The document discusses BGP route collectors and tools for parsing BGP routing data in MRT format. It introduces the BGP Scanner tool, a highly optimized C library and command line tool for reading and filtering BGP routing data in MRT format. Benchmarks show that BGP Scanner outperforms other tools by being up to 50x faster and using less memory. The document also provides installation instructions and links to documentation for BGP Scanner and other MRT parsing tools.
FARIS: Fast and Memory-efficient URL Filter by Domain Specific MachineYuuki Takano
http://ytakano.github.io/
http://ieeexplore.ieee.org/document/7740332/
Uniform resource locator (URL) filtering is a fundamental technology for intrusion detection, HTTP proxies, content distribution networks, content-centric networks, and many other application areas. Some applications adopt URL filtering to protect user privacy from malicious or insecure websites. Some web browser extensions, such as AdBlock Plus, provide a URL-filtering mechanism for sites that intend to steal sensitive information.
Unfortunately, these extensions are implemented inefficiently, resulting in a slow application that consumes much memory. Although it provides a domain-specific language (DSL) to represent URLs, it internally uses regular expressions and does not take advantage of the benefits of the DSL. In addition, the number of filter rules become large, which makes matters worse.
In this paper, we propose the fast uniform resource identifier- specific filter, which is a domain-specific pseudo-machine for the DSL, to dramatically improve the performance of some browser extensions. Compared with a conventional implementation that internally adopts regular expressions, our proof-of-concept implementation is fast and small memory footprint.
How to build and use GTPing to generate GTP traffic for testing without eNB, SPGW etc. This work was done as part of the preparation of SRv6 mobile user plane POC at SRv6 Consortium, Data plane Study Group, which is a group of people interested in SRv6.
FARIS: Fast and Memory-efficient URL Filter by Domain Specific MachineYuuki Takano
http://ytakano.github.io/
http://ieeexplore.ieee.org/document/7740332/
Uniform resource locator (URL) filtering is a fundamental technology for intrusion detection, HTTP proxies, content distribution networks, content-centric networks, and many other application areas. Some applications adopt URL filtering to protect user privacy from malicious or insecure websites. Some web browser extensions, such as AdBlock Plus, provide a URL-filtering mechanism for sites that intend to steal sensitive information.
Unfortunately, these extensions are implemented inefficiently, resulting in a slow application that consumes much memory. Although it provides a domain-specific language (DSL) to represent URLs, it internally uses regular expressions and does not take advantage of the benefits of the DSL. In addition, the number of filter rules become large, which makes matters worse.
In this paper, we propose the fast uniform resource identifier- specific filter, which is a domain-specific pseudo-machine for the DSL, to dramatically improve the performance of some browser extensions. Compared with a conventional implementation that internally adopts regular expressions, our proof-of-concept implementation is fast and small memory footprint.
How to build and use GTPing to generate GTP traffic for testing without eNB, SPGW etc. This work was done as part of the preparation of SRv6 mobile user plane POC at SRv6 Consortium, Data plane Study Group, which is a group of people interested in SRv6.
Interested knowing BGP convergence number for ISP Peering solutions. Learn from IPInfusion's OcNOS BGP test report.
Build your disaggregated Network using IPInfusion's OcNOS.
Presentació a càrrec de Maria Isabel Gandia, cap de Comunicacions del CSUC, duta a terme dins la 9a edició del SIG-NOC meeting el dia 8 d'abril de 2019 a Ljubljana, Eslovènia.
La presentació explica l'estudi que s'està duent a terme en el marc de Géant per conèixer les eines utilitzades per monitorar fluxos i les necessitats de les NREN de cara a un possible desenvolupament.
SRv6 Mobile User Plane : Initial POC and ImplementationKentaro Ebisawa
SRv6 Mobile Uplane POC results and findings talked at ENOG55 @Nigata http://enog.jp/archives/2014
SRv6 functions: T.M.Tmap, End.M.GTP4.E using VPP and P4 on Tofino switch.
Slides from ONOS/CORD meetup in Tokyo 2018. 20th April 2018.
http://www.e-side.co.jp/onoscordmeetup/#P4_2
Future Mobile User Plane is heavily discussed in many SDOs like 3GPP, IETF etc. and still not concreate. P4 lang is usefull to prototype such changing protocol on software switch and on ASIC/NPU.
This slide introudce one candidate for future Mobile User Plane protocol, SRv6 for Mobile User Plane and proto-type implemented in P4-14.
https://datatracker.ietf.org/doc/draft-ietf-dmm-srv6-mobile-uplane/
PLNOG14: Waltzing on that gentle trade‐off between internet routes and FIB sp...PROIDEA
David Barroso - Spotify
Paolo Lucente - PMACCT
When you travel, do you carry an atlas or a local map? In this talk
we will explain the whys and hows of a possible approach of carrying
only a local map of the internet instead of the full internet routing
table. The solution we will present is based on free, open-source and
publicly available software and scripts and a prototype is being
evaluated at Spotify.
Language: English
Register today for the next edition of PLNOG: krakow.plnog.pl
"p4srv6 (P4-16) design document rev1.0" Overview of Open Source SRv6 Mobile Userplane P4-16 on BMv2 design (planned to be public in March) #enog #enog55 @Nigata http://enog.jp/archives/2014
This work presents a P4 compiler backend targeting XDP, the eXpress Data Path. P4 is a domain-specific language describing how packets are processed by the data plane of a programmable network elements. XDP is designed for users who want programmability as well as performance.
https://github.com/williamtu/p4c-xdp/
JANOG43 Forefront of SRv6, Open Source ImplementationsKentaro Ebisawa
Status of SRv6 Open Source Implementations including where you can find the source code. English slide comes after Japanese.
This is a session from JANOG43 "Forefront of SRv6" program held on 23 Jan 2019 @ Kohu Japan.
https://www.janog.gr.jp/meeting/janog43/program/srv6
* Introduction – Miya Kohno
* SRv6 Update – Clarence Filsfils
* SRv6 Mobile user plane Update – Satoru Matsushima
* SRv6 Open Source Implementation Update – Kentaro Ebisawa
* SRv6 Academy Update – Chunghan Lee
* Vendor Update (Huawei) – Ryuichi Takashima
* Vendor Update (Cisco) – Teppei Kamata
BGP Techniques for Network Operators, by Philip Smith.
A presentation given at APRICOT 2016’s BGP Techniques for Network Operators (Part 1 and 2) sessions on 23 February 2016.
BGP Books of All Time · OSPF and BGP Quick reference · Protecting the Integrity of Internet Routing · Theory, laboratories and exercises for Mikrotik ...
Interested knowing BGP convergence number for ISP Peering solutions. Learn from IPInfusion's OcNOS BGP test report.
Build your disaggregated Network using IPInfusion's OcNOS.
Presentació a càrrec de Maria Isabel Gandia, cap de Comunicacions del CSUC, duta a terme dins la 9a edició del SIG-NOC meeting el dia 8 d'abril de 2019 a Ljubljana, Eslovènia.
La presentació explica l'estudi que s'està duent a terme en el marc de Géant per conèixer les eines utilitzades per monitorar fluxos i les necessitats de les NREN de cara a un possible desenvolupament.
SRv6 Mobile User Plane : Initial POC and ImplementationKentaro Ebisawa
SRv6 Mobile Uplane POC results and findings talked at ENOG55 @Nigata http://enog.jp/archives/2014
SRv6 functions: T.M.Tmap, End.M.GTP4.E using VPP and P4 on Tofino switch.
Slides from ONOS/CORD meetup in Tokyo 2018. 20th April 2018.
http://www.e-side.co.jp/onoscordmeetup/#P4_2
Future Mobile User Plane is heavily discussed in many SDOs like 3GPP, IETF etc. and still not concreate. P4 lang is usefull to prototype such changing protocol on software switch and on ASIC/NPU.
This slide introudce one candidate for future Mobile User Plane protocol, SRv6 for Mobile User Plane and proto-type implemented in P4-14.
https://datatracker.ietf.org/doc/draft-ietf-dmm-srv6-mobile-uplane/
PLNOG14: Waltzing on that gentle trade‐off between internet routes and FIB sp...PROIDEA
David Barroso - Spotify
Paolo Lucente - PMACCT
When you travel, do you carry an atlas or a local map? In this talk
we will explain the whys and hows of a possible approach of carrying
only a local map of the internet instead of the full internet routing
table. The solution we will present is based on free, open-source and
publicly available software and scripts and a prototype is being
evaluated at Spotify.
Language: English
Register today for the next edition of PLNOG: krakow.plnog.pl
"p4srv6 (P4-16) design document rev1.0" Overview of Open Source SRv6 Mobile Userplane P4-16 on BMv2 design (planned to be public in March) #enog #enog55 @Nigata http://enog.jp/archives/2014
This work presents a P4 compiler backend targeting XDP, the eXpress Data Path. P4 is a domain-specific language describing how packets are processed by the data plane of a programmable network elements. XDP is designed for users who want programmability as well as performance.
https://github.com/williamtu/p4c-xdp/
JANOG43 Forefront of SRv6, Open Source ImplementationsKentaro Ebisawa
Status of SRv6 Open Source Implementations including where you can find the source code. English slide comes after Japanese.
This is a session from JANOG43 "Forefront of SRv6" program held on 23 Jan 2019 @ Kohu Japan.
https://www.janog.gr.jp/meeting/janog43/program/srv6
* Introduction – Miya Kohno
* SRv6 Update – Clarence Filsfils
* SRv6 Mobile user plane Update – Satoru Matsushima
* SRv6 Open Source Implementation Update – Kentaro Ebisawa
* SRv6 Academy Update – Chunghan Lee
* Vendor Update (Huawei) – Ryuichi Takashima
* Vendor Update (Cisco) – Teppei Kamata
BGP Techniques for Network Operators, by Philip Smith.
A presentation given at APRICOT 2016’s BGP Techniques for Network Operators (Part 1 and 2) sessions on 23 February 2016.
BGP Books of All Time · OSPF and BGP Quick reference · Protecting the Integrity of Internet Routing · Theory, laboratories and exercises for Mikrotik ...
Dynamische Routingprotokolle Aufzucht und Pflege - BGPMaximilan Wilhelm
Sie möchten Ihr großes internes Netzwerk - ein Autonomes System - mit dem Internet verbinden, eine IP-Fabric aufbauen oder interne Dienste per Anycast in Ihrem Netzwerk anbieten. Für all diese Dinge ist das Border Gateway Protokoll entwickelt worden und auch hervorragend geeignet.
Dieser Vortag vermittelt die Funktionsweise von BGP im externen und internen Einsatz, gibt einen Überblick über die Steuermechanismen und Stellschrauben und zeigt den praktischen Einsatz mit dem Bird Internet Routing Daemon auf.
Isolario - A real-time Internet routing ObservatoryAFRINIC
The incompleteness of data collected from BGP route collecting projects is a well-known issue. Recent works explained that one of the possible solution is to increase the contribution in terms of routing data collected from ASes located in the Internet periphery, in order to reveal the peering connectivity of their upstream providers. Our contribution is Isolario, a route collecting project based on the do-ut-des principle which aims to increase the appeal of BGP route collecting for persuading network administrators in small-medium organizations to share their routing information by offering services in return, ranging from real-time analyses of the incoming BGP session(s) to historic analyses of routing reachability.
I walk through What is BGP, Why BGP and BGP Attributes, Path Selection, Use Case of BGP, iBGP, eBGP, CCNP Routing, Multi Homing
What is BGP?
Why BGP?
BGP Peer Relationships
Configuration of BGP
BGP attributes and Path Selection
BGP use cases
What would you do if you had access to all the routing data from the Internet? In this talk, we will introduce a new framework for collecting, storing, and parsing routing data in a way that can be made available to network engineers and application developers through a simple and clean REST API. This API presents a new opportunity for network engineers to understand, visualize, and analyze their network in a way consistent with today’s software engineering practices.
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...APNIC
Chimi Dorji, Internet Resource Analyst at APNIC, presented on Registry Data Accuracy Improvements at SANOG 41 jointly held with INNOG 7 in Mumbai, India from 25 to 30 April 2024.
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC
Sunny Chendi, Senior Advisor, Membership and Policy at APNIC, presents 'APNIC Policy Roundup' at the 5th ICANN APAC-TWNIC Engagement Forum and 41st TWNIC OPM in Taipei, Taiwan from 23 to 24 April.
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
Dave Phelan, Senior Network Analyst/Technical Trainer at APNIC, presents 'DDoS In Oceania and the Pacific' at NZNOG 2024 held in Nelson, New Zealand from 8 to 12 April 2024.
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
Geoff Huston, Chief Scientist at APNIC deliver keynote presentation on the 'Future Evolution of the Internet' at the Everything Open 2024 conference in Gladstone, Australia from 16 to 18 April 2024.
IP addressing and IPv6, presented by Paul Wilson at IETF 119APNIC
Paul Wilson, Director General of APNIC delivers a presentation on IP addressing and IPv6 to the Policymakers Program during IETF 119 in Brisbane Australia from 16 to 22 March 2024.
draft-harrison-sidrops-manifest-number-01, presented at IETF 119APNIC
Tom Harrison, Product and Delivery Manager at APNIC presents at the Registration Protocols Extensions working group during IETF 119 in Brisbane, Australia from 16-22 March 2024
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...APNIC
Che-Hoo Cheng, Senior Director, Development at APNIC presents on the "Benefits of doing Internet peering and running an Internet Exchange (IX)" at the Communications Regulatory Commission of Mongolia's IPv6, IXP, Datacenter - Policy and Regulation International Trends Forum in Ulaanbaatar, Mongolia on 7 March 2024
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC
APNIC Senior Advisor, Membership and Policy, Sunny Chendi presented on APNIC updates and RIR Policies for ccTLDs at APTLD 85 in Goa, India from 19-22 February 2024.
This 7-second Brain Wave Ritual Attracts Money To You.!nirahealhty
Discover the power of a simple 7-second brain wave ritual that can attract wealth and abundance into your life. By tapping into specific brain frequencies, this technique helps you manifest financial success effortlessly. Ready to transform your financial future? Try this powerful ritual and start attracting money today!
# Internet Security: Safeguarding Your Digital World
In the contemporary digital age, the internet is a cornerstone of our daily lives. It connects us to vast amounts of information, provides platforms for communication, enables commerce, and offers endless entertainment. However, with these conveniences come significant security challenges. Internet security is essential to protect our digital identities, sensitive data, and overall online experience. This comprehensive guide explores the multifaceted world of internet security, providing insights into its importance, common threats, and effective strategies to safeguard your digital world.
## Understanding Internet Security
Internet security encompasses the measures and protocols used to protect information, devices, and networks from unauthorized access, attacks, and damage. It involves a wide range of practices designed to safeguard data confidentiality, integrity, and availability. Effective internet security is crucial for individuals, businesses, and governments alike, as cyber threats continue to evolve in complexity and scale.
### Key Components of Internet Security
1. **Confidentiality**: Ensuring that information is accessible only to those authorized to access it.
2. **Integrity**: Protecting information from being altered or tampered with by unauthorized parties.
3. **Availability**: Ensuring that authorized users have reliable access to information and resources when needed.
## Common Internet Security Threats
Cyber threats are numerous and constantly evolving. Understanding these threats is the first step in protecting against them. Some of the most common internet security threats include:
### Malware
Malware, or malicious software, is designed to harm, exploit, or otherwise compromise a device, network, or service. Common types of malware include:
- **Viruses**: Programs that attach themselves to legitimate software and replicate, spreading to other programs and files.
- **Worms**: Standalone malware that replicates itself to spread to other computers.
- **Trojan Horses**: Malicious software disguised as legitimate software.
- **Ransomware**: Malware that encrypts a user's files and demands a ransom for the decryption key.
- **Spyware**: Software that secretly monitors and collects user information.
### Phishing
Phishing is a social engineering attack that aims to steal sensitive information such as usernames, passwords, and credit card details. Attackers often masquerade as trusted entities in email or other communication channels, tricking victims into providing their information.
### Man-in-the-Middle (MitM) Attacks
MitM attacks occur when an attacker intercepts and potentially alters communication between two parties without their knowledge. This can lead to the unauthorized acquisition of sensitive information.
### Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBrad Spiegel Macon GA
Brad Spiegel Macon GA’s journey exemplifies the profound impact that one individual can have on their community. Through his unwavering dedication to digital inclusion, he’s not only bridging the gap in Macon but also setting an example for others to follow.
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
Talk presented at Kubernetes Community Day, New York, May 2024.
Technical summary of Multi-Cluster Kubernetes Networking architectures with focus on 4 key topics.
1) Key patterns for Multi-cluster architectures
2) Architectural comparison of several OSS/ CNCF projects to address these patterns
3) Evolution trends for the APIs of these projects
4) Some design recommendations & guidelines for adopting/ deploying these solutions.
BGP Scanner - Isolario BGP-MRT Data Reader C Library and Tool
1. Lorenzo Cogotti
lorenzo.cogotti <at> alphacogs.com
Luca Sani
luca.sani <at> isolario.it
Isolario
Project
BGP Scanner
Isolario BGP-MRT Data Reader: C library & tool
2. What is a BGP route collector?
Route collectors (RCs) are
devices which collects BGP
routing data from
co-operating ASes
Multi-Threaded Routing Toolkit format (RFC 6396)
Maintains a routing table (RIB) with the best routes received
Dumps the content of the RIB and received UPDATEs periodically
2/17
3. Route collecting projects
University of Oregon Route Views Project
Route Views was conceived as a tool for Internet operators to obtain real-time information
about the global routing system from the perspectives of several different backbones and
locations around the Internet. It collects BGP packets in MRT format since 2001
http://www.routeviews.org
RIPE NCC Routing Information Service (RIS)
The RIPE NCC collects and stores Internet routing data from several locations around the
globe, using RIS. It collects BGP packets in MRT format since 1999
https://www.ripe.net/analyse/internet-measurements/routing-information-service-ris
Packet Clearing House (PCH)
PCH is the international organization responsible for providing operational support and
security to critical Internet infrastructure, including Internet exchange points and the core
of the domain name system. It operates route collectors at more than 100 IXPs around
the world and its data is made available in MRT format since 2011
https://www.pch.net/resources/Raw Routing Data
Isolario
Project
Isolario
Isolario is a route collecting project which provides inter-domain real-time monitoring
services to its participants. It collects BGP packets in MRT format since 2013, and
supports ADDPATH (RFC 7911) since 2018
https://www.isolario.it
3/17
4. MRT data is getting bigger and bigger...
What is the problem?
Tools available are either slow, outdated or miss ADD-PATH handling
Usually no way to filter packets
4/17
5. Tools available to parse MRT data
Several languages: C, C++, Python, Perl, Java, OCaml
Tool Lang RIB updates IPv6 ADD
PATH
Last
updated
bgpdump C 2018-03-02
bgpdump2 C x x 2016-08-10
bgpparser C++ x 2015-04-11
bgpreader C x 2018-07-13
gobgp (MRT) Go - - - - 2015-02-21
mabo OCaml x 2017-06-26
mrtparse Python x 2018-06-27
PyBGPdump Python x x 2007-01-15
Java-MRT Java x 2013-02-09
zebra-dump-parser Perl x 2016-11-07
5/17
6. Solution: goto c
The fact is, that is exactly the kinds of things that C excels at.
Not just as a language, but as a required mentality. One of the
great strengths of C is that it doesn’t make you think of your
program as anything high-level.
Linus
C language benefits
May be easily wrapped (C++, Python, Lua)
Close to “metal”
Not only ANSI C: C99
Allows dynamic allocation on stack (→ zero-copy)
Improves code readability
6/17
7. Solution: goto c
The fact is, that is exactly the kinds of things that C excels at.
Not just as a language, but as a required mentality. One of the
great strengths of C is that it doesn’t make you think of your
program as anything high-level.
Linus
C language benefits
May be easily wrapped (C++, Python, Lua)
Close to “metal”
Not only ANSI C: C99
Allows dynamic allocation on stack (→ zero-copy)
Improves code readability
6/17
8. Solution: goto c
The fact is, that is exactly the kinds of things that C excels at.
Not just as a language, but as a required mentality. One of the
great strengths of C is that it doesn’t make you think of your
program as anything high-level.
Linus
C language benefits
May be easily wrapped (C++, Python, Lua)
Close to “metal”
Not only ANSI C: C11
Allows optimization for multithreading
Thread local/atomic variables
6/17
9. BGP Scanner: Isolario MRT-BGP data reader
Don’t worry!
You do not have to use C
MRT-BGP library
A highly optimized low-level reusable library
Optimized to achieve high throughput
Multi-thread friendly
Memory friendly
The real star of the show: BGP Scanner tool
Comes with all the benefits of the low-level C library
Good old grep friendly output
Can be piped to other tools
Supports gz, bz2, xz and raw
Powerful filtering features
7/17
10. Wait... what?
Filtering
Peer IP, Peer AS
Subnets, supernets, related, exacts
Peer Index
AS path regexp and loop detection
Can be configured with template files and/or directly by command line
Example
bgpscanner -s 192.65.0.0/16 -p "174 137" rib.20180701.1400.bz2
=|192.65.131.0/24|7018 174 137 137 137 2598|12.0.1.63|i|||7018:5000 7018:37232|12.0.1.63 7018|1530186440|1
=|192.65.131.0/24|6539 577 174 137 137 137 2598|216.18.31.102|i||||216.18.31.102 6539|1529912797|1
=|192.65.131.0/24|701 174 137 137 137 2598|137.39.3.55|i||||137.39.3.55 701|1529397335|1
=|192.65.131.0/24|3741 174 137 137 137 2598|168.209.255.56|i||||168.209.255.56 3741|1529593095|1
=|192.65.131.0/24|11686 174 137 137 137 2598|96.4.0.55|i||||96.4.0.55 11686|1530338943|1
· · ·
Subnets of 192.65.0.0/16 crossing 174 137 link
8/17
11. It can do a lot more...
Available options:
-a <feeder AS>
Print only entries coming from the given feeder AS
-A <file>
Print only entries coming from the feeder ASes contained in file
-d
Dump packet filter bytecode to stderr (debug option)
-e <subnet>
Print only entries containing the exact given subnet of interest
-E <file>
Print only entries containing the exact subnets of interest contained in file
-f
Print only every feeder IP in the RIB provided
-i <feeder IP>
Print only entries coming from a given feeder IP
-I <file>
Print only entries coming from the feeder IP contained in file
-l
Print only entries with a loop in its AS PATH
-L
Print only entries without a loop in its AS PATH
-o <file>
Define the output file to store information (defaults to stdout)
-p <path expression>
Print only entries which AS PATH matches the expression
-P <path expression>
Print only entries which AS PATH does not match the expression
-r <subnet>
Print only entries containing subnets related to the given subnet of interest
-R <file>
Print only entries containing subnets related to the subnets of interest contained in file
-s <subnet>
Print only entries containing subnets included to the given subnet of interest 9/17
12. Benchmarks: BGP data evolution scenario
Test machine
Intel(R) Core(TM) i7-4790K 4.00GHz
RAM 16GB
Samsung SSD 850 EVO 500GB
Debian Stretch
Data sources
Route Views route-views6
RIS rrc00
Isolario Korriban
Benchmark phases (∀ collectors)
1 Download first RIB of July, 2018
2 Download all updates of July, 2018
3 Decompress
4 Run 10 times each MRT tool
5 Compute average results of runs for each metric
Data is decompressed to eliminate decompression algorithm overhead
10/17
15. Isolario Korriban collector
RIB size UPDATE size µ UPDATE size # files
5.7GB 810.64GB 92.97MB 8930
bgpscanner
bgpdump
1000 10000 100000
Time elapsed
Time [s]
bgpscanner
bgpdump
1 10
Peak
Avg
Memory consumption
RAM [MB]
IPv4 + IPv6 feeders with ADDPATH
512 IPv4 sessions (112 full tables)
407 IPv6 sessions (126 full tables)
Thanks to NLNOG RING for providing 68 IPv4 and 69 IPv6 full tables!
13/17
16. Filtering benchmark
Data source
Last RIB of July 2018 of Korriban collector
475MB (7.8GB uncompressed)
None
Feeder AS
First AS
End AS
Cross link
Loop
10 20 30 40 50 60 70 80
Filtering time
seconds 14/17
17. Filtering benchmark
Filters
BGP data announced by feeder AS199036
bgpscanner -a "199036"
First AS of AS PATH is AS199036
bgpscanner -p "^199036"
Last AS of AS PATH AS3333
bgpscanner -p "3333$"
AS PATH crosses link AS174 AS3356
bgpscanner -p "174 3356"
Subnets of 193.0.0.0/16 or 2001:67c::/32 destined to AS3333
bgpscanner -s "193.0.0.0/16" -s "2001:67c::/32" -p "3333$"
AS PATH contains a loop
bgpscanner -l
15/17
18. How to install BGP Scanner?
BGP Scanner is open-source
BSD license
Available on www.isolario.it → Tools
Source code on https://gitlab.com/Isolario
Install procedure (Source Tarball)
1 Download bgpscanner-[version].tar.gz
2 ./configure && make && make install
Install procedure (Debian package archives)
1 Download libisocore1 [version].deb
2 Download bgpscanner [version].deb
3 dpkg -i *.deb
16/17
19. Thank you for your attention
Any question?
info <at> isolario.it
lorenzo.cogotti <at> alphacogs.com
https://www.isolario.it
https://www.alphacogs.com
17/17
21. A possible IXP use case
Assumption
No IXP peering LAN should be announced on the Internet
Thus, no route collector should see any IXP peering LAN
Procedure
1 Extract peering LANs via PeeringDB APIs
2 bgpscanner -E <Peering LAN file> <RIB>
3 Analyse the results (e.g. to check for particular LANs of interest)
Data
Monitor: Korriban
File: rib.20190212.0000
19/17
22. A possible IXP use case: results
0
0.2
0.4
0.6
0.8
1
0 20 40 60 80 100 120 140 160 180 200
P(X>x)
Feeders announcing subnet
Elaboration time: 53s
Subnets seen: 124 (out of 1176)
Peering LANs could be announced on purpose (for any reason)
Bgpscanner can help in identifying those which are not
20/17