Towards an accurate AS-level traceroute tool
Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications
Collecting the internet AS-level topology
ACM SIGCOMM Computer Communication Review
Visualizing Internet Routing Changes
IEEE Transactions on Visualization and Computer Graphics
VAST: visualizing autonomous system topology
Proceedings of the 3rd international workshop on Visualization for computer security
PHAS: a prefix hijack alert system
USENIX-SS'06 Proceedings of the 15th conference on USENIX Security Symposium - Volume 15
Observing the evolution of internet as topology
Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications
In search of the elusive ground truth: the internet's as-level connectivity structure
SIGMETRICS '08 Proceedings of the 2008 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
NetReview: detecting when interdomain routing goes wrong
NSDI'09 Proceedings of the 6th USENIX symposium on Networked systems design and implementation
Safeguarding data delivery by decoupling path propagation and adoption
INFOCOM'10 Proceedings of the 29th conference on Information communications
How secure are secure interdomain routing protocols
Proceedings of the ACM SIGCOMM 2010 conference
Let the market drive deployment: a strategy for transitioning to BGP security
Proceedings of the ACM SIGCOMM 2011 conference
Exposing a nation-centric view on the german internet --- a change in perspective on AS-Level
PAM'12 Proceedings of the 13th international conference on Passive and Active Measurement
A workflow for differentially-private graph synthesis
Proceedings of the 2012 ACM workshop on Workshop on online social networks
Provable security of S-BGP and other path vector protocols: model, analysis and extensions
Proceedings of the 2012 ACM conference on Computer and communications security
Detecting prefix hijackings in the internet with argus
Proceedings of the 2012 ACM conference on Internet measurement conference
Concurrent prefix hijacks: occurrence and impacts
Proceedings of the 2012 ACM conference on Internet measurement conference
Classifying internet one-way traffic
Proceedings of the 2012 ACM conference on Internet measurement conference
Characterizing large-scale routing anomalies: a case study of the china telecom incident
PAM'13 Proceedings of the 14th international conference on Passive and Active Measurement
BGP security in partial deployment: is the juice worth the squeeze?
Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM
Sign what you really care about - Secure BGP AS-paths efficiently
Computer Networks: The International Journal of Computer and Telecommunications Networking
A survey of interdomain routing policies
ACM SIGCOMM Computer Communication Review
Hi-index | 0.00 |
In this paper we present Cyclops, a system that collects and displays information of AS-level connectivity extracted from looking glasses, route-servers and BGP tables and updates of hundreds of routers across the Internet. From an operational standpoint, Cyclops provides ISPs a view of how their connectivity is perceived from the outside, enabling a comparison between their observed connectivity and their intended connectivity. ISPs can use the tool to detect and diagnose BGP misconfigurations, route leakages or hijacks based on false AS path. From a research standpoint, Cyclops is able to provide a quick snapshot of the AS-level connectivity of each network, and provides mechanisms to infer the root cause of BGP (de)peerings, which is an important input to the study of AS-level topology models and inter-domain routing protocols.