TY - GEN
T1 - Analysis of diagnostic capability for hijacked route problem
AU - Akashi, Osamu
AU - Fukuda, Kensuke
AU - Hirotsu, Toshio
AU - Sugawara, Toshiharu
PY - 2007
Y1 - 2007
N2 - Diagnosis of anomalous routing states is essential for stable inter-AS (autonomous system) routing management, but it is difficult to perform such actions because inter-AS routing information changes spatially and temporally in different administrative domains. In particular, the route hijack problem, which is one of the major routing-management issues, remains difficult to analyze because of its diverse distribution dynamism. Although a multi-agent-based diagnostic system that can diagnose a set of routing anomalies by integrating the observed routing statuses among distributed agents has been successfully applied to real Internet service providers, the diagnostic accuracy depends on where those agents are located on the BGP topology map. This paper focuses on the AS adjacency topology of an actual network structure and analyzes hijacked-route behavior from the viewpoint of the connectivity of each AS. Simulation results using an actual Internet topology show the effectiveness of an agent-deployment strategy based on connectivity information.
AB - Diagnosis of anomalous routing states is essential for stable inter-AS (autonomous system) routing management, but it is difficult to perform such actions because inter-AS routing information changes spatially and temporally in different administrative domains. In particular, the route hijack problem, which is one of the major routing-management issues, remains difficult to analyze because of its diverse distribution dynamism. Although a multi-agent-based diagnostic system that can diagnose a set of routing anomalies by integrating the observed routing statuses among distributed agents has been successfully applied to real Internet service providers, the diagnostic accuracy depends on where those agents are located on the BGP topology map. This paper focuses on the AS adjacency topology of an actual network structure and analyzes hijacked-route behavior from the viewpoint of the connectivity of each AS. Simulation results using an actual Internet topology show the effectiveness of an agent-deployment strategy based on connectivity information.
UR - http://www.scopus.com/inward/record.url?scp=38149078023&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=38149078023&partnerID=8YFLogxK
U2 - 10.1007/978-3-540-75853-2_4
DO - 10.1007/978-3-540-75853-2_4
M3 - Conference contribution
AN - SCOPUS:38149078023
SN - 9783540758525
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 37
EP - 48
BT - IP Operations and Management - 7th IEEE International Workshop, IPOM 2007, Proceedings
PB - Springer Verlag
T2 - 7th IEEE Workshop on IP Operations and Management, IP0M 2007
Y2 - 31 October 2007 through 2 November 2007
ER -