基于BGP路由表的域间路由监测
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
国家的经济建设和社会发展对全球Internet的依赖性越来越强。然而,作为Internet关键支撑部分的域间路由系统却存在许多问题,如路由震荡、收敛延迟、BGP协议实现缺陷以及缺乏安全机制等等。目前,对Internet域间路由安全的研究受到极大关注,已成为Internet领域中的一个研究热点。
     业界开展的工作主要集中在域间路由系统的三个平面:管理平面、控制平面与转发平面。本文深入分析了当前关于域间路由安全的研究工作,认为由于S-BGP等新型域间路由协议的部署存在重重障碍,要基于现有网络设备确保域间路由系统的健康,管理平面的域间路由监测是非常实际和真正能够发挥效用的技术途径。由于现有监测系统的作用与效果还远不能令人满意,首先应该建立一个有效的域间路由监测系统模型,研究该模型下的若干关键技术,给出该监测系统的设计方案并实现,最后还需要对监测结果数据进行分析、讨论以指导监测系统的改进。本文以此为线索,针对这些内容开展深入研究,主要取得以下一些研究成果:
     1.提出了一种有效的监测域间路由的系统模型。该模型基于BGP路由表监测或BGP更新报文监测两种技术之上,能利用Internet拓扑特性来检测异常路由,从而达到监测域间路由系统的目的。
     2.研究了几种基本的ISP商业互连关系以及这个关系模型的构造问题,提出了一种ISP商业互连关系模型的构造算法,并把该算法应用于域间路由监测系统ISP-HEALTH中。
     3.研究了Internet的层次模型构造技术。提出了一种可扩展的Internet三级层次模型,并给出该模型的构造算法。不仅使用本算法刻画了Internet的层次特性,还把本算法用于域间路由监测系统ISP-HEALTH中。
     4.给出域间路由监测系统的详细设计方案,并实现了一个Internet域间路由监测系统原型——ISP-HEALTH系统。
     5.对BGP路由表中的环形异常路由进行深入研究。指出其产生的主要原因是管理员错误使用prepend命令;传播的原因是BGP协议没有定义如何处理环形异常路由;但是,由于负载平衡、链路备份等因素使得其对Internet的连通性影响并不大。
National economy and society development become more and more dependent on the global Internet. However, inter-domain routing system as a key part of the Internet has severe problems. Currently, the researches about security of inter-domain routing of the Internet have got great attentions, and are being hot research points.After analyzing current issues and researches about the security of inter-doamin routing deeply, we conclude that the problem should be studied at three levels of inter-domain routing system, which are management plane, control plane and forwarding plane. Since the deployment of the new inter-domain routing protocol, e.g. S-BGP, is confronted with many obstacles, monitoring is an effective and practical method to ensure the healthy inter-domain routing system based on the current network devices. Because current monitoring systems of inter-domain are not effective, firstly we build an effective model of monitoring system of Inter-domain. Secondly, we study some key technologies of the model, provide detailed design schemes of this monitoring system and implement it. Finally, we analyze the monitored data to optimize it. In this dissertation, the main contributions are as follows:1. Proposes a monitoring model for inter-domain routing system, which can detect anomalous routes by utilizing the characteristics of the Internet topology, and avoid the deficiencies of other monitoring systems.2. Studies the problem of how to get commercial relationships of the ISPs. Several typical commercial relationships are discussed, and a new algorithm which can be used to ISP-HEALTH is provided.3. Studies the hierarchy of the Internet, and proposes a scalable 3-level model of the Internet and a new construction algorithm. This algorithm is not only used to study the hierarchy characteristic of the Internet, but also implemented in ISP-HEALTH.4. Discusses the detailed implement schemes of this monitoring system and has finished prototype.5. Examines the routing-loop phenomenon of the inter-domain routing system by analyzing the data from RouteViews, and provides the informative statistics and analysises. The discussion on the causes of routing-loops and related problems contribute greatly to the healthy operation of the Internet.
引文
[1] B. Halabi. Internet Routing Architectures. Cisco Press, second edition, 2001.
    [2] Y. Rekhter and T. Li. A Border Gateway Protocol. RFC 1771(BGP version 4), 1995.
    [3] S. A. Misel. Wow, AS70071 NANOG mail archives. http://www.merit,edu/mail.archives/nanog/1997-04/msg00340.html.
    [4] J. Cowie, A. Ogielski, B. Premore, and Y. Yuan. Global Routing Instabilities during Code Red Ⅱ and Nimda Worm Propagation. http://www.renesys.com/projects/bgp_instability
    [5] M. Liljenstam, et al. BGP instabilities and worms: Data to models. 2002.
    [6] IRPAS-Internetwork routing Protocol Attack Suite. http://www.phenoelit.de/irpas/
    [7] Barry Raveendran Greene. BGPv4 Security Risk Assessment. http://www.cisco.com/public/cons/isp/essentials/, June 11, 2002.
    [8] Y. Rekhter, et al. Multiprotocol Extensions for BGP-4. RFC 2858, June 2000.
    [9] A. Heffernan. Protection of BGP Sessions via the TCP MD5 Signature Option. RFC2385, August 1998.
    [10] V. Gill, et al. The BGP TTL Security Hack(BTSH). draft-gill-btsh-01. txt, December 2002.
    [11] URL ftp://ftp-eng.cisco.com/sobgp/index.htm
    [12] Meeting Notes from S-BGP Oregon Workshop. http://www.net-tech.bbn.com/sbgp/021030.OregonWorkshopNotes.html, October 2002.
    [13] Ng James. Extensions to BGP to Support Secure Origin BGP(soBGP). draft-ng-sobgp-bgp-extensions-01.txt, November 2002.
    [14] J. De Clercq, et al. Connecting IPv6 Islands across IPv4 Clouds with BGP. draft-ooms-v6ops-bgp-tunnel-00.txt, October 2002.
    [15] T. Senvirathne. Identification of IPv6 Routes that need Tunneling-Use of BGP Extended Community Attribute. Draft-tsenevir-ipv6-bgp-tun-00.txt, June 2002.
    [16] Geoff Huston. NOPEER community for BGP route scope control. Draft-ietf-ptomaine-nopeer-02.txt, February 2003.
    [17] N. Spring, R. Mahajan, D. Wetherall, Measuring ISP Topologies with Rocketfuel, SIGCOMM, 2002.
    [18] Zhuoqing, Morley Mao, Jennifer Rexford, Jia Wang, Randy H. Katz, Towards an Accurate AS-Level Traceroute Tool, SIGCOMM, 2003.
    [19] R. Siamwalla, R. Sharma, S. Keshav. Discovering Internet Topology, IEEE INFOCOM, 1999.
    [20] H. Chang, R. Govindan, S. Jamin, S. Shenker, W. Willinger, Towards Capturing Representative AS-level Internet Topologies, ACM, 2002.
    [21] D. Meyer RouteViews Project. http://www.routeviews.org/.
    [22] http://archive.routeviews.org/oix-route-views/.
    [23] RIPE RIS project. URL http://data.ris.ripe.net.
    [24] Cernet bgp view project. URL http://bgpview.6test.edu.cn
    [25] 徐恪,熊勇强,吴建平.边界网关协议BGP-4的安全扩展.电子学报.2002年2月.第2期.Pp271-273.
    [26] Kruegel C, Mutz D, Robertson S, et al. Topology-based detection of anomalous BGP messages[A]. In 6th Symposium on Recent Advances in Intrusion Detection(RAID)[C]. USA, September 2003. 17-35.
    [27] RENESYS Corp. Real Time Monitoring of Global Internet Routing[EB/OL]. http://www.renesys.com/services.html.
    [28] Chang H, Govindan R, Jamin S, et al. On Inferring AS-Level Connectivity from BGP Routing Tables[R]. Tech. Rep. UM-CSE-TR-454-02, University of Michigan, 2002.
    [29] GE Z, FIGUEIREDO D, JAIWAL S, and et al. On the hierarchical structure of the logical Internet graph[A]. Proceedings of SPIE ITCOM[C]. USA, August 2001.
    [30] SUBRAMANIAN L, AGARWAL S, REXFORD J, et al. Characterizing the Internet hierarchy from multiple vantage points[A]. Proceedings of IEEE Infocom[C]. New York, USA, 2002. 594-604.
    [31] ZHU P D, LIU X. An Efficient Algorithm to Infer the Internet Hierarchy[A]. Advances on Computer Architecture, ACA'04[C]. Jinan, August 2004. 358-361.
    [32] L. GAO. On inferring autonomous system relationships in the Internet.[J]. IEEE/ACM Transactions on Networking, vol. 9, no. 6. Dec, 2000. 733-745.
    [33] BATTISTA G, PATRIGNANI M, and PIZZONIA M. Computing the types of the relationships between autonomous systems[A]. Proceedings of IEEE Infocom[C]. California, USA, 2003.
    [34] R. Mahajan, et al. Understanding BGP Misconfiguration. ACM SIGCOMM' 2002.
    [35] JUNOS Strict ISP Prefix Filter Template http://www.qorbit.net/documents/junos-bgp-template, pdf
    [36] Wang and L. Gao, Inferring and Characterizing Internet Routing Policies, ACM SIGCOMM Internet Measurement Conference, 2003.
    [37] G. Huston, IPv4-How long have we got? The ISP Column, July 2003.
    [38] H. Kong. The Consistency Verification of Zebra BGP Data Collection, RIPE, 2003.
    [39] R. Bush, T. Griffin, Z. Morley Mao. Route Flap Damping: Harmful? NANOG 25. October 2002.
    [40] G. Huston. BGP '01: An Examination of the Internet's BGP Table Behaviour in 2001, Telstra. Presentation to Internet2 Joint Techs Workshop, January 2002.
    [41] Q. Chen, H. Chang, R. Govindan, S. Jamin, S. Shenker, W. Willinger. The Origin of Power Laws in Internet Topologies Revisited, to appear in Proceedings of IEEE Infocom 2002, New York, June 23-27, 2002.
    [42] A. Broido, kc claffy. Analysis of RouteViews BGP data: policy atoms, Cooperative Association for Internet Data Analysis - CAIDA, San Diego Supercomputer Center, University of California, San Diego. Proceedings of network-related data management (NRDM) workshop Santa Barbara, May 2001.
    [43] H. Tangmunarunkit, R. Govindan, S. Shenker, D. Estrin. The Impact of Routing Policy on Internet Paths. 2001.
    [44] C. Labovitz, A. Ahuja, A. Bose, Delayed Internet Routing Convergence, SIGCOMM 2000.
    [45] G Huston, Interconnection, peering and settlements. In Proceedings of the 9th Annual Conference on the Internet Society, 1999.
    [46] C. Alaettinoglu, Scalable router configuration for the Internet. In Proc. IEEE IC3N, October 1996.
    [47] Norton, W.B. (2000). Internet service providers and peering. Available on request from; http ://www. equinix,com/press/whtppr. htm
    [48] A. Broido, E. Nemeth, and K. Claffy. Internet expansion, refinement and churn. European Transactions on Telecommunications, January 2002.
    [49] Public route server and looking glass list. http://www.traceroute.org/.
    [50] Geoff Huston. Analyzing the Internet's BGP Routing Table. The Internet Protocol Journal, vol. 4, Mar 2001. http://www.telstra.net/gih/papers/ipj/4-1-bgp.pdf.
    [51] B. Huffaker, A. Broido, k. claffy, M. Fomenkov, K. Keys, E. Lagache, and D. Moore, Skitter AS Internet Graph. Oct 2000. http ://www. caida. org/analysis/topology/as_core_network/.
    [52] Y. Rekhter, B. Moskowitz, D. Karrenberg, G. J. de Groot, and E. Lear, Address Allocation for Private Internets, RFC 1918. February 1996.
    [53] H. Tangmunarunkit, et al. Does AS size determine degree in AS topology? ACM Computer Communication Review, 2001.
    [54] H. Tangmunarunkit, R. Govindan, and S. Shenker. Internet path inflation due to policy routing. In SPIE ITCom, 2001.
    [55] L. Subramanian, V. N. Padmanabhan, and R. H. Katz. Geographic properties of Internet
     routing. In USENIX Annual Technical Conference, 2002.
    [56] V. Paxson. End-to-end routing behavior in the Internet. In ACM SIGCOMM, 1997.
    [57] M. R. Garey and D. S. Johnson. Computers and Intractability: A Guide to the Theory of NP-Completeness. W. H. Freeman, New York, NY, 1979.
    [58] R. Govindan and A. Reddy. An Analysis of Internet Inter-Domain Topology and Route Stability. In Proc. IEEE INFOCOM '97, March 1997.
    [59] C. Alaettinoglu, T. Bates, E. Gerich, D. Karrenberg, D. Meyer, M. Terpstra, and C. Villamizar. Routing Policy Specification Language(RPSL). Request for Comments 2280, Internic Directory Services, January 1998.
    [60] C. Labovitz, A. Ahuja, R. Wattenhofer, S. Venkatachary. The Impact of Internet Policy and Topology on Delayed Routing Convergence. Proc. ofINFOCOM 2001.
    [61] Steve Oualline著,周良忠译.C程序员精通Perl.人民邮电出版社.2003年.
    [62] Randy Kobes等著,胡敏等译.Perl高级开发.机械工业出版社.2002年.
    [63] Martin C.Brown著,顾凯等译.Perl参考大全(第二版).人民邮电出版社.2002年.
    [64] E. Chen and J. Stewart. RFC 2519: A framework for interdomain route aggregation. February 1999.
    [65] R. Govindan, C. Alaettinoglu, G Eddy, D. Kessens, S. Kumar, and W. Lee. An architecture for stable, analyzable Internet routing. IEEE Network Magazine, January-Feburary 1999.
    [66] K. Varadhan, R. Govindan, and D. Estrin, Persistent route oscillations in inter-domain routing. Computer Networks, vol. 32, no. 1, pp. 1-16, Jan. 2000.[Online]. Available: http://www.elsevier.com/locate/comnet
    [67] C. Labovitz, A. Ahuja, A. Abose, and F. Jahanian, An experimental study of delayed internet routing convergence. Stockholm, Sweden, Aug. 2000. http://www.acm.org/sigcomm/sigcomm2000/conf/paper/sigcomm2000-5-2.pdf
    [68] L. GA0 and J. Rexford, Stable internet routing without global coordination. In Proceedings of ACM/SIGMETRICS, 2000, pp. 307-317. http://citeseer.nj.nec.com/gao00stable.html
    [69] L. GA0, T. G. Griffin, and J. Rexford. Inherently Safe Backup Routing with BGP. In Proc. IEEE INFOCOM 2001, 1: 547-556, April 2001.
    [70] 赵邑新,尹霞,韩博,吴建平.策略路由的基本关系及其测试.清华大学学报(自然科学版).2002,Vol.42,No.10,pp.1414-1418.
    [71] 白建军.核心路由器边界网关协议BGP-4实现技术的研究.国防科技大学计算机学院硕士学位论文.2002年.
    [72] Andrew S.Tanenbaum著,熊桂喜等译.计算机网络.清华大学出版社.1998年7
    [73] Terry Slattery著,苏金树等译.Cisco网络高级IP路由技术.机械工业出版社.1999年6月
    [74] 闵应骅.计算机网络路由研究综述.计算机学报.Vol.26,No.6,June 2003.
    [75] 赵会群,孙晶,高远,王光兴.一种改进的BGP路由策略冲突检测方案.通讯学报.2002年7月,第23卷,第7期.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700