18 research outputs found

    Bias in Internet Measurement Platforms

    Full text link
    Network operators and researchers frequently use Internet measurement platforms (IMPs), such as RIPE Atlas, RIPE RIS, or RouteViews for, e.g., monitoring network performance, detecting routing events, topology discovery, or route optimization. To interpret the results of their measurements and avoid pitfalls or wrong generalizations, users must understand a platform's limitations. To this end, this paper studies an important limitation of IMPs, the \textit{bias}, which exists due to the non-uniform deployment of the vantage points. Specifically, we introduce a generic framework to systematically and comprehensively quantify the multi-dimensional (e.g., across location, topology, network types, etc.) biases of IMPs. Using the framework and open datasets, we perform a detailed analysis of biases in IMPs that confirms well-known (to the domain experts) biases and sheds light on less-known or unexplored biases. To facilitate IMP users to obtain awareness of and explore bias in their measurements, as well as further research and analyses (e.g., methods for mitigating bias), we publicly share our code and data, and provide online tools (API, Web app, etc.) that calculate and visualize the bias in measurement setups

    Systems for characterizing Internet routing

    Get PDF
    2018 Spring.Includes bibliographical references.Today the Internet plays a critical role in our lives; we rely on it for communication, business, and more recently, smart home operations. Users expect high performance and availability of the Internet. To meet such high demands, all Internet components including routing must operate at peak efficiency. However, events that hamper the routing system over the Internet are very common, causing millions of dollars of financial loss, traffic exposed to attacks, or even loss of national connectivity. Moreover, there is sparse real-time detection and reporting of such events for the public. A key challenge in addressing such issues is lack of methodology to study, evaluate and characterize Internet connectivity. While many networks operating autonomously have made the Internet robust, the complexity in understanding how users interconnect, interact and retrieve content has also increased. Characterizing how data is routed, measuring dependency on external networks, and fast outage detection has become very necessary using public measurement infrastructures and data sources. From a regulatory standpoint, there is an immediate need for systems to detect and report routing events where a content provider's routing policies may run afoul of state policies. In this dissertation, we design, build and evaluate systems that leverage existing infrastructure and report routing events in near-real time. In particular, we focus on geographic routing anomalies i.e., detours, routing failure i.e., outages, and measuring structural changes in routing policies

    Revealing and Characterizing MPLS Networks

    Full text link
    The Internet is a wide network of computers in constant evolution. Each year, more and more organizations are connected to this worldwide network. Each of them has its own structure and administration that are not publicly revealed for economical, political, and security reasons. Consequently, our perception of the Internet structure, and more specifically, its topology, is incomplete. In order to balance this lack of knowledge, the research community relies on network measurements. Most of the time, they are performed based on the well-known tool traceroute. However, in practice, an operator may privilege other technologies than IP to forward packets inside its network. MultiProtocol Label Switching (MPLS) is one them. Even if it is heavily deployed by operators, it has not been really investigated by researchers. Prior to this thesis, only two studies focused on the identification of MPLS tunnels in traceroute data. Moreover, while one of them does not take all possible scenarios into account, the other lack of precision in some of its models. In addition, MPLS tunnels may hide their content to traceroute. Topologies inferred from such data may thus contain false links or nodes with an artificially high degree, leading so to biases in standard graph metrics used to model the network. Even if some researchers already tried to tackle this issue, the revelation of hidden MPLS devices in traceroute data is still an open question. This thesis aims at characterizing MPLS in two different ways. On the one hand, at an architectural level, we will analyze in detail its deployment and use in both IPv4 and IPv6 networks in order to improve its state-of-the-art view. We will show that, in practice, more than one IPv4 trace out of two crosses at least one MPLS tunnel. We will also see that, even if this protocol can simplify the internal architecture of transit networks, it also allows some operators to perform traffic engineering in their domain. On the other hand, MPLS will be studied from a measurement point of view. We will see that routers from different manufacturers may have distinct default behaviors regarding to MPLS, and that these specific behaviors can be exploited to identify MPLS tunnels during traceroute measurements. More precisely, we will focus on new methods able to infer the presence of tunnels that are invisible in traceroute outputs, as well as on mechanisms to reveal their content. We will also show that they can be used in order to improve the inference of Internet graph properties, such as path lengths and node degrees. Finally, these techniques will be integrated into Trace the Naughty Tunnels (TNT), a traceroute extension able to identify all types of MPLS tunnels along a path towards a destination. We will prove that this tool can be used in order to get a detailed quantification of MPLS tunnels in the worldwide network. TNT is publicly available, and can therefore be part of many future studies conducted by the research community.Internet est un immense reĢseau informatique en constante eĢvolution. Chaque anneĢe, de plus en plus dā€™organisations sā€™y connectent. Chacune dā€™elles est geĢreĢe et administreĢe indeĢpendamment des autres. En pratique, lā€™architecture interne de leur reĢseau nā€™est pas rendue publique pour des raisons politiques, eĢconomiques, ou de seĢcuriteĢ. Par conseĢquent, notre perception de la structure dā€™Internet, et plus particulieĢ€rement de sa topologie, est incompleĢ€te. Afin de pallier ce manque de connaissance, la communauteĢ de la recherche sā€™appuie sur des mesures de reĢseau. La plupart du temps, elles sont reĢaliseĢes avec lā€™outil traceroute. Cependant, des technologies autres que IP peuvent eĢ‚tre privileĢgieĢes pour transfeĢrer les paquets dans un reĢseau. MultiProtocol Label Switching (MPLS) est lā€™une dā€™entre elles. MeĢ‚me si cette technologie est largement deĢployeĢe dans Internet, elle nā€™est pas bien eĢtudieĢe par les chercheurs. Avant cette theĢ€se, seulement deux travaux se sont inteĢresseĢs aĢ€ lā€™identification dā€™MPLS dans les donneĢes collecteĢes avec traceroute. Alors que le premier ne prend pas en compte tous les sceĢnarios possibles, le second propose des modeĢ€les qui manquent de preĢcision. De plus, les tunnels MPLS peuvent dissimuler leur contenu aĢ€ traceroute. Les topologies infeĢreĢes sur base de ces donneĢes peuvent donc contenir de faux liens, ou des noeuds avec un degreĢ anormalement eĢleveĢ. Les diffeĢrentes modeĢlisations dā€™Internet qui en reĢsultent peuvent alors eĢ‚tre biaiseĢes. Aujourdā€™hui, la question de la reĢveĢlation des routeurs MPLS qui sont invisibles dans les donneĢes de mesure nā€™est toujours pas reĢsolue, meĢ‚me si certains chercheurs ont deĢjaĢ€ proposeĢ quelques meĢthodes pour y parvenir. Cette theĢ€se a pour but de caracteĢriser MPLS de deux manieĢ€res diffeĢrentes. Dans un premier temps, au niveau architectural, nous analyserons en deĢtail son deĢploiement et son utilisation dans les reĢseaux IPv4 et IPv6 afin dā€™ameĢliorer lā€™eĢtat de lā€™art. Nous montrerons quā€™en pratique, plus dā€™une trace IPv4 sur deux traverse au moins un tunnel MPLS. Nous deĢcouvrirons eĢgalement que bien que ce protocole peut eĢ‚tre utiliseĢ pour simplifier lā€™architecture interne des reĢseaux de transit, il peut aussi eĢ‚tre deĢployeĢ pour la mise en place de solutions dā€™ingeĢnierie de trafic. Dans un second temps, MPLS sera eĢtudieĢ dā€™un point de vue mesure. Nous verrons que les comportements par deĢfaut lieĢs au protocole varient dā€™un fabricant de routeur aĢ€ lā€™autre, et quā€™ils peuvent eĢ‚tre exploiteĢs afin dā€™identifier les tunnels MPLS dans les donneĢes traceroute. Plus preĢciseĢment, nous deĢcouvrirons de nouvelles meĢthodes capables dā€™infeĢrer la preĢsence de tunnels invisibles avec traceroute, ainsi que de nouvelles techniques pour reĢveĢler leur contenu. Nous montrerons eĢgalement quā€™elles peuvent eĢ‚tre utiliseĢes afin dā€™ameĢliorer la modeĢlisation dā€™Internet. Pour terminer, ces techniques seront inteĢgreĢes aĢ€ Trace the Naughty Tunnels (TNT), une extension de traceroute qui permet dā€™identifier tous les types de tunnels MPLS le long du chemin vers une destination. Nous prouverons que cet outil peut eĢ‚tre utiliseĢ pour obtenir des statistiques deĢtailleĢes sur le deĢploiement dā€™MPLS sur Internet. TNT est disponible publiquement, et peut donc eĢ‚tre librement exploiteĢ par la communauteĢ de la recherche pour de multiples futures eĢtudes

    Compact routing for the future internet

    Get PDF
    The Internet relies on its inter-domain routing system to allow data transfer between any two endpoints regardless of where they are located. This routing system currently uses a shortest path routing algorithm (modified by local policy constraints) called the Border Gateway Protocol. The massive growth of the Internet has led to large routing tables that will continue to grow. This will present a serious engineering challenge for router designers in the long-term, rendering state (routing table) growth at this pace unsustainable. There are various short-term engineering solutions that may slow the growth of the inter-domain routing tables, at the expense of increasing the complexity of the network. In addition, some of these require manual configuration, or introduce additional points of failure within the network. These solutions may give an incremental, constant factor, improvement. However, we know from previous work that all shortest path routing algorithms require forwarding state that grows linearly with the size of the network in the worst case. Rather than attempt to sustain inter-domain routing through a shortest path routing algorithm, compact routing algorithms exist that guarantee worst-case sub-linear state requirements at all nodes by allowing an upper-bound on path length relative to the theoretical shortest path, known as path stretch. Previous work has shown the promise of these algorithms when applied to synthetic graphs with similar properties to the known Internet graph, but they haven't been studied in-depth on Internet topologies derived from real data. In this dissertation, I demonstrate the consistently strong performance of these compact routing algorithms for inter-domain routing by performing a longitudinal study of two compact routing algorithms on the Internet Autonomous System (AS) graph over time. I then show, using the k-cores graph decomposition algorithm, that the structurally important nodes in the AS graph are highly stable over time. This property makes these nodes suitable for use as the "landmark" nodes used by the most stable of the compact routing algorithms evaluated, and the use of these nodes shows similar strong routing performance. Finally, I present a decentralised compact routing algorithm for dynamic graphs, and present state requirements and message overheads on AS graphs using realistic simulation inputs. To allow the continued long-term growth of Internet routing state, an alternative routing architecture may be required. The use of the compact routing algorithms presented in this dissertation offer promise for a scalable future Internet routing system

    Using honeypots to trace back amplification DDoS attacks

    Get PDF
    In todayā€™s interconnected world, Denial-of-Service attacks can cause great harm by simply rendering a target system or service inaccessible. Amongst the most powerful and widespread DoS attacks are amplification attacks, in which thousands of vulnerable servers are tricked into reflecting and amplifying attack traffic. However, as these attacks inherently rely on IP spoofing, the true attack source is hidden. Consequently, going after the offenders behind these attacks has so far been deemed impractical. This thesis presents a line of work that enables practical attack traceback supported by honeypot reflectors. To this end, we investigate the tradeoffs between applicability, required a priori knowledge, and traceback granularity in three settings. First, we show how spoofed attack packets and non-spoofed scan packets can be linked using honeypot-induced fingerprints, which allows attributing attacks launched from the same infrastructures as scans. Second, we present a classifier-based approach to trace back attacks launched from booter services after collecting ground-truth data through self-attacks. Third, we propose to use BGP poisoning to locate the attacking network without prior knowledge and even when attack and scan infrastructures are disjoint. Finally, as all of our approaches rely on honeypot reflectors, we introduce an automated end-to-end pipeline to systematically find amplification vulnerabilities and synthesize corresponding honeypots.In der heutigen vernetzten Welt kƶnnen Denial-of-Service-Angriffe groƟe SchƤden verursachen, einfach indem sie ihr Zielsystem unerreichbar machen. Zu den stƤrksten und verbreitetsten DoS-Angriffen zƤhlen Amplification-Angriffe, bei denen tausende verwundbarer Server missbraucht werden, um Angriffsverkehr zu reflektieren und zu verstƤrken. Da solche Angriffe jedoch zwingend gefƤlschte IP-Absenderadressen nutzen, ist die wahre Angriffsquelle verdeckt. Damit gilt die Verfolgung der TƤter bislang als unpraktikabel. Diese Dissertation prƤsentiert eine Reihe von Arbeiten, die praktikable AngriffsrĆ¼ckverfolgung durch den Einsatz von Honeypots ermƶglicht. Dazu untersuchen wir das Spannungsfeld zwischen Anwendbarkeit, benƶtigtem Vorwissen, und RĆ¼ckverfolgungsgranularitƤt in drei Szenarien. Zuerst zeigen wir, wie gefƤlschte Angriffs- und ungefƤlschte Scan-Datenpakete miteinander verknĆ¼pft werden kƶnnen. Dies ermƶglicht uns die RĆ¼ckverfolgung von Angriffen, die ebenfalls von Scan-Infrastrukturen aus durchgefĆ¼hrt wurden. Zweitens prƤsentieren wir einen Klassifikator-basierten Ansatz um Angriffe durch Booter-Services mittels vorher durch Selbstangriffe gesammelter Daten zurĆ¼ckzuverfolgen. Drittens zeigen wir auf, wie BGP Poisoning genutzt werden kann, um ohne weiteres Vorwissen das angreifende Netzwerk zu ermitteln. SchlieƟlich prƤsentieren wir einen automatisierten Prozess, um systematisch Schwachstellen zu finden und entsprechende Honeypots zu synthetisieren
    corecore