SLIDE 61 Stage 1: Build the Customer Cone
23
Full Cone
(state-of-the-art [1])
Customer Cone
(Prefix-level Customer Cone)
Brief overview in this talk See paper for full details
- More permissive
- Aims to minimize false positives
- Acknowledge that intentionally
sacrifices specificity, i.e., inflating the address space considered legitimate
- Limited input BGP data sanitization
- More restrictive
- Aims to be accurate
- Rigorous AS-Path (BGP) sanitization
- Accounts for hybrid relationships and
accommodates traffic engineering practices
Subtleties in Cone Construction
[1] Lichtblau et al. Detection, Classification, and Analysis
- f Inter-domain Traffic with Spoofed Source IP Addresses.
In: ACM IMC, 2017. [2] Luckie et al. AS Relationships, Customer Cones, and Validation. In: ACM IMC, 2013.
Spoofer-IX method
MAC-to-AS mapping traffjc fmow data
list of networks inferred as with and without SAV, with evidence to support IXP data (§5)
bogon prefjxes unassigned prefjxes routable address space per AS
Address space fundamentals(§2.2)
Prefjx-Level Customer Cone Algorithm Traffjc Classifjcation Pipeline AS-Level Customer Cone Algorithm AS Relationship Inference Algorithm prefjx-to-AS mapping AS relationships inferred siblings ASes IXP validation data to check AS-relationships and prefjxes inferred BGP routing data IANA allocated ASes records
Stage 1: Build the Customer Cone
Route Server data Looking Glass Server data
Stage 2: Classify IXP Traffjc
IXP list
(§4.1) (§4.2) (§4)
VLANs mapping (see Flowchart in §4.2 with the details) AS Relationship Inference Algorithm output
Do not distinguish types of
AS-relationships Takes into account the semantics of
AS-relationships [2]