ABSTRACT
There are currently no requirements (technical or otherwise) that routing paths must be contained within national boundaries. Indeed, some paths experience international detours, i.e., originate in one country, cross international boundaries and return to the same country. In most cases these are sensible traffic engineering or peering decisions at ISPs that serve multiple countries. In some cases such detours may be suspicious. Characterizing international detours is useful to a number of players: (a) network engineers trying to diagnose persistent problems, (b) policy makers aiming at adhering to certain national communication policies, (c) entrepreneurs looking for opportunities to deploy new networks, or (d) privacy-conscious states trying to minimize the amount of internal communication traversing different jurisdictions.
In this paper we characterize international detours in the Internet during the month of January 2016. To detect detours we sample BGP RIBs every 8 hours from 461 RouteViews and RIPE RIS peers spanning 30 countries. We use geolocation of ASes which geolocates each BGP prefix announced by each AS, mapping its presence at IXPs and geolocation infrastructure IPs. Finally, we analyze each global BGP RIB entry looking for detours. Our analysis shows more than 5K unique BGP prefixes experienced a detour. 132 prefixes experienced more than 50% of the detours. We observe about 544K detours. Detours either last for a few days or persist the entire month. Out of all the detours, more than 90% were transient detours that lasted for 72 hours or less. We also show different countries experience different characteristics of detours.
- Bgpmon geoinfo api. http://geoinfo.bgpmon.io.Google Scholar
- Caida as relationships. http://www.caida.org/data/as-relationships/.Google Scholar
- Packet clearing house ixp datasets. https://prefix.pch.net/applications/ixpdir/menu_download.php.Google Scholar
- Peering db 2.0 api. https://prefix.pch.net/applications/ixpdir/menu_download.php.Google Scholar
- Ruwaifa Anwar, Haseeb Niaz, David Choffnes, Ítalo Cunha, Phillipa Gill, and Ethan Katz-Bassett. Investigating interdomain routing policies in the wild. In Proceedings of the 2015 ACM Internet Measurement Conference, IMC '15, pages 71--77, New York, NY, USA, 2015. ACM. Google ScholarDigital Library
- Jim Cowie. The new threat: Targeted internet traffic misdirection, Nov 2013. http://www.renesys.com/2013/11/mitm-internet-hijacking/.Google Scholar
- Arpit Gupta, Matt Calder, Nick Feamster, Marshini Chetty, Enrico Calandro, and Ethan Katz-Bassett. Peering at the internets frontier: A first look at isp interconnectivity in africa. In Michalis Faloutsos and Aleksandar Kuzmanovic, editors, Passive and Active Measurement, volume 8362 of Lecture Notes in Computer Science, pages 204--213. Springer International Publishing, 2014.Google Scholar
- Josh Karlin, Stephanie Forrest, and Jennifer Rexford. Nation-state routing: Censorship, wiretapping, and BGP. CoRR, abs/0903.3218, 2009.Google Scholar
- Maria Konte, Roberto Perdisci, and Nick Feamster. Aswatch: An as reputation system to expose bulletproof hosting ases. SIGCOMM Comput. Commun. Rev., 45(5):625--638, August 2015. Google ScholarDigital Library
- Matthew Luckie, Young Hyun, and Bradley Huffaker. Traceroute probe method and forward ip path inference. In Proceedings of the 8th ACM SIGCOMM Conference on Internet Measurement, IMC '08, pages 311--324, New York, NY, USA, 2008. ACM. Google ScholarDigital Library
- Jonathan A. Obar and Andrew Clement. Internet Surveillance and Boomerang Routing: A Call for Canadian Network Sovereignty. SSRN Electronic Journal, 2013. Google ScholarCross Ref
- kc claffy Young Hyun, Andre Broido. Traceroute and bgp as path incongruities.Google Scholar
- Yu Zhang, Ricardo Oliveira, Hongli Zhang, and Lixia Zhang. Quantifying the pitfalls of traceroute in as connectivity inference. In Proceedings of the 11th Passive and Active Measurement Conference, PAM'10, pages 91--100, Berlin, Heidelberg, 2010. Springer-Verlag. Google ScholarCross Ref
Index Terms
- Towards characterizing international routing detours
Recommendations
Valuable detours: least-cost anypath routing
In many networks, it is less costly to transmit a packet to any node in a set of neighbors than to one specific neighbor. This observation was previously exploited by opportunistic routing protocols by using single-path routing metrics to assign to each ...
Anonymity on QuickSand: Using BGP to Compromise Tor
HotNets-XIII: Proceedings of the 13th ACM Workshop on Hot Topics in NetworksAnonymity systems like Tor are known to be vulnerable to malicious relay nodes. Another serious threat comes from the Autonomous Systems (ASes) that carry Tor traffic due to their powerful eavesdropping capabilities. Indeed, an AS (or set of colluding ...
On inferring and characterizing internet routing policies
IMC '03: Proceedings of the 3rd ACM SIGCOMM conference on Internet measurementBorder Gateway Protocol allows Autonomous Systems (ASs) to apply diverse routing policies for selecting routes and for propagating reachability information to other ASs. Although a significant number of studies have been focused on the Internet topology,...
Comments