Abstract
Accurate prediction of network paths between arbitrary hosts on the Internet is of vital importance for network operators, cloud providers, and academic researchers. We present PredictRoute, a system that predicts network paths between hosts on the Internet using historical knowledge of the data and control plane. In addition to feeding on freely available traceroutes and BGP routing tables, PredictRoute optimally explores network paths towards chosen BGP prefixes. PredictRoute's strategy for exploring network paths discovers 4X more autonomous system (AS) hops than other well-known strategies used in practice today. Using a corpus of traceroutes, PredictRoute trains probabilistic models of routing towards prefixes on the Internet to predict network paths and their likelihood. PredictRoute's AS-path predictions differ from the measured path by at most 1 hop, 75% of the time. We expose PredictRoute's path prediction capability via a REST API to facilitate its inclusion in other applications and studies. We additionally demonstrate the utility of PredictRoute in improving real-world applications for circumventing Internet censorship and preserving anonymity online.
Supplemental Material
- CAIDA's Prefix to ASN dataset. https://www.caida.org/data/routing/routeviews-prefix2as.xml.Google Scholar
- Peeringdb. https://www.peeringdb.com/.Google Scholar
- Y. Afek, O. Ben-Shalom, and A. Bremler-Barr. On the structure and application of bgp policy atoms. In Proceedings of the 2Nd ACM SIGCOMM Workshop on Internet Measurment, IMW '02, pages 209--214, New York, NY, USA, 2002. ACM.Google Scholar
Digital Library
- R. Anwar, H. Niaz, D. Choffnes, I. Cunha, P. Gill, and E. Katz-Bassett. Investigating interdomain routing policies in the wild. In ACM IMC, 2015.Google Scholar
Digital Library
- A. Asadpour and H. Nazerzadeh. Maximizing stochastic monotone submodular functions. Management Science, 62(8):2374--2391, 2016.Google Scholar
Cross Ref
- A. Barton and M. Wright. Denasa: Destination-naive as-awareness in anonymous communications. Proceedings on Privacy Enhancing Technologies, 2016(4):356--372, 2016.Google Scholar
Cross Ref
- CAIDA Ark. http://www.caida.org/projects/ark/.Google Scholar
- CAIDA AS Relationship dataset. http://data.caida.org/datasets/as-relationships/.Google Scholar
- K. Chen, D. R. Choffnes, R. Potharaju, Y. Chen, F. E. Bustamante, D. Pei, and Y. Zhao. Where the sidewalk ends: Extending the internet as graph using traceroutes from p2p users. In Proceedings of the 5th International Conference on Emerging Networking Experiments and Technologies, CoNEXT '09, pages 217--228, New York, NY, USA, 2009. ACM.Google Scholar
Digital Library
- Y. Chiu, B. Schlinker, A. Radhakrishnan, and E. Katz-Bassett. Are we one hop away from a better Internet? In Proceedings of the 2015 ACM Conference on Internet Measurement Conference, pages 71--77. ACM, 2015.Google Scholar
Digital Library
- R. Dingledine, N. Mathewson, and P. Syverson. Tor: The second-generation onion router. Technical report, Naval Research Lab Washington DC, 2004.Google Scholar
- U. Feige. A threshold of ln n for approximating set cover. J. ACM, 45(4):634--652, July 1998.Google Scholar
Digital Library
- T. Flach, E. Katz-Bassett, and R. Govindan. Quantifying violations of destination-based forwarding on the internet. In IMC '12, 2012.Google Scholar
Digital Library
- S. Frolov, F. Douglas, W. Scott, A. McDonald, B. VanderSloot, R. Hynes, A. Kruger, M. Kallitsis, D. G. Robinson, S. Schultze, et al. An isp-scale deployment of tapdance. In 7th $$USENIX$$ Workshop on Free and Open Communications on the Internet (FOCI 17), 2017.Google Scholar
- L. Gao and J. Rexford. Stable Internet routing without global coordination. 2001.Google Scholar
- P. Gill, M. Arlitt, Z. Li, and A. Mahanti. The flattening internet topology: Natural evolution, unsightly barnacles or contrived collapse? In International Conference on Passive and Active Network Measurement, pages 1--10. Springer, 2008.Google Scholar
Digital Library
- P. Gill, M. Schapira, and S. Goldberg. Let the market drive deployment: A strategy for transitioning to bgp security. SIGCOMM Comput. Commun. Rev., 41(4):14--25, Aug. 2011.Google Scholar
Digital Library
- P. Gill, M. Schapira, and S. Goldberg. Modeling on quicksand: Dealing with the scarcity of ground truth in interdomain routing data. ACM SIGCOMM Computer Communication Review, 42(1):40--46, 2012.Google Scholar
Digital Library
- P. Gill, M. Schapira, and S. Goldberg. A survey of interdomain routing policies. In ACM Computer Communications Review (CCR)., Jan 2014.Google Scholar
- V. Giotsas, M. Luckie, B. Huffaker, and kc claffy. Inferring complex AS relationships. In ACM IMC, 2014.Google Scholar
- T. Holterbach, C. Pelsser, R. Bush, and L. Vanbever. Quantifying interference between measurements on the RIPE Atlas platform. In ACM IMC, 2015.Google Scholar
Digital Library
- J. Karlin, S. Forrest, and J. Rexford. Autonomous security for autonomous systems. Computer Networks, oct 2008.Google Scholar
- E. Katz-Bassett, H. Madhyastha, V. Adhikari, C. Scott, J. Sherry, P. van Wesep, A. Krishnamurthy, and T. Anderson. Reverse traceroute. In USENIX Symposium on Networked Systems Design & Implementation (NSDI), 2010.Google Scholar
Digital Library
- E. Katz-Bassett, P. Marchetta, M. Calder, Y.-C. Chiu, I. Cunha, H. Madhyastha, and V. Giotsas. Sibyl: A practical internet route oracle. In USENIX NSDI, 2016.Google Scholar
- V. Krishnamurthy, M. Faloutsos, M. Chrobak, L. Lao, J.-H. Cui, and A. G. Percus. Sampling large Internet topologies for simulation purposes. 2007.Google Scholar
Digital Library
- H. V. Madhyastha, T. Isdal, M. Piatek, C. Dixon, T. Anderson, A. Krishnamurthy, and A. Venkataramani. iPlane: An Information Plane for Distributed Services. In Proc. of Operatings System Design and Implementation, 2006.Google Scholar
Digital Library
- H. V. Madhyastha, E. Katz-Bassett, T. E. Anderson, A. Krishnamurthy, and A. Venkataramani. iplane nano: Path prediction for peer-to-peer applications. In NSDI, volume 9, pages 137--152, 2009.Google Scholar
- R. Nithyanand, R. Singh, S. Cho, and P. Gill. Holding all the ases: Identifying and circumventing the pitfalls of as-aware tor client design. CoRR, abs/1605.03596, 2016.Google Scholar
- Raspberry Pi. https://www.raspberrypi.org/.Google Scholar
- RIPE Atlas. https://atlas.ripe.net/.Google Scholar
- Rule Based Learning Ensembles. https://statweb.stanford.edu/ jhf/R_RuleFit.html.Google Scholar
- R. Singh and P. Gill. Pathcache: A path prediction toolkit. In Proceedings of the 2016 ACM SIGCOMM Conference, SIGCOMM '16, page 569--570, New York, NY, USA, 2016. Association for Computing Machinery.Google Scholar
Digital Library
- O. Starov, R. Nithyanand, A. Zair, P. Gill, and M. Schapira. Measuring and mitigating as-level adversaries against tor. In NDSS, 2016.Google Scholar
- Y. Sun, A. Edmundson, L. Vanbever, O. Li, J. Rexford, M. Chiang, and P. Mittal. Raptor: Routing attacks on privacy in tor. In 24th USENIX Security Symposium (USENIX Security 15), pages 271--286, Washington, D.C., Aug. 2015. USENIX Association.Google Scholar
Digital Library
- M. Wojciechowski. Border gateway protocol modeling and simulation. master's thesis. 2008.Google Scholar
- E. Wustrow, S. Wolchok, I. Goldberg, and J. A. Halderman. Telex: Anticensorship in the network infrastructure. In Proceedings of the 20th USENIX Conference on Security, SEC'11, pages 30--30, Berkeley, CA, USA, 2011. USENIX Association.Google Scholar
- E. Wustrow, S. Wolchok, I. Goldberg, and J. A. Halderman. Telex: Anticensorship in the network infrastructure. In Proceedings of the 20th USENIX Conference on Security, SEC'11, pages 30--30, Berkeley, CA, USA, 2011. USENIX Association.Google Scholar
- J. Y. Yen. Finding the k shortest loopless paths in a network. Management Science, 17(11):712--716, 1971.Google Scholar
Digital Library
Index Terms
PredictRoute: A Network Path Prediction Toolkit
Recommendations
PredictRoute: A Network Path Prediction Toolkit
SIGMETRICS '21: Abstract Proceedings of the 2021 ACM SIGMETRICS / International Conference on Measurement and Modeling of Computer SystemsAccurate prediction of network paths between arbitrary hosts on the Internet is of vital importance for network operators, cloud providers, and academic researchers. We present PredictRoute, a system that predicts network paths between hosts on the ...
PredictRoute: A Network Path Prediction Toolkit
SIGMETRICS '21Accurate prediction of network paths between arbitrary hosts on the Internet is of vital importance for network operators, cloud providers, and academic researchers. We present PredictRoute, a system that predicts network paths between hosts on the ...
An active approach to measuring routing dynamics induced by autonomous systems
ExpCS '07: Proceedings of the 2007 workshop on Experimental computer scienceWe present an active measurement study of the routing dynamics induced by AS-path prepending, a common method for controlling the inbound traffic of a multi-homed ISP. Unlike other inter-domain inbound traffic engineering methods, AS-path prepending not ...






Comments