On power-law relationships of the Internet topology
Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communication
Agent System for Inter-AS Routing Error Diagnosis
IEEE Internet Computing
Policy-based BGP control architecture for autonomous routing management
Proceedings of the 2006 SIGCOMM workshop on Internet network management
PHAS: a prefix hijack alert system
USENIX-SS'06 Proceedings of the 15th conference on USENIX Security Symposium - Volume 15
Pretty Good BGP: Improving BGP by Cautiously Adopting Routes
ICNP '06 Proceedings of the Proceedings of the 2006 IEEE International Conference on Network Protocols
Detection and diagnosis of Inter-AS routing anomalies by cooperative intelligent agents
DSOM'05 Proceedings of the 16th IFIP/IEEE Ambient Networks international conference on Distributed Systems: operations and Management
Application of a Massively Multi-Agent System to Internet Routing Management
Massively Multi-Agent Technology
Diagnosis of IP-Service Anomalies Based on BGP-Update Temporal Analysis
IPOM '08 Proceedings of the 8th IEEE international workshop on IP Operations and Management
Hi-index | 0.00 |
Diagnosis of anomalous routing states is essential for stable inter-AS (autonomous system) routing management, but it is difficult to perform such actions because inter-AS routing information changes spatially and temporally in different administrative domains. In particular, the route hijack problem, which is one of the major routing-management issues, remains difficult to analyze because of its diverse distribution dynamism. Although a multi-agent-based diagnostic system that can diagnose a set of routing anomalies by integrating the observed routing statuses among distributed agents has been successfully applied to real Internet service providers, the diagnostic accuracy depends on where those agents are located on the BGP topology map. This paper focuses on the AS adjacency topology of an actual network structure and analyzes hijacked-route behavior from the viewpoint of the connectivity of each AS. Simulation results using an actual Internet topology show the effectiveness of an agent-deployment strategy based on connectivity information.