skip to main content
research-article
Public Access

Automatic Inference of BGP Location Communities

Authors Info & Claims
Published:28 February 2022Publication History
Skip Abstract Section

Abstract

The Border Gateway Protocol (BGP) orchestrates Internet communications between and inside Autonomous Systems. BGP's flexibility allows operators to express complex policies and deploy advanced traffic engineering systems. A key mechanism to provide this flexibility is tagging route announcements with BGP communities, which have arbitrary, operator-defined semantics, to pass information or requests from router to router. Typical uses of BGP communities include attaching metadata to route announcements, such as where a route was learned or whether it was received from a customer, and controlling route propagation, for example to steer traffic to preferred paths or blackhole DDoS traffic. However, there is no standard for specifying the semantics nor a centralized repository that catalogs the meaning of BGP communities. The lack of standards and central repositories complicates the use of communities by the operator and research communities. In this paper, we present a set of techniques to infer the semantics of BGP communities from public BGP data. Our techniques infer communities related to the entities or locations traversed by a route by correlating communities with AS paths. We also propose a set of heuristics to filter incorrect inferences introduced by misbehaving networks, sharing of BGP communities among sibling autonomous systems, and inconsistent BGP dumps. We apply our techniques to billions of routing records from public BGP collectors and make available a public database with more than 15 thousand location communities. Our comparison with manually-built databases shows our techniques provide high precision (up to 93%), better coverage (up to 81% recall), and dynamic updates, complementing operators' and researchers' abilities to reason about BGP community semantics.

References

  1. Ruwaifa Anwar, Haseeb Niaz, David Choffnes, Ítalo Cunha, Phillipa Gill, and Ethan Katz-Bassett. 2015. Investigating Interdomain Routing Policies in the Wild. In Proceedings of the 2015 Internet Measurement Conference. ACM, Tokyo, Japan, 71--77. https://doi.org/10.1145/2815675.2815712Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Henry Birge-Lee, Liang Wang, Jennifer Rexford, and Prateek Mittal. 2019. SICO: Surgical Interception Attacks by Manipulating BGP Communities. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (CCS '19). ACM Press, London, United Kingdom, 431--448. https://doi.org/10.1145/3319535.3363197Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. CAIDA. 2021 a. CAIDA's AS-Organization Dataset. http://data.caida.org/datasets/as-organizations/. [Online; accessed 11-Oct-2021].Google ScholarGoogle Scholar
  4. CAIDA. 2021 b. CAIDA's Geolocation Dataset. https://www.caida.org/catalog/datasets/bgp-communities/. [Online; accessed 11-Oct-2021].Google ScholarGoogle Scholar
  5. R Chandra, P Traina, and T Li. 1996. BGP Communities Attribute. Technical Report. RFC 1997, August.Google ScholarGoogle Scholar
  6. Yi-Ching Chiu, Brandon Schlinker, Abhishek Balaji Radhakrishnan, Ethan Katz-Bassett, and Ramesh Govindan. 2015. Are We One Hop Away from a Better Internet?. In Proceedings of the 2015 ACM Conference on Internet Measurement Conference (IMC '15). ACM Press, Tokyo, Japan, 523--529. https://doi.org/10.1145/2815675.2815719Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Shinyoung Cho, Romain Fontugne, Kenjiro Cho, Alberto Dainotti, and Phillipa Gill. 2019. BGP Hijacking Classification. In 2019 Network Traffic Measurement and Analysis Conference (TMA). IEEE, Paris, France, 25--32. https://doi.org/10.23919/TMA.2019.8784511Google ScholarGoogle Scholar
  8. Federal Communications Commission. 2021. FCC: Global Crossing and Level 3 Proposed Merger . https://www.fcc.gov/proceedings-actions/mergers-transactions/global-crossing-ltd-and-citizens-communications-company [Online; accessed 11-Oct-2021].Google ScholarGoogle Scholar
  9. Amogh Dhamdhere, David D. Clark, Alexander Gamero-Garrido, Matthew Luckie, Ricky KP Mok, Gautam Akiwate, Kabir Gogia, Vaibhav Bajpai, Alex C. Snoeren, and Kc Claffy. 2018. Inferring Persistent Interdomain Congestion. In Proceedings of the 2018 Conference of the ACM Special Interest Group on Data Communication (SIGCOMM '18). ACM, Budapest, Hungary, 1--15. https://doi.org/10.1145/3230543.3230549Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Xenofontas Dimitropoulos, Dmitri Krioukov, Marina Fomenkov, Bradley Huffaker, Young Hyun, KC Claffy, and George Riley. 2007. AS Relationships: Inference and Validation . ACM SIGCOMM Computer Communication Review , Vol. 37, 1 (2007), 29--40. https://doi.org/10.1145/1198255.1198259Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Benoit Donnet and Olivier Bonaventure. 2008. On BGP Communities . ACM SIGCOMM Computer Communication Review , Vol. 38, 2 (2008), 55--59.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Anja Feldmann, Olaf Maennel, Z. Morley Mao, Arthur Berger, and Bruce Maggs. 2004. Locating Internet Routing Instabilities. In Proceedings of the 2004 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (Portland, Oregon, USA) (SIGCOMM '04). ACM, New York, NY, USA, 205--218. https://doi.org/10.1145/1015467.1015491Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Lixin Gao. 2001. On Inferring Autonomous System Relationships in the Internet . IEEE/ACM Transactions on Networking , Vol. 9, 6 (2001), 733--745. https://doi.org/10.1109/90.974527Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Lixin Gao and Jennifer Rexford. 2001. Stable Internet Routing Without Global Coordination . IEEE/ACM Transactions on Networking , Vol. 9, 6 (2001), 12. https://doi.org/10.1109/90.974523Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Michael R. Garey and David S. Johson. 1979. Computers and Intractability -- A Guide to the Theory of NP-Completeness. W. H. Freeman and Company, New York, NY.Google ScholarGoogle Scholar
  16. GBLX. 2021. GBLX Customer BGP Communities . https://onestep.net/communities/as3549/Google ScholarGoogle Scholar
  17. Phillipa Gill, Michael Schapira, and Sharon Goldberg. 2011. Let the Market Drive Deployment: A Strategy for Transitioning to BGP Security. In Proceedings of the ACM SIGCOMM 2011 Conference (Toronto, Ontario, Canada) (SIGCOMM '11). Association for Computing Machinery, New York, NY, USA, 14--25. https://doi.org/10.1145/2018436.2018439Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Vasileios Giotsas, Christoph Dietzel, Georgios Smaragdakis, Anja Feldmann, Arthur Berger, and Emile Aben. 2017a. Detecting Peering Infrastructure Outages in the Wild. In Proceedings of the Conference of the ACM Special Interest Group on Data Communication. ACM, New York, NY, USA, 446--459. https://doi.org/10.1145/3098822.3098855 event-place: Los Angeles, CA, USA.Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Vasileios Giotsas, Thomas Koch, Elverton Fazzion, Ítalo Cunha, Matt Calder, Harsha V Madhyastha, and Ethan Katz-Bassett. 2020. Reduce, Reuse, Recycle: Repurposing Existing Measurements to Identify Stale Traceroutes. In Proceedings of the ACM Internet Measurement Conference (Virtual Event, USA) (IMC '20). ACM Press, New York, NY, USA, 247--265. https://doi.org/10.1145/3419394.3423654Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Vasileios Giotsas, Matthew Luckie, Bradley Huffaker, and kc claffy. 2014. Inferring Complex AS Relationships. In Proceedings of the ACM Internet Measurement Conference (Vancouver, BC, Canada) (IMC '14). ACM Press, New York, NY, USA, 23--30. https://doi.org/10.1145/2663716.2663743Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Vasileios Giotsas, Georgios Smaragdakis, Christoph Dietzel, Philipp Richter, Anja Feldmann, and Arthur Berger. 2017b. Inferring BGP Blackholing Activity in the Internet. In Proceedings of the ACM Internet Measurement Conference (London, United Kingdom) (IMC '17). ACM Press, New York, NY, USA, 1--14. https://doi.org/10.1145/3131365.3131379Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Vasileios Giotsas, Georgios Smaragdakis, Bradley Huffaker, Matthew Luckie, and kc claffy. 2015. Mapping Peering Interconnections to a Facility. In Proceedings of the 11th ACM Conference on Emerging Networking Experiments and Technologies (Heidelberg, Germany) (CoNEXT '15). ACM Press, New York, NY, USA, Article 37, bibinfonumpages13 pages. https://doi.org/10.1145/2716281.2836122Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Vasileios Giotsas, Shi Zhou, Matthew Luckie, and kc claffy. 2013. Inferring Multilateral Peering. In Proceedings of the 9th ACM conference on Emerging Networking Experiments and Technologies (Santa Barbara, California, USA) (CoNEXT '13). ACM Press, New York, NY, USA, 247--258. https://doi.org/10.1145/2535372.2535390Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Enrico Gregori, Alessandro Improta, Luciano Lenzini, Lorenzo Rossi, and Luca Sani. 2011. BGP and Inter-AS Economic Relationships. In International Conference on Research in Networking. Springer, Springer, Valencia, Spain, 54--67.Google ScholarGoogle Scholar
  25. Enrico Gregori, Alessandro Improta, and Luca Sani. 2016. Isolario: A Do-ut-des Approach to Improve the Appeal of BGP Route Collecting. (2016).Google ScholarGoogle Scholar
  26. J Heitz, J Snijders, K Patel, I Bagdonas, and N Hilliard. 2017. RFC8092: BGP Large Communities Attribute . https://www.rfc-editor.org/rfc/rfc8092.txtGoogle ScholarGoogle Scholar
  27. Robert V Hogg, Joseph McKean, and Allen T Craig. 2005. Introduction to Mathematical Statistics. Pearson Education, Upper Saddle River, N.J.Google ScholarGoogle Scholar
  28. Packet Clearing House. 2005. Packet Clearing House.Google ScholarGoogle Scholar
  29. Geoff Huston. 2004. NOPEER Community for Border Gateway Protocol (BGP) Route Scope Control . RFC 3765. https://doi.org/10.17487/RFC3765Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Yuchen Jin, Colin Scott, Amogh Dhamdhere, Vasileios Giotsas, Arvind Krishnamurthy, and Scott Shenker. 2019. Stable and Practical AS Relationship Inference with ProbLink. In 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI 19) . USENIX Association, Boston, MA, 581--598. https://www.usenix.org/conference/nsdi19/presentation/jinGoogle ScholarGoogle Scholar
  31. The Wall Street Journal. 2021. Connecting the Fiber Glut: Level 3 to Buy Rival Global Crossing in Stock Deal Valued at $1.9$ Billion . https://www.wsj.com/articles/SB10001424052748704529204576256541491117496 [Online; accessed 11-Oct-2021].Google ScholarGoogle Scholar
  32. Brivaldo A. Silva Junior, Paulo Mol, Osvaldo Fonseca, Ítalo Cunha, Ronaldo A. Ferreira, and Ethan Katz-Bassett. 2021. BGP Communities -- Supplemental Material . https://github.com/TopoMapping/bgp-communitiesGoogle ScholarGoogle Scholar
  33. Richard M. Karp. 1972. Reducibility among Combinatorial Problems .Springer US, Boston, MA, 85--103. https://doi.org/10.1007/978--1--4684--2001--2_9Google ScholarGoogle Scholar
  34. Ethan Katz-Bassett, Colin Scott, David R. Choffnes, Ítalo Cunha, Vytautas Valancius, Nick Feamster, Harsha V. Madhyastha, Thomas Anderson, and Arvind Krishnamurthy. 2012. LIFEGUARD: Practical Repair of Persistent Route Failures. In Proceedings of the 2012 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM '12). ACM Press, New York, NY, USA, 395--406. https://doi.org/10.1145/2377677.2377756Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Thomas King, Christoph Dietzel, Job Snijders, Gert Doering, and Greg Hankins. 2016. BLACKHOLE Community . RFC 7999. https://doi.org/10.17487/RFC7999Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Maria Konte, Roberto Perdisci, and Nick Feamster. 2015. ASwatch: An AS Reputation System to Expose Bulletproof Hosting ASes. In Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication (London, United Kingdom) (SIGCOMM '15). ACM Press, New York, NY, USA, 625--638. https://doi.org/10.1145/2785956.2787494Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Thomas Krenc, Robert Beverly, and Georgios Smaragdakis. 2020. Keep Your Communities Clean: Exploring the Routing Message Impact of BGP Communities. In Proceedings of the 16th International Conference on Emerging Networking EXperiments and Technologies (Barcelona, Spain). ACM Press, New York, NY, USA, 443--450. https://doi.org/10.1145/3386367.3432731Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Thomas Krenc, Robert Beverly, and Georgios Smaragdakis. 2021. AS-Level BGP Community Usage Classification. In Proceedings of the 21st ACM Internet Measurement Conference (Virtual Event) (IMC '21). Association for Computing Machinery, New York, NY, USA, 577--592. https://doi.org/10.1145/3487552.3487865Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Tony Li, Ravi Chandra, and Paul S. Traina. 1996. BGP Communities Attribute . RFC 1997. https://doi.org/10.17487/RFC1997Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. Zhihao Li, Dave Levin, Neil Spring, and Bobby Bhattacharjee. 2018. Internet Anycast: Performance, Problems, & Potential. In Proceedings of the 2018 Conference of the ACM Special Interest Group on Data Communication (SIGCOMM '18). ACM Press, Budapest, Hungary, 59--73. https://doi.org/10.1145/3230543.3230547Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. Matthew Luckie, Bradley Huffaker, Amogh Dhamdhere, Vasileios Giotsas, and kc claffy. 2013. AS Relationships, Customer Cones, and Validation. In Proceedings of the 2013 Conference on Internet Measurement Conference (Barcelona, Spain) (IMC '13). ACM Press, New York, NY, USA, 243--256. https://doi.org/10.1145/2504730.2504735Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. David Meyer. 1997. University of Oregon Route Views Archive Project.Google ScholarGoogle Scholar
  43. Felix Mölder, Kim Philipp Jablonski, Brice Letcher, Michael B Hall, Christopher H Tomkins-Tinch, Vanessa Sochat, Jan Forster, Soohyun Lee, Sven O Twardziok, Alexander Kanitz, et almbox. 2021. Sustainable Data Analysis with Snakemake . F1000Research , Vol. 10 (2021), 10--33.Google ScholarGoogle Scholar
  44. Bruno Quoitin and Olivier Bonaventure. 2002. A Survey of the Utilization of the BGP Community Attribute. Internet-Draft draft-quoitin-bgp-comm-survey-00. Internet Engineering Task Force. Work in Progress.Google ScholarGoogle Scholar
  45. Bruno Quoitin, Steve Uhlig, and Olivier Bonaventure. 2002. Using Redistribution Communities for Interdomain Traffic Engineering. In Proceedings of the 3rd International Conference on Quality of Future Internet Services and Internet Charging and QoS Technologies 2nd International Conference on From QoS Provisioning to QoS Charging (Zurich, Switzerland) (QofIS'02/ICQT'02). Springer-Verlag, Berlin, Heidelberg, 125--134.Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. Yakov Rekhter. 2006. RFC 4271: A Border Gateway Protocol 4 (BGP-4) . https://www.rfc-editor.org/rfc/rfc4271Google ScholarGoogle Scholar
  47. NCC RIPE. 2021. RIPE RIS Project .Google ScholarGoogle Scholar
  48. M. Roughan, W. Willinger, O. Maennel, D. Perouli, and R. Bush. 2011. 10 Lessons from 10 Years of Measuring and Modeling the Internet's Autonomous Systems . IEEE Journal on Selected Areas in Communications , Vol. 29, 9 (Oct. 2011), 1810--1821. https://doi.org/10.1109/JSAC.2011.111006Google ScholarGoogle ScholarCross RefCross Ref
  49. Johann Schlamp, Ralph Holz, Quentin Jacquemart, Georg Carle, and Ernst W. Biersack. 2016. HEAP: Reliable Assessment of BGP Hijacking Attacks . IEEE Journal on Selected Areas in Communications , Vol. 34, 6 (2016), 1849--1861. https://doi.org/10.1109/JSAC.2016.2558978Google ScholarGoogle ScholarCross RefCross Ref
  50. Brandon Schlinker, Hyojeong Kim, Timothy Cui, Ethan Katz-Bassett, Harsha V. Madhyastha, Italo Cunha, James Quinn, Saif Hasan, Petr Lapukhov, and Hongyi Zeng. 2017. Engineering Egress with Edge Fabric: Steering Oceans of Content to the World. In Proceedings of the Conference of the ACM Special Interest Group on Data Communication (Los Angeles, CA, USA) (SIGCOMM '17). ACM Press, New York, NY, USA, 418--431. https://doi.org/10.1145/3098822.3098853Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. Pavlos Sermpezis, Vasileios Kotronis, Petros Gigis, Xenofontas Dimitropoulos, Danilo Cicalese, Alistair King, and Alberto Dainotti. 2018. ARTEMIS: Neutralizing BGP Hijacking within a Minute . IEEE/ACM Transactions on Networking , Vol. 26, 6 (2018), 2471--2486. https://doi.org/10.1109/TNET.2018.2869798Google ScholarGoogle ScholarDigital LibraryDigital Library
  52. Petr Slav'ik. 1996. A Tight Analysis of the Greedy Algorithm for Set Cover. In ACM STOC (STOC '96). ACM, Philadelphia, Pennsylvania, USA, 435--441.Google ScholarGoogle ScholarDigital LibraryDigital Library
  53. One Step. 2021 a. AS3257 Public Information. https://onestep.net/communities/as3257/. [Online; accessed 11-Oct-2021].Google ScholarGoogle Scholar
  54. One Step. 2021 b. AS3491 Public Information. https://onestep.net/communities/as3491/. [Online; accessed 11-Oct-2021].Google ScholarGoogle Scholar
  55. One Step. 2022. One Step . https://onestep.net/communities/Google ScholarGoogle Scholar
  56. Florian Streibelt, Franziska Lichtblau, Robert Beverly, Anja Feldmann, Cristel Pelsser, Georgios Smaragdakis, and Randy Bush. 2018. BGP Communities: Even More Worms in the Routing Can. In Proceedings of the Internet Measurement Conference 2018 (Boston, MA, USA) (IMC '18). ACM, New York, NY, USA, 279--292. https://doi.org/10.1145/3278532.3278557Google ScholarGoogle ScholarDigital LibraryDigital Library
  57. Alaa Tharwat. 2020. Classification Assessment Methods. Applied Computing and Informatics , Vol. 17, 1 (2020), 168--192.Google ScholarGoogle ScholarCross RefCross Ref
  58. Internet Tools. 2021. Whois Servers List . https://www.mobilefish.com/tutorials/whois_servers_list/ whois_servers_list.htmlGoogle ScholarGoogle Scholar
  59. Feng Wang and Lixin Gao. 2007. On Inferring and Characterizing Internet Routing Policies. Journal of Communications and Networks , Vol. 9, 4 (2007), 350--355. https://doi.org/10.1109/JCN.2007.6182869Google ScholarGoogle ScholarCross RefCross Ref
  60. The Free Encyclopedia Wikipedia. 2021 a. Tier 1 Network . https://en.wikipedia.org/wiki/Tier_1_network [Online; accessed 11-Oct-2021].Google ScholarGoogle Scholar
  61. The Free Encyclopedia Wikipedia. 2021 b. Tier 2 Network . https://en.wikipedia.org/wiki/Tier_2_network [Online; accessed 11-Oct-2021].Google ScholarGoogle Scholar
  62. Jianhong Xia and Lixin Gao. 2004. On the Evaluation of AS Relationship Inferences [Internet Reachability/Traffic Flow Applications]. In IEEE Global Telecommunications Conference, 2004. GLOBECOM '04., Vol. 3. IEEE, Dallas, TX, USA, 1373--1377 Vol.3. https://doi.org/10.1109/GLOCOM.2004.1378209Google ScholarGoogle Scholar
  63. Kok-Kiong Yap, Murtaza Motiwala, Jeremy Rahe, Steve Padgett, Matthew Holliman, Gary Baldus, Marcus Hines, Taeeun Kim, Ashok Narayanan, and Ankur Jain. 2017. Taking the Edge off with Espresso: Scale, Reliability and Programmability for Global Internet Peering. In Proceedings of the Conference of the ACM Special Interest Group on Data Communication (Los Angeles, CA, USA) (SIGCOMM '17). ACM Press, New York, NY, USA, 432--445. https://doi.org/10.1145/3098822.3098854Google ScholarGoogle ScholarDigital LibraryDigital Library
  64. Ying Zhang and Mallik Tatipamula. 2011. Characterization and Design of Effective BGP AS-path Prepending. In 2011 19th IEEE International Conference on Network Protocols. IEEE, Dallas, TX, USA, 59--68. https://doi.org/10.1109/ICNP.2011.6089082Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Automatic Inference of BGP Location Communities

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image Proceedings of the ACM on Measurement and Analysis of Computing Systems
        Proceedings of the ACM on Measurement and Analysis of Computing Systems  Volume 6, Issue 1
        POMACS
        March 2022
        695 pages
        EISSN:2476-1249
        DOI:10.1145/3522731
        Issue’s Table of Contents

        Copyright © 2022 ACM

        © 2022 Association for Computing Machinery. ACM acknowledges that this contribution was authored or co-authored by an employee, contractor or affiliate of a national government. As such, the Government retains a nonexclusive, royalty-free right to publish or reproduce this article, or to allow others to do so, for Government purposes only.

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 28 February 2022
        Published in pomacs Volume 6, Issue 1

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader