skip to main content
research-article
Public Access

PredictRoute: A Network Path Prediction Toolkit

Authors Info & Claims
Published:04 June 2021Publication History
Skip Abstract Section

Abstract

Accurate prediction of network paths between arbitrary hosts on the Internet is of vital importance for network operators, cloud providers, and academic researchers. We present PredictRoute, a system that predicts network paths between hosts on the Internet using historical knowledge of the data and control plane. In addition to feeding on freely available traceroutes and BGP routing tables, PredictRoute optimally explores network paths towards chosen BGP prefixes. PredictRoute's strategy for exploring network paths discovers 4X more autonomous system (AS) hops than other well-known strategies used in practice today. Using a corpus of traceroutes, PredictRoute trains probabilistic models of routing towards prefixes on the Internet to predict network paths and their likelihood. PredictRoute's AS-path predictions differ from the measured path by at most 1 hop, 75% of the time. We expose PredictRoute's path prediction capability via a REST API to facilitate its inclusion in other applications and studies. We additionally demonstrate the utility of PredictRoute in improving real-world applications for circumventing Internet censorship and preserving anonymity online.

Skip Supplemental Material Section

Supplemental Material

predictroute-network-path-prediction-toolkit.mp4

Presentation video

References

  1. CAIDA's Prefix to ASN dataset. https://www.caida.org/data/routing/routeviews-prefix2as.xml.Google ScholarGoogle Scholar
  2. Peeringdb. https://www.peeringdb.com/.Google ScholarGoogle Scholar
  3. Y. Afek, O. Ben-Shalom, and A. Bremler-Barr. On the structure and application of bgp policy atoms. In Proceedings of the 2Nd ACM SIGCOMM Workshop on Internet Measurment, IMW '02, pages 209--214, New York, NY, USA, 2002. ACM.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. R. Anwar, H. Niaz, D. Choffnes, I. Cunha, P. Gill, and E. Katz-Bassett. Investigating interdomain routing policies in the wild. In ACM IMC, 2015.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. A. Asadpour and H. Nazerzadeh. Maximizing stochastic monotone submodular functions. Management Science, 62(8):2374--2391, 2016.Google ScholarGoogle ScholarCross RefCross Ref
  6. A. Barton and M. Wright. Denasa: Destination-naive as-awareness in anonymous communications. Proceedings on Privacy Enhancing Technologies, 2016(4):356--372, 2016.Google ScholarGoogle ScholarCross RefCross Ref
  7. CAIDA Ark. http://www.caida.org/projects/ark/.Google ScholarGoogle Scholar
  8. CAIDA AS Relationship dataset. http://data.caida.org/datasets/as-relationships/.Google ScholarGoogle Scholar
  9. K. Chen, D. R. Choffnes, R. Potharaju, Y. Chen, F. E. Bustamante, D. Pei, and Y. Zhao. Where the sidewalk ends: Extending the internet as graph using traceroutes from p2p users. In Proceedings of the 5th International Conference on Emerging Networking Experiments and Technologies, CoNEXT '09, pages 217--228, New York, NY, USA, 2009. ACM.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Y. Chiu, B. Schlinker, A. Radhakrishnan, and E. Katz-Bassett. Are we one hop away from a better Internet? In Proceedings of the 2015 ACM Conference on Internet Measurement Conference, pages 71--77. ACM, 2015.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. R. Dingledine, N. Mathewson, and P. Syverson. Tor: The second-generation onion router. Technical report, Naval Research Lab Washington DC, 2004.Google ScholarGoogle Scholar
  12. U. Feige. A threshold of ln n for approximating set cover. J. ACM, 45(4):634--652, July 1998.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. T. Flach, E. Katz-Bassett, and R. Govindan. Quantifying violations of destination-based forwarding on the internet. In IMC '12, 2012.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. S. Frolov, F. Douglas, W. Scott, A. McDonald, B. VanderSloot, R. Hynes, A. Kruger, M. Kallitsis, D. G. Robinson, S. Schultze, et al. An isp-scale deployment of tapdance. In 7th $$USENIX$$ Workshop on Free and Open Communications on the Internet (FOCI 17), 2017.Google ScholarGoogle Scholar
  15. L. Gao and J. Rexford. Stable Internet routing without global coordination. 2001.Google ScholarGoogle Scholar
  16. P. Gill, M. Arlitt, Z. Li, and A. Mahanti. The flattening internet topology: Natural evolution, unsightly barnacles or contrived collapse? In International Conference on Passive and Active Network Measurement, pages 1--10. Springer, 2008.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. P. Gill, M. Schapira, and S. Goldberg. Let the market drive deployment: A strategy for transitioning to bgp security. SIGCOMM Comput. Commun. Rev., 41(4):14--25, Aug. 2011.Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. P. Gill, M. Schapira, and S. Goldberg. Modeling on quicksand: Dealing with the scarcity of ground truth in interdomain routing data. ACM SIGCOMM Computer Communication Review, 42(1):40--46, 2012.Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. P. Gill, M. Schapira, and S. Goldberg. A survey of interdomain routing policies. In ACM Computer Communications Review (CCR)., Jan 2014.Google ScholarGoogle Scholar
  20. V. Giotsas, M. Luckie, B. Huffaker, and kc claffy. Inferring complex AS relationships. In ACM IMC, 2014.Google ScholarGoogle Scholar
  21. T. Holterbach, C. Pelsser, R. Bush, and L. Vanbever. Quantifying interference between measurements on the RIPE Atlas platform. In ACM IMC, 2015.Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. J. Karlin, S. Forrest, and J. Rexford. Autonomous security for autonomous systems. Computer Networks, oct 2008.Google ScholarGoogle Scholar
  23. E. Katz-Bassett, H. Madhyastha, V. Adhikari, C. Scott, J. Sherry, P. van Wesep, A. Krishnamurthy, and T. Anderson. Reverse traceroute. In USENIX Symposium on Networked Systems Design & Implementation (NSDI), 2010.Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. E. Katz-Bassett, P. Marchetta, M. Calder, Y.-C. Chiu, I. Cunha, H. Madhyastha, and V. Giotsas. Sibyl: A practical internet route oracle. In USENIX NSDI, 2016.Google ScholarGoogle Scholar
  25. V. Krishnamurthy, M. Faloutsos, M. Chrobak, L. Lao, J.-H. Cui, and A. G. Percus. Sampling large Internet topologies for simulation purposes. 2007.Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. H. V. Madhyastha, T. Isdal, M. Piatek, C. Dixon, T. Anderson, A. Krishnamurthy, and A. Venkataramani. iPlane: An Information Plane for Distributed Services. In Proc. of Operatings System Design and Implementation, 2006.Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. H. V. Madhyastha, E. Katz-Bassett, T. E. Anderson, A. Krishnamurthy, and A. Venkataramani. iplane nano: Path prediction for peer-to-peer applications. In NSDI, volume 9, pages 137--152, 2009.Google ScholarGoogle Scholar
  28. R. Nithyanand, R. Singh, S. Cho, and P. Gill. Holding all the ases: Identifying and circumventing the pitfalls of as-aware tor client design. CoRR, abs/1605.03596, 2016.Google ScholarGoogle Scholar
  29. Raspberry Pi. https://www.raspberrypi.org/.Google ScholarGoogle Scholar
  30. RIPE Atlas. https://atlas.ripe.net/.Google ScholarGoogle Scholar
  31. Rule Based Learning Ensembles. https://statweb.stanford.edu/ jhf/R_RuleFit.html.Google ScholarGoogle Scholar
  32. R. Singh and P. Gill. Pathcache: A path prediction toolkit. In Proceedings of the 2016 ACM SIGCOMM Conference, SIGCOMM '16, page 569--570, New York, NY, USA, 2016. Association for Computing Machinery.Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. O. Starov, R. Nithyanand, A. Zair, P. Gill, and M. Schapira. Measuring and mitigating as-level adversaries against tor. In NDSS, 2016.Google ScholarGoogle Scholar
  34. Y. Sun, A. Edmundson, L. Vanbever, O. Li, J. Rexford, M. Chiang, and P. Mittal. Raptor: Routing attacks on privacy in tor. In 24th USENIX Security Symposium (USENIX Security 15), pages 271--286, Washington, D.C., Aug. 2015. USENIX Association.Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. M. Wojciechowski. Border gateway protocol modeling and simulation. master's thesis. 2008.Google ScholarGoogle Scholar
  36. E. Wustrow, S. Wolchok, I. Goldberg, and J. A. Halderman. Telex: Anticensorship in the network infrastructure. In Proceedings of the 20th USENIX Conference on Security, SEC'11, pages 30--30, Berkeley, CA, USA, 2011. USENIX Association.Google ScholarGoogle Scholar
  37. E. Wustrow, S. Wolchok, I. Goldberg, and J. A. Halderman. Telex: Anticensorship in the network infrastructure. In Proceedings of the 20th USENIX Conference on Security, SEC'11, pages 30--30, Berkeley, CA, USA, 2011. USENIX Association.Google ScholarGoogle Scholar
  38. J. Y. Yen. Finding the k shortest loopless paths in a network. Management Science, 17(11):712--716, 1971.Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. PredictRoute: A Network Path Prediction Toolkit

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in

          Full Access

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader
          About Cookies On This Site

          We use cookies to ensure that we give you the best experience on our website.

          Learn more

          Got it!