Skip to main content

Cooperative Management Framework for Inter-domain Routing System

  • Conference paper
Autonomic and Trusted Computing (ATC 2008)

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 5060))

Included in the following conference series:

Abstract

The inter-domain routing system consists of many interconnected Autonomous Systems (ASes) which are independently operated and usually have different routing policies. Due to lack of effective coordinative mechanism, policy conflicts may arise, which can cause various problems in performance, security and robustness. To facilitate the collaboration among ASes, we propose an ISP-oriented inter-domain routing system cooperative management framework CMF based on the self-organization method. CMF provides fundamental support to the ISP’s cooperation which includes organization structure, mechanisms and applications. CMF can help ISPs alleviate the side effect caused by the autonomy and selfishness of AS. The framework is generic solution, which can be used not only in inter-domain routing operation, but also in other related fields such as intrusion detection and network measurement.

Research supported by the National Grand Fundamental Research 973 Program of China under Grant No.2003CB314802 and National High-Tech Research and Development Plan of China under Grant No.2006AA01Z213 and National Natural Science Foundation of China Grant No.60673169.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Clark, D.D., Wroclawski, J., Sollins, K.R., Braden, R.: Tussle in Cyberspace: Defining Tomorrow’s Internet. In: SIGCOMM 2002, August 19-23, 2002 (2002)

    Google Scholar 

  2. Griffin, T.G., Wilfong, G.: An Analysis of BGP Convergence Properties. In: Proc. ACM SIGCOMM (1999)

    Google Scholar 

  3. Varadhan, K., Govindan, R., Estrin, D.: Persistent Route Oscillations in Inter-domain Routing. Computer Networks 32(1), 1–16 (2000)

    Article  Google Scholar 

  4. Rekhter, Y., Li, T.: A Border Gateway Protocol 4 (BGP-4), RFC1771 (1995)

    Google Scholar 

  5. Mahajan, R., Wetherall, D., Anderson, T.: Understanding BGP misconfigurations. In: Proc. of ACM. SIGCOMM (August 2002)

    Google Scholar 

  6. Chi-ken, C.: Policy-based Routing with Non-strict Preferences. In: ACM SIGCOMM 2006, September 11-15, 2006 (2006)

    Google Scholar 

  7. Haowen, C., Dash, D., Perrig, A., Zhang, H.: Modeling Adoptability of Secure BGP Protocols. In: SIGCOMM 2006, September 11-15, 2006 (2006)

    Google Scholar 

  8. Ballani, H., Francis, P., Xinyang, Z.: A Study of Prefix Hijacking and Interception in the Internet. In: ACM SIGCOMM, August 27-31, 2007 (2007)

    Google Scholar 

  9. Claffy, K.: Top problems of the Internet and how to help solve them (2003), http://www.caida.org/outreach/presentations//netproblems_lisa03

  10. Lindell, Y., Pinkas, B.: Privacy preserving data mining. Journal of Cryptology 15(3), 177–206 (2002)

    Article  MATH  MathSciNet  Google Scholar 

  11. McKnight, D.H., Chervany, N.L.: The meanings of trust. MISRC Working Paper Series, Technical Report 94-04, arlson School of Management, University of Minnesota (1996)

    Google Scholar 

  12. Kent, S., Lynn, C., Mikkelson, J., Seo, K.: Secure border gateway protocol (sbgp). IEEE JSAC Special Issue on Network Security (2000)

    Google Scholar 

  13. Meiyuan, Z., Smith, S.W., Nicol, D.M.: Evaluating the Performance Impact of PKI on BGP Security. In: The 4th Annual PKI Research and Development Workshop (April 2005)

    Google Scholar 

  14. Internet Routing Registries, http://www.irr.net/

  15. Yao, A.C.: Protocols for secure computations. In: Proc. of the 23rd Annual IEEE Symposium on Foundations of Computer Science (1982)

    Google Scholar 

  16. Govindan, R., Alaettinoglu, C., Eddy, G., Kessens, D., Kumar, S.: An architecture for stable, analyzable Internet routing. IEEE Network 13(1), 29–35 (1999)

    Article  Google Scholar 

  17. Battista, G.D., Refice, T., Rimondini, M.: How to extract BGP peering information from the internet routing registry. In: ACM SIGCOMM 2006 workshops, September 11-15, 2006 (2006)

    Google Scholar 

  18. Siganos, G., Faloutsos, M.: Analyzing BGP policies: Methodology and tool. In: INFOCOM 2004 (2004)

    Google Scholar 

  19. Feamster, N., Balakrishnan, H.: Detecting BGP configuration faults with static analysis.In: Proc. Networked Systems Design and Implementation (May 2005)

    Google Scholar 

  20. Goodell, G., Aiello, W., Griffin, T., Ioannidis, J., McDaniel, P., Rubin, A.: Working around bgp: An incremental approach to improving security and accuracy of Inter-domain routing. In: NDSS (2003)

    Google Scholar 

  21. Yu, H., Rexford, J., Felten, E.W.: A Distributed Reputation Approach to Cooperative Internet Routing Protection. In: 1st IEEE ICNP Workshop on Secure Network Protocols, 2005 (NPSec) (2005)

    Google Scholar 

  22. Akashi, O., Hirotsu, T., Sato, K., Kourai, K., Maruyama, M.: Sugawara: Agents Support for Flexible Inter-AS Policy Control. In: Proc. of the 2003 Symposium on Applications and the Internet Workshops (SAINT-w 2003) (2003)

    Google Scholar 

  23. Akashi, O., Fukuda, K., Hirotsu, T., Sugawara, T.: Policy-based BGP Control Architecture for Autonomous Routing Management. In: SIGCOMM 2006 Workshops, Pisa, Italy, September 11-15, 2006 (2006)

    Google Scholar 

  24. Mizuguchi, T., Yoshida, T.: Inter-domain Routing Security BGP Route Hijacking. In: APRICOT 2007 (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Chunming Rong Martin Gilje Jaatun Frode Eika Sandnes Laurence T. Yang Jianhua Ma

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Hu, N., Zou, P., Zhu, P., Liu, X. (2008). Cooperative Management Framework for Inter-domain Routing System. In: Rong, C., Jaatun, M.G., Sandnes, F.E., Yang, L.T., Ma, J. (eds) Autonomic and Trusted Computing. ATC 2008. Lecture Notes in Computer Science, vol 5060. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-69295-9_45

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-69295-9_45

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-69294-2

  • Online ISBN: 978-3-540-69295-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics