scispace - formally typeset
Proceedings ArticleDOI

IXPs: mapped?

Reads0
Chats0
TLDR
An Internet-wide traceroute study that was specifically designed to shed light on the unknown IXP-specific peering matrices and involves targeted traceroutes from publicly available and geographically dispersed vantage points is reported on.
Abstract
Internet exchange points (IXPs) are an important ingredient of the Internet AS-level ecosystem - a logical fabric of the Internet made up of about 30,000 ASes and their mutual business relationships whose primary purpose is to control and manage the flow of traffic. Despite the IXPs' critical role in this fabric, little is known about them in terms of their peering matrices (i.e., who peers with whom at which IXP) and corresponding traffic matrices (i.e., how much traffic do the different ASes that peer at an IXP exchange with one another). In this paper, we report on an Internet-wide traceroute study that was specifically designed to shed light on the unknown IXP-specific peering matrices and involves targeted traceroutes from publicly available and geographically dispersed vantage points. Based on our method, we were able to discover and validate the existence of about 44K IXP-specific peering links - nearly 18K more links than were previously known. In the process, we also classified all known IXPs depending on the type of information required to detect them. Moreover, in view of the currently used inferred AS-level maps of the Internet that are known to miss a significant portion of the actual AS relationships of the peer-to-peer type, our study provides a new method for augmenting these maps with IXP-related peering links in a systematic and informed manner.

read more

Citations
More filters
Proceedings ArticleDOI

Anatomy of a large european IXP

TL;DR: A first-of-its-kind and in-depth analysis of one of the largest IXPs worldwide based on nine months' worth of sFlow records collected at that IXP in 2011 suggests that these large IXPs can be viewed as a microcosm of the Internet ecosystem itself and argues for a re-assessment of the mental picture the community has about this ecosystem.
Proceedings ArticleDOI

Users get routed: traffic correlation on tor by realistic adversaries

TL;DR: The first analysis of the popular Tor anonymity network that indicates the security of typical users against reasonably realistic adversaries in the Tor network or in the underlying Internet is presented.
Proceedings ArticleDOI

AS relationships, customer cones, and validation

TL;DR: A new algorithm to infer business relationships between ASes using BGP paths, relying on three assumptions about the Internet's inter-domain structure, and evaluating three algorithms for inferring each AS's customer cone, defined as the set of ASes an AS can reach using customer links.
Proceedings ArticleDOI

The Crossfire Attack

TL;DR: The Crossfire attack -- a powerful attack that degrades and often cuts off network connections to a variety of selected server targets (e.g., servers of an enterprise, a city, a state, or a small country) by flooding only a few network links.
Proceedings ArticleDOI

The Internet is flat: modeling the transition from a transit hierarchy to a peering mesh

TL;DR: An agent-based network formation model is studied that captures key aspects of the interdomain ecosystem, viz., interdomain traffic flow and routing, provider and peer selection strategies, geographical constraints, and the economics of transit and peering interconnections.
References
More filters
Proceedings ArticleDOI

On power-law relationships of the Internet topology

TL;DR: These power-laws hold for three snapshots of the Internet, between November 1997 and December 1998, despite a 45% growth of its size during that period, and can be used to generate and select realistic topologies for simulation purposes.
Proceedings ArticleDOI

Heuristics for Internet map discovery

TL;DR: The design of these heuristics and the experiences with Mercator are described, some preliminary analysis of the resulting Internet map is presented, and novel mechanisms for resolving aliases are employed.
Journal ArticleDOI

Taming the torrent: a practical approach to reducing cross-isp traffic in peer-to-peer systems

TL;DR: It is found that the lightweight approach significantly reduces cross-ISP traffic and, over 33% of the time, it selects peers along paths that are within a single autonomous system (AS), and that these high-quality paths can lead to significant improvements in transfer rates.
Journal ArticleDOI

DIMES: let the internet measure itself

TL;DR: The rationale behind DIMES deployment is described, its design trade-offs and algorithmic challenges are discussed, and the structure of the Internet as it seen with DIMes is analyzed.
Proceedings ArticleDOI

Towards an accurate AS-level traceroute tool

TL;DR: Using the BGP tables as a starting point, techniques for improving the IP-to-AS mapping are proposed as an important step toward an AS-level traceroute tool.
Related Papers (5)
Trending Questions (1)
How much traffic through IXPs?

The paper does not provide information about the amount of traffic through IXPs. The paper focuses on discovering and validating IXP-specific peering links and classifying IXPs based on the type of information required to detect them.