV and (some) tools are currently available... Some use in community, more welcome Please see http://siis.cse.psu.edu/tools.html or email siis@cse.psu.edu 13