On reverse engineering the management actions from observed BGP data
While most of the research work on BGP has focused on detecting and characterizing large-scale routing anomalies from the perspective of network operations and management, it is important to monitor the management actions taken by the network operators in response to global BGP network failures. A f...
Gespeichert in:
Hauptverfasser: | , , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 6 |
---|---|
container_issue | |
container_start_page | 1 |
container_title | |
container_volume | |
creator | Shih Ming Wu, S.F. Xiaoliang Zhao Ke Zhang |
description | While most of the research work on BGP has focused on detecting and characterizing large-scale routing anomalies from the perspective of network operations and management, it is important to monitor the management actions taken by the network operators in response to global BGP network failures. A fundamental question to answer is the following: by utilizing only public BGP observation data under today's Internet environment, can we reverse engineer the management actions taken by specific autonomous systems? In this paper, we propose a formal framework to describe and analyze MOAS events and possible management actions. We use BGP data and a two-step learning approach to evaluate each possible action then determine the most likely one. Through this process, we discovered that early actions were taken by multiple ASes before the faulty originator corrected its mistake. Furthermore, the results show that only a handful of ASes took such early corrective action, but the effect is disproportional: a significant portion, more than 90%, of affected prefixes were routed back to their correct routing path. |
doi_str_mv | 10.1109/INFOCOM.2008.4544599 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_4544599</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>4544599</ieee_id><sourcerecordid>4544599</sourcerecordid><originalsourceid>FETCH-LOGICAL-i90t-5a55d23978e8030d56faeef4ced271a03a436c5ac5822abe10d564d262c1ed7f3</originalsourceid><addsrcrecordid>eNotj81OwzAQhC2hSkDJE8DBL5Cw_kviIwRaKhXCofdqG2-CEXGRHVXi7WnVzmUO82k0w9iDgEIIsI-rj0XbtO-FBKgLbbQ21l6xzFa10FJrKYWtZuz2FFsQpoJrlqX0DUdpo0oQN-ylDTzSgWIiTmHwgSj6MPDpi_iIAQcaKUwcu8nvQ-J93I98v0sUD-T48_KTO5zwjs16_EmUXXzONovXTfOWr9vlqnla597ClBs0xkl1XEc1KHCm7JGo1x05WQkEhVqVncHO1FLijsQJ0U6WshPkql7N2f251hPR9jf6EePf9vJb_QO2eEyG</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>On reverse engineering the management actions from observed BGP data</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Shih Ming ; Wu, S.F. ; Xiaoliang Zhao ; Ke Zhang</creator><creatorcontrib>Shih Ming ; Wu, S.F. ; Xiaoliang Zhao ; Ke Zhang</creatorcontrib><description>While most of the research work on BGP has focused on detecting and characterizing large-scale routing anomalies from the perspective of network operations and management, it is important to monitor the management actions taken by the network operators in response to global BGP network failures. A fundamental question to answer is the following: by utilizing only public BGP observation data under today's Internet environment, can we reverse engineer the management actions taken by specific autonomous systems? In this paper, we propose a formal framework to describe and analyze MOAS events and possible management actions. We use BGP data and a two-step learning approach to evaluate each possible action then determine the most likely one. Through this process, we discovered that early actions were taken by multiple ASes before the faulty originator corrected its mistake. Furthermore, the results show that only a handful of ASes took such early corrective action, but the effect is disproportional: a significant portion, more than 90%, of affected prefixes were routed back to their correct routing path.</description><identifier>ISBN: 9781424422197</identifier><identifier>ISBN: 1424422191</identifier><identifier>DOI: 10.1109/INFOCOM.2008.4544599</identifier><identifier>LCCN: 2008901570</identifier><language>eng</language><publisher>IEEE</publisher><subject>Condition monitoring ; Engineering management ; Environmental management ; Internet ; IP networks ; Large-scale systems ; Reverse engineering ; Routing protocols ; Telecommunications ; YouTube</subject><ispartof>IEEE INFOCOM Workshops 2008, 2008, p.1-6</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/4544599$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,776,780,785,786,2052,27902,54895</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/4544599$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Shih Ming</creatorcontrib><creatorcontrib>Wu, S.F.</creatorcontrib><creatorcontrib>Xiaoliang Zhao</creatorcontrib><creatorcontrib>Ke Zhang</creatorcontrib><title>On reverse engineering the management actions from observed BGP data</title><title>IEEE INFOCOM Workshops 2008</title><addtitle>INFCOMW</addtitle><description>While most of the research work on BGP has focused on detecting and characterizing large-scale routing anomalies from the perspective of network operations and management, it is important to monitor the management actions taken by the network operators in response to global BGP network failures. A fundamental question to answer is the following: by utilizing only public BGP observation data under today's Internet environment, can we reverse engineer the management actions taken by specific autonomous systems? In this paper, we propose a formal framework to describe and analyze MOAS events and possible management actions. We use BGP data and a two-step learning approach to evaluate each possible action then determine the most likely one. Through this process, we discovered that early actions were taken by multiple ASes before the faulty originator corrected its mistake. Furthermore, the results show that only a handful of ASes took such early corrective action, but the effect is disproportional: a significant portion, more than 90%, of affected prefixes were routed back to their correct routing path.</description><subject>Condition monitoring</subject><subject>Engineering management</subject><subject>Environmental management</subject><subject>Internet</subject><subject>IP networks</subject><subject>Large-scale systems</subject><subject>Reverse engineering</subject><subject>Routing protocols</subject><subject>Telecommunications</subject><subject>YouTube</subject><isbn>9781424422197</isbn><isbn>1424422191</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2008</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNotj81OwzAQhC2hSkDJE8DBL5Cw_kviIwRaKhXCofdqG2-CEXGRHVXi7WnVzmUO82k0w9iDgEIIsI-rj0XbtO-FBKgLbbQ21l6xzFa10FJrKYWtZuz2FFsQpoJrlqX0DUdpo0oQN-ylDTzSgWIiTmHwgSj6MPDpi_iIAQcaKUwcu8nvQ-J93I98v0sUD-T48_KTO5zwjs16_EmUXXzONovXTfOWr9vlqnla597ClBs0xkl1XEc1KHCm7JGo1x05WQkEhVqVncHO1FLijsQJ0U6WshPkql7N2f251hPR9jf6EePf9vJb_QO2eEyG</recordid><startdate>200804</startdate><enddate>200804</enddate><creator>Shih Ming</creator><creator>Wu, S.F.</creator><creator>Xiaoliang Zhao</creator><creator>Ke Zhang</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>200804</creationdate><title>On reverse engineering the management actions from observed BGP data</title><author>Shih Ming ; Wu, S.F. ; Xiaoliang Zhao ; Ke Zhang</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i90t-5a55d23978e8030d56faeef4ced271a03a436c5ac5822abe10d564d262c1ed7f3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2008</creationdate><topic>Condition monitoring</topic><topic>Engineering management</topic><topic>Environmental management</topic><topic>Internet</topic><topic>IP networks</topic><topic>Large-scale systems</topic><topic>Reverse engineering</topic><topic>Routing protocols</topic><topic>Telecommunications</topic><topic>YouTube</topic><toplevel>online_resources</toplevel><creatorcontrib>Shih Ming</creatorcontrib><creatorcontrib>Wu, S.F.</creatorcontrib><creatorcontrib>Xiaoliang Zhao</creatorcontrib><creatorcontrib>Ke Zhang</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Shih Ming</au><au>Wu, S.F.</au><au>Xiaoliang Zhao</au><au>Ke Zhang</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>On reverse engineering the management actions from observed BGP data</atitle><btitle>IEEE INFOCOM Workshops 2008</btitle><stitle>INFCOMW</stitle><date>2008-04</date><risdate>2008</risdate><spage>1</spage><epage>6</epage><pages>1-6</pages><isbn>9781424422197</isbn><isbn>1424422191</isbn><abstract>While most of the research work on BGP has focused on detecting and characterizing large-scale routing anomalies from the perspective of network operations and management, it is important to monitor the management actions taken by the network operators in response to global BGP network failures. A fundamental question to answer is the following: by utilizing only public BGP observation data under today's Internet environment, can we reverse engineer the management actions taken by specific autonomous systems? In this paper, we propose a formal framework to describe and analyze MOAS events and possible management actions. We use BGP data and a two-step learning approach to evaluate each possible action then determine the most likely one. Through this process, we discovered that early actions were taken by multiple ASes before the faulty originator corrected its mistake. Furthermore, the results show that only a handful of ASes took such early corrective action, but the effect is disproportional: a significant portion, more than 90%, of affected prefixes were routed back to their correct routing path.</abstract><pub>IEEE</pub><doi>10.1109/INFOCOM.2008.4544599</doi><tpages>6</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISBN: 9781424422197 |
ispartof | IEEE INFOCOM Workshops 2008, 2008, p.1-6 |
issn | |
language | eng |
recordid | cdi_ieee_primary_4544599 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Condition monitoring Engineering management Environmental management Internet IP networks Large-scale systems Reverse engineering Routing protocols Telecommunications YouTube |
title | On reverse engineering the management actions from observed BGP data |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-28T12%3A12%3A58IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=On%20reverse%20engineering%20the%20management%20actions%20from%20observed%20BGP%20data&rft.btitle=IEEE%20INFOCOM%20Workshops%202008&rft.au=Shih%20Ming&rft.date=2008-04&rft.spage=1&rft.epage=6&rft.pages=1-6&rft.isbn=9781424422197&rft.isbn_list=1424422191&rft_id=info:doi/10.1109/INFOCOM.2008.4544599&rft_dat=%3Cieee_6IE%3E4544599%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=4544599&rfr_iscdi=true |