DSNL: Inter-domain Routing/BGP Reading List
Meeting Notes
BGP Survey
BGP Basics
AS-Level Internet Topology
AS Relationship Inference
-
On inferring autonomous system relationships in the Internet.
L. Gao.
IEEE/ACM Trans. on Networking (TON), 9(6):733 -- 745, Dec. 2001.
(a breakthrough, instant classic paper)
- (followup work)
Characterizing the Internet Hierarchy from Multiple Vantage Points
Lakshminarayanan Subramanian,
Sharad Agarwal,
Jennifer Rexford, and
Randy H. Katz.
INFOCOM 2002.
- (followup work)
Computing the Types of the Relationships between
Autonomous Systems.
Giuseppe Di Battista, Maurizio Patrignani, and Maurizio Pizzonia.
INFOCOM 2003.
- (a paper validating policy based routing)
On Inferring and Characterizing Internet Routing Policies.
F. Wang and L. Gao.
IMC 2003.
(a long break...)
- Building an AS-Topology Model that Captures Route Diversity.
Wolfgang Muhlbauer,
Anja Feldmann,
Olaf Maennel,
Matthew Roughan, and
Steve Uhlig.
Sigcomm 2006.
- In Search for an Appropriate Granularity to Model Routing Policies.
Wolfgang Muhlbauer,
Steve Uhlig.
Bingjie fu,
Mickael Meulle, and
Olaf Maennel.
Sigcomm 2007.
-
AS Relationships: Inference and Validation.
X. Dimitropoulos, D. Krioukov, M. Fomenkov, B. Huffaker, Y. Hyun, kc claffy,
and G. Riley.
ACM SIGCOMM Computer Communication Review (CCR), 37(1):29--40, Jan. 2007.
Internet Routing is Stable!
AS-Level Routing Path Prediction
Internet Routing Convergence (also Routing Analysis using Public BGP Data)
- Internet Routing Instability.
Craig Labovitz, G. Robert Malan, and Farnam Jahanian.
Sigcomm 1997.
- Origins of Internet Routing Instability.
Craig Labovitz, G. Robert Malan, and Farnam Jahanian.
INFOCOM 1999.
- Delayed internet routing convergence.
Craig Labovitz, Abha Ahuja, Abhijit Bose, and Farnam Jahanian.
Sigcomm 2000.
- Quantifying Path Exploration in the Internet.
Ricardo Oliveira, Beichuan Zhang, Dan Pei, Rafit Izhak-Ratzin,
and Lixia Zhang.
IMC 2006.
Traffic Engineering
BGP Prefix Hijacking
Detection
- PHAS: A prefix hijack alert system. Mohit Lad, Dan Massey, Dan Pei, Yiguo Wu, Beichuan Zhang and Lixia Zhang, USENIX Security Symposium, 2006.
- Accurate Real-time Identification of IP Prefix Hijacking. Xin Hu and Z. Morley Mao, Proceedings of IEEE Symposium on Security and Privacy (Oakland), 2007.
- A Study of Prefix Hijacking and Interception in the Internet. Hitesh Ballani, Paul Francis, Xinyang Zhang, Sigcomm 2007.
- A Light-Weight Distributed Scheme for Detecting IP Prefix Hijacks in Realtime. Changxi Zheng, Lusheng Ji, Dan Pei, Jia Wang, Paul Francis, Sigcomm 2007.
-
Neighborhood Watch for Internet Routing: Can We Improve the Robustness of Internet Routing Today? G. Siganos and M. Faloutsos, INFOCOM 2007.
- iSPY: Detecting IP Prefix Hijacking on My Own. Zheng Zhang, Ying Zhang, Y. Charlie Hu, Z. Morley Mao, and Randy Bush. Sigcomm 2008.
Prevention (Cryptography, Heuristics)
-
Secure Border Gateway Protocol (Secure-BGP).
S. Kent, C. Lynn, and K. Seo,
IEEE J. Selected Areas in Communications, 18 (4):582--592, April 2000.
-
Extensions to BGP to Support Secure Origin BGP (soBGP)>.
J. Ng, IETF Draft: draft-ng-sobgp-bgp-extensions-01.txt, November 2002.
-
SPV: A Secure Path Vector Scheme for Securing BGP.
Y.-C. Hu, A. Perrig, and M. Sirbu, Sigcomm 2004.
- Analysis of the SPV Secure Routing Protocol: Weaknesses and Lessons. Barath Raghavan, Saurabh Panjwani, and Anton Mityagin, Sigcomm CCR, Vol 37 (2), April 2007.
-
Listen and Whisper: Security Mechanisms for BGP.
L. Subramanian, V. Roth, I. Stoica, S. Shenker, and R. H. Katz.
NSDI, 2004.
-
Pretty Good BGP: Improving BGP by Cautiously Adopting Routes.
J. Karlin, J. Karlin, S. Forrest, and J. Rexford.
ICNP 2006.
Mitigation
Impact Analysis
last updated on June 17, 2008, Y. Charlie Hu