Autonomous Systems From The View of Multiple Vantage Points: Keywords
Autonomous Systems From The View of Multiple Vantage Points: Keywords
Autonomous Systems From The View of Multiple Vantage Points: Keywords
commercial relationships, rather than simply the in Europe may be a customer of an AS in the US
connectivity of the graph. We evaluate our technique on a for some destinations and a peer for others.
collection of ten BGP routing tables and summarize Router misconfiguration also causes violations in
characteristics of the AS relationships. the export rules. For example, a customer may
mistakenly export advertisements learned from
Problem formulation: one provider to another.
IJCSNS International Journal of Computer Science and Network Security, VOL.9 No.10, October 2009 193
though the two ASs have a pear-pear relationship. relationship may not be visible from same partial views
Identifying the boundary points the uphill and downhill because some ASs may assign to low preference to path
portions of the path is tricky. The structure of partial that traverse in this edge. We use the probalistic
view of the AS graph depends on the position of the AS equivalence rule to find peering edges where the
in the internet hierarchy. In the figure3, the boundary is relationship between two ASs is not visible from many
between C and D (peer-peer relationship) not at E as partial views.
suggested by this partial view in the figure2(a). Now
consider the view from AS B in figure2(b) .This view • Equivalence two ASs i and j are said to be
confirms that A is a customer of D and F is a customer equivalent if e(i,j)>N/2. This rule considers two
of E, however, the graph contradicts the previous view ASs that have the same rank in more than half the
in that d is a customer of C. clearly D and C cannot be vantage points. In these ASs share an edge, they
customers of each other. This contradiction suggests that are likely to be peers.
the two ASs may have a peer-peer relationship.
• Probabilistic equivalence two ASs are probably
1/δ1 δ1 close to 1. We use this rule to infer
peering relationships between ASs when
visibility is poor across the partial views.
194 IJCSNS International Journal of Computer Science and Network Security, VOL.9 No.10, October 2009
IJCSNS International Journal of Computer Science and Network Security, VOL.9 No.10, October 2009 195
After removing the dense core, we notice the presence of iii). Outer core:
other large national providers and hosting companies that
We classify all the remaining ASs in the core as the outer
have peering relationships with many of the ASs in the
core. The members of the outer core typically represent
dense core. To identify these ASs, we define the notation
regional ISPs which have a few customer ASs and a few
of a transit core. Nodes in the transit core peer with each
peering relationships with other such regional ISPs. The
other and with ASs in the dense core, but they do not tend
outer core consists of 897 ASs that have 29 peering
to peer with many out ASs. In our directed graph
sessions with ASs in the dense core and 145 peering
representation, these peering links are essentially the
sessions with ASs in the transit core. We observed that
incoming directed edges from vertices outside this set to
many members of our outer core are regional ISPs.
vertices within the set. We define such a set of edges to be
in-way cutoff graph indicated by the given set of vertices. iv). Summary:
Using the property, we define the transit core as a smallest
set of ASs containing the dense core which indicates a Table1, shows summarized number of ASs at each level
weak in-way cut. That is one having small number of in the hierarchy dense core(level 0), transit core(level 1),
edges compared to the total number of ASs in the transit outer core(level 2), small regional ISPs(level 3) and
core. customer (level 4). Table2, summarizes the connectivity
between various levels in the AS hierarchy . each number
in the table is the total number of edges from level 0 to
1. Identifying the transit core: given X ؿv(G), let
level 1. The table shows several key properties of the
internet topology.
cutin(X) denote the set of all edges of the form (y,z). • The ASs in dense coer are veru well connected.
We define a cut X of the vertex set v(G) to be a weak
cut in |cutin(X)| >X/2. The problem of finding weak • As we move from the dense core towards
cuts in the graph is NP-complete and no good customer, the inter-level and intra-level
approximation algorithms are known for that problem. connectivity graphs significantly.
Given the transit core is a superset of the dense core
and that the dense core is derived by the greedy • The large number of customers ASs have their providers
ordering, we apply some ordering to find the transit distributed across levels is not strictly hierarchal.
core as was used to find the dense core. A natural way
• The number of edges within the outer core is less
of using this ordering to find the transit core is to find
than the total number of vertices in the outer core.
the smallest value of k such that |cutin(Xk)|<k/2.
This indicates the presence of multiple
Surprisingly we find that the value of k at which |cut in
disconnected graphs of ASs in the outer core;
(Xk)|< k/2 also satisfy the property that conn(k+1)=1.
Level # of Ass
This means that no two edges in the cutin(Xk) have the
same source. A weak cut also means that more than Dense core(0) 20
50% of the ASs in Xk do not have any peering
relationship with any of the ASs in v(G)-Xk. Hence by Transit core(1) 129
this definition, Xk should intended contain all the
transit providers. Outer core(2) 897
2. Properties of the transit core: Applying the in-way Small regional ISPs 971
cut algorithm to our graph, we discover a transit core
consisting of 129 ASs. These 129 ASs have 183 Customers 8898
peering links with the ASs in the dense core. We found
196 IJCSNS International Journal of Computer Science and Network Security, VOL.9 No.10, October 2009
ASs in the different groups communicates via The complete structure of the internet is unknown and
ASs in the dense core and transit core. difficult if not impossible to obtain. Our approach is
comprised of many heuristics with certain limitations.
Distribution of ASs in the Hierarchy(Table1)
• We draw our inferences based on only ten
Interconnectivity Across levels(Table2) vantage points available. Ideally we would have a
The graph in figure5, explores the relationship between
node degree and the levels in the hierarchy. We define Level 0 1 2 3 4
node degree as number of neighboring ASs without regard
0 312 626 1091 958 6732
to the relationships. The graph plats the cumulative
distribution of node degree as a logarithmic scale. In 1 183 850 1413 665 3373
general level 0 and 1 ASs have high degree, and level3
and level4 ASs tends to have low degree. However, this is 2 29 145 1600 543 3752
not universally true. Some customers at level 4 have a
large number of upstream providers, and some ASs in the 3 0 0 0 212 2400
dense core at level 0 have a relatively small number of
larger collection of routing tables from more
neighbours. A hierarchy based solely on degree
diverse vantage points, including small customers.
distribution would not be able to make this distribution.
• We treat the route views routing tables as a view
from a single AS.
Future work:
We plan to extract a separate view for each AS
participating in the route views project. Multiple ASs
may fall under the administrative control of a single
institution, due to historical artifacts and market forces.
We plan to extend our methodology to incorporate more
complex routing policies that are captured by the
Fig5: Cumulative distribution of AS degree by level traditional customer-provider and peer-peer relationship.
IJCSNS International Journal of Computer Science and Network Security, VOL.9 No.10, October 2009 197
[7] H. Tangmunarunkit, R. Govindan, S. Jamin, S. Shenker, Project in 2007 and published 8 papers in various National and
and W. Willinger,“Network topologies, power laws, and International Conferences and Journals.
hierarchy,” Tech. Rep. 01-746, Computer Science,
University of Southern California, June 2001.
Mr. M.Venkateswara Rao., M.Sc,
[8] “CAIDA Web Site,” http://www.caida.org. M.Phil (Ph.D)l, and M.Tech in
[9] R. Govindan and A. Reddy, “An analysis of interdomain Computer Science Engineering from
topology and route stability,” Proc. IEEE INFOCOM, Andhra University. Published 4 papers
April 1997.
in various National and International
[10] L. Gao, “On inferring automonous system relationships
in the Internet,”IEEE/ACM Trans. Networking, vol. 9, Conferences and Journals.
no. 6, December 2001.
[11] “University of Oregon RouteViews
project,”http://www.routeviews.org/.
[12] “BGP tables from the University of Oregon RouteViews
MR. G.Appa Rao., M.Tech., M.B.A.,
Project,”http://moat.nlanr.net/AS/Data/.
[13] Michalis Faloutsos, Petros Faloutsos, and Christos (Ph.D)., in computer science and
Faloutsos, “On power- law relationships of the Internet Engineering form Andhra Universiy. He
topology,” in Proc. ACM SIGCOMM, August/September has Submitted Ph.D thesis in M.U., Over
1999, pp. 251–262. 12 Years of teaching experience with
[14] Jin, Q. Chen, and S. Jamin, “Inet: Internet topology GITAM University, handled courses for
generator,” Tech. Rep. CSE-TR-433-00, U. Michigan, B.Tech, M.Tech. Research areas include
September 2000.
Data Mining and AI. Published 8papers in various National and
[15] Z. Ge, D. Figueiredo, S. Jaiwal, and L. Gao, “On the
hierarchical structure of the logical Internet graph,” in Proc. International Conferences and Journals.
SPIE ITCOM, August 2001.
[16] Lixin Gao, Timothy G. Griffin, and Jennifer Rexford, Mr. D.Kishore Kumar M.Tech in
“Inherently safe backup routing with BGP,” in Proc. IEEE computer science and engineering. Over 4
INFOCOM, April 2001. Years of teaching experience with
[17] L. Gao and J. Rexford, “Stable Internet routing without GITAM University, handled courses for
global coordination,” IEEE/ACM Trans. Networking, vol.
B.Tech.
9, no. 6, pp. 681–692, December 2001.
[18] H. Chang, R. Govindan, S. Jamin, S. Shenker, and W.
Willinger, “On inferring AS-level connectivity from BGP
routing tables,” 2001.
[19] “RADB Whois Server,” whois.radb.net. Mr. K.Krishna Chaitanya M.Sc.,
M.Tech(IT) from GITAM University
[20] “IXC Buys Three ISP’s,”