Elsevier

Computer Networks

Volume 82, 8 May 2015, Pages 135-155
Computer Networks

Self-reliant detection of route leaks in inter-domain routing

https://doi.org/10.1016/j.comnet.2015.02.029Get rights and content

Abstract

Route leaks are among the several inter-domain routing anomalies that have the potential to cause large scale service disruptions on the Internet. The reason behind the occurrence of route leaks is the violation of routing policies among Autonomous Systems (ASes). There exist a few rudimentary solutions that can be used as a first line of defense, such as the utilization of route filters, but these palliatives become unfeasible in large domains due to the administrative overhead and the cost of maintaining the filters updated. As a result, a significant part of the Internet is defenseless against route leak attacks. In this paper, we examine the different types of route leaks and propose detection methodologies for improving the reliability of the routing system. Our main contributions can be summarized as follows. We develop a relatively basic theoretical framework, which, under realistic assumptions, enables a domain to autonomously determine if a particular route advertisement received from a neighbor corresponds to a route leak. Based on this, we propose three incremental methodologies, namely Cross-Path (CP), Benign Fool Back (BFB), and Reverse Benign Fool Back (R-BFB), for autonomously detecting route leaks. Our strength resides in the fact that these detection techniques solely require the analysis of control and data plane information available within the domain. We analyze the performance of the proposed route leak identification techniques both through real-time experiments as well as simulations at large scale. Our results show that the proposed detection techniques achieve high success rates for countering route leaks in different scenarios.

Introduction

The security and reliability of the Border Gateway Protocol (BGP) [1] have been actively investigated since its adoption as the standardized inter-domain routing protocol among Autonomous Systems (ASes) in the Internet. The implicit trust model among ASes for exchanging reachability information using BGP, along with the lack of in-built security mechanisms in the protocol itself make the inter-domain routing system vulnerable to a number of security threats, such as false IP prefix origination and false route advertisements. As evident from the Youtube incident in 2008 [2] and alleged Chinese Telecom traffic hijacking event in 2010 [3], even non-sophisticated attacks have the potential to globally disrupt the Internet. Another inter-domain routing anomaly with the potential to produce large scale service disruptions is the “route leak” problem. Route leaks occur due to policy violations while exporting routes to a neighbor AS. The ASes typically set their policies for exporting or importing routes from a neighbor AS according to the business relationship that they have with that specific neighbor on a given inter-domain link. There are three types of business relationships between any two ASes: (1) customer–provider; (2) peer–peer; and (3) sibling–sibling relation. In a customer–provider relation, the provider AS offers transit to the customer AS. The ASes in a peer–peer relation usually exchange only their customers’ traffic between each other up to an agreed upon threshold. A sibling–sibling relation exists between two ASes which belong to the same organization and the ASes typically offer customized transit to each other. A peer–peer relation is different from a sibling–sibling relation in the sense that the ASes, in the latter case, are owned by the same organization whereas, in the former case, the two ASes belong to two distinct organizations. This difference leads to different type of AS polices among the ASes (cf. Section 7).

A route leak occurs when an AS advertises a route toward a neighbor AS that does not respect the agreed business relationship between them. For instance, if a customer AS starts offering transit between two of its providers, then it is a route leak. Similarly, a route leak will occur if an AS advertises routes learned from one provider toward a peer AS. We will delve into these aspects later on, but in general terms, a route leak entails a violation of the business relationship that rules the interconnection of domains.

The main concern about route leaks is that they are a common occurrence, and regardless if they are due to misconfigurations or deliberate attacks, they can lead to traffic loss, sub-optimal routing, and more importantly, traffic hijacking. For instance, in 2012, a multi-homed ISP leaked routes learned from one of its providers to another provider, causing a national level disruption in Internet service in Australia [4]. Another major route leak incident occurred the same year, when one of Google’s peers improperly advertised Google routes to its provider, knocking out Google services for around half an hour [5]—we shall describe these two incidents in more detail later in Section 2.

Route leaks are apparently simple but hard to solve. This is because the ASes keep the information regarding their relationships and policies with other ASes confidential, which makes the identification of policy violations a challenging problem. Although there are orthodox countermeasures for the route leak problem, including route filters, Internet Route Registries (IRRs), and several BGP monitoring tools, they become impotent or unreliable in face of scalability, due to the high cost of maintenance and dependence on third party information.

In this paper, we extend our work presented in [6] where we formally analyzed and developed the route leak problem. In [6], we described different types of route leaks and explained how, where, and why they occur with the help of example scenarios. More importantly, we showed that, under realistic assumptions and routing conditions, a single AS can detect route leaks utilizing only the standard routing information available at hand, and without needing any vantage point deployed in the internetwork. Our approach targets inference and route leak detection requiring neither changes nor extensions to the BGP protocol. Based on the theoretical framework presented in [6], in this paper we develop three incremental route leak identification techniques, namely Cross-Path (CP), Benign Fool Back (BFB) and Reverse Benign Fool Back (R-BFB). The first two techniques are based on the analysis of BGP’s control-plane information, i.e., our mechanisms are able to counter a considerable fraction of route leaks utilizing only the information available from the Routing Information Base (RIB) of the BGP routers in the AS—and obviously the knowledge of the AS relationships with direct neighbors as well. The third technique, R-BFB, also takes advantage of data-plane traffic to provide additional information to the analytics performed to the BGP RIBs. The CP, BFB and R-BFB techniques are described in detail in Sections 4 Cross-Path (CP) route leak identification technique, 5 Benign Fool Back (BFB) route leak identification technique, 6 Reverse Benign Fool Back (R-BFB) route leak identification technique, respectively. Furthermore, we evaluate the proposed techniques both experimentally as well as through event-driven simulations at large scale. For the latter, we utilized a sub-graph of the Internet graph extracted from ARK [7], and we performed simulations using NS2 [8] and BGP++ [9] on a topology composed of more than 1600 ASes. For the experimental part, we deployed an inter-domain network topology consisting of almost 1000 ASes using Linux Containers (Docker [10]), with the aim of testing our route leak identification techniques in a scenario that can realistically support the data-plane part. The results from our tests, which include more than 20,000 event driven simulations and 1930 real-time experiments, show that an AS is able to autonomously detect route leaks in different scenarios with a high success rate using the CP, BFB and R-BFB, especially, when the three techniques are combined and used together. As far as our knowledge goes, our work introduces the first theoretical and experimental analysis for autonomously detecting route leaks in the Internet.

The rest of the paper is organized as follows. Section 2 describes two real world examples of route leaks. The theoretical framework for detecting route leaks including, definition and description of different types, hypotheses and formalization for their detection, is explained in Section 3. Sections 4 Cross-Path (CP) route leak identification technique, 5 Benign Fool Back (BFB) route leak identification technique, 6 Reverse Benign Fool Back (R-BFB) route leak identification technique, introduce the three Route Leak Detection (RLD) techniques, CP, BFB and R-BFB, respectively. The simulations and experimental tests and their results are covered in their respective sections. Section 7 discusses the route leak problem and its detection in sibling–sibling relationship and Section 8 highlights open issues. The related work along with the comparison with our proposed solution is provided in Section 9, and finally, Section 10 concludes the paper.

Section snippets

Route leaks in real world

Internet service outages by virtue of the BGP shortcomings are frequent [11], but only a few succeed to get mass attention—in practice this typically depends on the scale of the service disruption and the profile of the victims. In this section, we illustrate two major Internet disruption incidents, that we refer to as Telstra-Dodo [4] and Google-Moratel [5]. The apparent causes behind the disruptions point out to incidents that involuntary produced route leaks. More specifically, these

Formalizing route leaks

In this section, we formally describe the route leak problem and lay out the theoretical framework for the identification of route leaks, but first we define the terminology and the set of policies that rule the routing among ASes.

Cross-Path (CP) route leak identification technique

In this section, we start with one of the most straightforward approaches for detecting route leaks. In the following sections, we will incorporate additional mechanisms, which, as we shall show, will progressively improve the results in the detection. In a nutshell, the Cross-Path (CP) technique is based on the theoretical route leak countering framework described in the previous section. Algorithm 1 summarizes the step-by-step Cross-Path logic for identifying route leaks. The CP utilizes

Benign Fool Back (BFB) route leak identification technique

In the context of improving the performance of CP technique for detecting route leaks when the leaker L leaks its peer routes toward the victim V, we propose Benign Fool Back (BFB). This technique exploits the commonly practiced preference of routes based on the type of relationships an AS has with its neighbors. We assume that, under normal circumstances, an AS, more specifically the leaker, follows the principle of preferring customer routes over peer and provider routes, and that it prefers

Reverse Benign Fool Back (R-BFB) route leak identification technique

In the previous sections, we presented two route leak detection techniques and showed through simulations and real-time experiments that different type of route leaks in different scenarios can be detected with a reasonable success rate by using BGP intelligence available at the control-plane level only. In order to further improve the route leak detection performance, we propose to use data-plane traffic intelligence along with the control-plane in Reverse BFB. The R-BFB targets to improve the

Route leak problem in sibling–sibling relations

In this section we analyze the route leak problem in the context of sibling AS relationship. Any two different ASes are said to have a sibling–sibling relation among themselves if they are under the administration of a single organization. For example, if a larger ISP acquires a smaller ISP with a distinct ASN or extends its network under a different ASN, then the relationship between the two ASes, now under the same administration, is called a sibling–sibling relationship, i.e., they are the

Open issues

Even though our proposals can be applied in many practical situations (e.g., the Dodo-Telstra incident could have been avoided), there are still some others that might not satisfy the hypotheses of Theorem 1, Theorem 2 given in Section 3.3, and therefore, they need further analysis. In the remainder of this Section, we discuss the reach and limitations of the contributions in this paper.

Hybrid relationships: The valley-free rules for exporting routes serve as a reasonable stepping stone toward

Related work

There are very few research works which study the route leak problem in detail and propose a solution as well. Apart from the research studies, there are a few conventional methods, e.g., route filters, that can be used as a possible solution for the route leak problem. In this section, we discuss the research studies and the conventional mitigation methods that particularly target to resolve the route leak problem.

Conclusion

In this paper, we studied a set of anomalies that threaten the security and reliability of the inter-domain routing system, which are referred to as route leaks. We introduced a basic theoretical framework including realistic hypotheses and theorems, under which an AS is able to detect route leak initiation autonomously. The main advantages of our approach include: (a) no reliance on third party information (e.g., vantage points); (b) no changes required to control-plane protocols (e.g., to

Acknowledgements

The authors would like to acknowledge the support received from the Spanish Ministry of Science and Innovation under contract TEC2012-34682, project partially funded by FEDER, the Catalan Government under contract 2009 SGR1508, the IST Open-LAB Project under contract FP7-287581, and Cisco Systems through a Cisco RFP grant.

Muhammad Shuaib Siddiqui is a research associate as well as a Ph.D. candidate at Technical University of Catalonia (UPC), Spain. He received his B.Sc in Computer Engineering from King Fahd University of Petroleum & Minerals (KFUPM), Saudi Arabia, and M.Sc in Communication Systems Engineering from École Polytechnique Fédérale de Lausanne (EPFL), Switzerland. Currently, he is a PhD candidate working both with the Networking and Information Technology Lab (NetITLab), and the Advanced Network

References (30)

  • V. Krishnamurthy et al.

    Sampling large Internet topologies for simulation purposes

    Comput. Netw.

    (2007)
  • Y. Rekhter, T. Li, S. Hares, A Border Gateway Protocol 4 (BGP-4), RFC 4271, IETF,...
  • RIPE NCC, YouTube Hijacking: A RIPE NCC RIS case study, 2010....
  • C. Labovitz, China Hijacks 15% of Internet Traffic, 2010....
  • G. Huston, Leaking Routes, 2012....
  • T. Paseka, Why Google Went Offline Today and a Bit about How the Internet Works, 2012....
  • M.S. Siddiqui, D. Montero, M. Yannuzzi, R. Serral-Gracia, X. Masip-Bruin, Route leak identification: a step toward...
  • The CAIDA UCSD IPv4 Routed/24 Topology Dataset – 01.04.2014, 2014....
  • The Network Simulator – NS-2, 2014....
  • BGP++, 2014....
  • What is Docker?, 2014....
  • Detecting Route Leaks by Counting – NANOG 41, 2007....
  • R. Crozier, J. Hutchinson, Dodo Cops Blame for National Internet Outages, 2012....
  • L. Gao

    On inferring autonomous system relationships in the Internet

    IEEE/ACM Trans. Netw.

    (2001)
  • Secure InterDomain Routing (SIDR) Working Group IETF, 2013....
  • Cited by (9)

    • The state of affairs in BGP security: A survey of attacks and defenses

      2018, Computer Communications
      Citation Excerpt :

      If the hosts use different public keys before and during the potential subprefix hijack event, this event is considered as a real attack. Recently, Siddiqui et al. [180,181] presented a theoretical framework to model different types of route leaks and suggested methods how to detect each of them. Based on data from its routing table and knowledge about its business relationships with other ASs, an AS can identify potential route leaks from its customer ASs by checking whether incoming route announcements are valley-free.

    • Measurement of large-scale BGP events: Definition, detection, and analysis

      2016, Computer Networks
      Citation Excerpt :

      Zou et al. focused on early detection of worms by developing a ‘trend detection’ model that fits the scenario well [23]. Siddiqui et al. leveraged both control-plane and data-plane observations to detect route leaks [24]. They established a theoretical framework to model route leakage and proposed three methods to detect it.

    • Poster: LeMon: Global Route Leak Monitoring Service

      2023, SIGCOMM 2023 - Proceedings of the ACM SIGCOMM 2023 Conference
    View all citing articles on Scopus

    Muhammad Shuaib Siddiqui is a research associate as well as a Ph.D. candidate at Technical University of Catalonia (UPC), Spain. He received his B.Sc in Computer Engineering from King Fahd University of Petroleum & Minerals (KFUPM), Saudi Arabia, and M.Sc in Communication Systems Engineering from École Polytechnique Fédérale de Lausanne (EPFL), Switzerland. Currently, he is a PhD candidate working both with the Networking and Information Technology Lab (NetITLab), and the Advanced Network Architectures Lab (CRAAX) at UPC. His research interests include Network Security, Inter-Domain Routing Protocols, and Performance Evaluation.

    Diego Montero received his B.Sc. in Computer Engineering from University of Cuenca (UDC), Ecuador. He completed his M.Sc. in Computer Architecture, Networks and Systems (CANS) from Technical University of Catalonia (UPC), Spain. He is currently a Ph.D. candidate at the Networking and Information Technology Lab (NetITLab), where his research interests include Network Security, Software Defined Networking (SDN) and Cloud Computing.

    Rene Serral-Gracia received his degree in computer science (2003) and a Ph.D. (2009) from the Technical University of Catalunya (UPC). He is the R&D head of the Networking and Information Technology Lab (NetITLab) at UPC, where he is leading different research initiatives, including projects under the European FP7 Research Framework as well as with industry. He is also an Associate Professor at the Department of Computer Architecture at UPC. His research interests are focused on Software Defined Networks (SDNs), overlay networks, network security, routing optimization, and QoE assessment of multimedia traffic.

    Marcelo Yannuzzi received a degree in Electrical Engineering from the University of the Republic, Uruguay, and the MSc. and Ph.D. degrees in Computer Science from the Department of Computer Architecture (DAC), Technical University of Catalonia (UPC), Spain. He is the head of the Networking and Information Technology Lab (NetITLab) at UPC, as well as the head of the Advanced Network Architectures (ANA) research group at UPC. He is involved in several research initiatives and projects in close interaction with European and US companies and research centers. His research interests lie on Software Defined Networks (SDNs), Network-based Intelligence (NBI), outsourced computation and control of network functions, security, network management, smart orchestrations, and mobility.

    View full text