Abstract
Large-scale outages of computer networks, particularly the Internet, can have a significant impact on their users and society in general. There have been a number of theoretical studies of complex network structures that suggest that heterogeneous networks, in terms of node connectivity and load, are more vulnerable to cascading failures than those which are more homogeneous. In this paper, we describe early research into an investigation of whether this thesis holds true for vulnerabilities in the Internet’s inter-domain routing protocol – BGP – in light of different network structures. Specifically, we are investigating the effects of BGP routers creating blackholes – observed phenomena in the Internet in recent years. We describe our evaluation setup, which includes a bespoke topology generator that can fluidly create any topology configuration from the current scale-free AS-level to the investigated homogeneous graphs. We find that network homogeneity as suggested by theory does not protect the overall network from failures in practice, but instead may even be harmful to network operations.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Callaway, D.S., Newman, M.E.J., Strogatz, S.H., Watts, D.J.: Network Robustness and Fragility: Percolation on Random Graphs. Physical Review Letters 85, 5468–5471 (2000)
Cohen, R., Erez, K., ben-Avraham, D., Havlin, S.: Breakdown of the Internet under intentional attack. Physical Review Letters 86 (2001)
Motter, A.E., Lai, Y.-C.: Cascade-based attacks on complex networks. Physical Review E 66 (2002)
Nordström, O., Dovrolis, C.: Beware of BGP attacks. SIGCOMM Comput. Commun. Rev. 34(2), 1–8 (2004)
Rekhter, Y., Li, T., Hares, S.: RFC4271 - A Border Gateway Protocol 4 (BGP-4) (2006) http://tools.ietf.org/html/rfc4271
Zhao, X., Pei, D., Wang, L., Massey, D., Mankin, A., Wu, S.F., Zhang, L.: An Analysis of BGP Multiple Origin AS (MOAS) Conflicts. In: Proceedings of the 1st ACM SIGCOMM Workshop on Internet Measurement (2001)
Bono, V.J.: 7007 Explanation and Apology, http://www.merit.edu/mail.archives/nanog/1997-04/msg00444.html (1997)
YouTube Hijacking: A RIPE NCC RIS case study (2008), http://www.ripe.net/news/study-youtube-hijacking.html
Mao, Z.M., Govindan, R., Varghese, G., Katz, R.H.: Route Flap Damping Exacerbates Internet Routing Convergence. In: Proceedings of the ACM SIGCOMM Conference (2002)
(SSF-NET ), http://www.ssfnet.org/
Hernandez, J.M., Kleiberg, T., Wang, H., Mieghem, P.V.: A Qualitative Comparison of Power Law Generators. In: SPECTS (2007)
Bu, T., Gao, L., Towsley, D.: On characterizing BGP routing table growth. Computer Networks 45(1), 45–54 (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 IFIP International Federation for Information Processing
About this paper
Cite this paper
Doerr, C., Smith, P., Hutchison, D. (2009). Network Heterogeneity and Cascading Failures – An Evaluation for the Case of BGP Vulnerability. In: Spyropoulos, T., Hummel, K.A. (eds) Self-Organizing Systems. IWSOS 2009. Lecture Notes in Computer Science, vol 5918. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-10865-5_19
Download citation
DOI: https://doi.org/10.1007/978-3-642-10865-5_19
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-10864-8
Online ISBN: 978-3-642-10865-5
eBook Packages: Computer ScienceComputer Science (R0)