Characterization of Internet Routing Anomalies Through Graph Mining
نویسندگان
چکیده
ABSTRACT Our goal is to contribute to the understanding and detection of control plane anomalies as perturbations in a graph representation of connected autonomous systems (ASes). We reconstructed the autonomous system (AS) level graph for three large-scale routing incidents and evaluated the topological properties of the graphs before, during, and after these events. The three incidents we examined were the Indosat hijack in April 2014, the Telecom Malaysia leak in June 2015, and the Bharti Airtel Ltd. hijack in November 2015. Using observations from the AS graph topology, we illustrate that the incidents were visible as anomalies before they are widely diffused. Topological features in the graph as a whole did not show significant immediate changes over the course of these events. However, significant changes are evident in the average path length and clustering coefficient of the observed graphs when they are decomposed using k-shell decomposition analysis. The kshell decomposition distinguishes between the core and periphery (also called crust) graphs. In this k-shell decomposition, the core consists of ASes with of at least connectivity k , with the crust consisting of those ASes which have less than k connectivity. While anomalous behavior was not observable in the core graph, the events are immediately apparent on the crust. Specifically, when the AS-level graph is examined using k-shell decomposition, there are topological changes in the crust in path length and clustering measurements. Our explanation is that, in graph theoretical terms, these incidents require the initiators to move closer to the core, away from the periphery, and the concentric impacts of the disturbances are visible as these move across the crust. This technique has potential for early detection of large-scale control-plane anomalies, which could enable quicker mitigation.
منابع مشابه
Network-Wide Anomaly Detection Based on Router Connection Relationships
Detecting distributed anomalies rapidly and accurately is critical for efficient backbone network management. In this letter, we propose a novel anomaly detection method that uses router connection relationships to detect distributed anomalies in the backbone Internet. The proposed method unveils the underlying relationships among abnormal traffic behavior through closed frequent graph mining, ...
متن کاملAdvanced operations research techniques for multi-constraint QoS routing in internet
Internet Traffic has grown exponentially over last few years due to provision of multiple class services through Internet backbone. With the explosive use of Internet, contemporary Internet routers are susceptible to overloads and their services deteriorate drastically and often cause denial of services. In this paper, an analysis is made how forecasting technique, routing algorithm and Genetic...
متن کاملOn Knowledge-Based Classification of Abnormal BGP Events
One key factor that ensures smooth data delivery over the Internet and keeps the Internet healthy is the well-being of the Internet’s inter-domain routing. In today’s Internet, the de facto standard inter-domain routing protocol is the Border Gateway Protocol, or BGP, that keeps every BGP router updated about which BGP router is the next hop in reaching a particular network and which autonomous...
متن کاملHDAX: Historical Symbolic Modelling of Delay Time Series in a Communications Network
There are certain performance parameters like packet delay, delay variation (jitter) and loss, which are decision factors for online quality of service (QoS) traffic routing. Although considerable efforts have been placed on the Internet to assure QoS, the dominant TCP/IP like the best-effort communications policy does not provide sufficient guarantee without abrupt change in the protocols. Est...
متن کاملDetection of Interdomain Routing Anomalies Based on Higher-Order Path Analysis Camera Ready
Internet routing dynamics have been extensively studied in the past few years. However, dynamics such as interdomain Border Gateway Protocol (BGP) behavior are still poorly understood. Anomalous BGP events including misconfigurations, attacks and large-scale power failures often affect the global routing infrastructure. Thus, the ability to detect and categorize such events is extremely useful....
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2017