- Naoki Umeda12,
- Naoto Yanai12,
- Tatsuya Takemura12,
- Masayuki Okada13,
- Jason Paul Cruz12 &
- …
- Shingo Okamura14
Part of the book series:Lecture Notes in Networks and Systems ((LNNS,volume 225))
Included in the following conference series:
824Accesses
Abstract
The border gateway protocol (BGP), which is known as a backbone protocol of the Internet, is constantly the target of many hijack attacks. To combat such attacks, many extensions of BGP have been developed to make BGP more secure. However, to perform experiments to evaluate their performance, most BGP extensions require the utilization of platforms, such as testbeds, with high operating costs. In this paper, we proposeSQUAB (Scalable QUagga-based Automated Configuration on Bgp), a lightweight evaluation tool for protocols under development and for protocols that will be developed by a user with actual devices locally. SQUAB can configure BGP networks automatically, and thus it can significantly reduce the overhead of experiments on BGP and its extensions. Unlike conventional testbeds, SQUAB can set up BGP networks locally and its execution requires only a computational resource of a typical laptop computer. We used SQUAB in experiments to check the validity of functions based on network topologies in the real world. Our results show that SQUAB can configure a network composed of 50 routers within 52.9 s and consumes only 354.7 MB of memory. Furthermore, as a case study, we confirm that SQUAB can also provide experimental networks, even including other protocols, e.g., BGPsec.
This is a preview of subscription content,log in via an institution to check access.
Access this chapter
Subscribe and save
- Get 10 units per month
- Download Article/Chapter or eBook
- 1 Unit = 1 Article or 1 Chapter
- Cancel anytime
Buy Now
- Chapter
- JPY 3498
- Price includes VAT (Japan)
- eBook
- JPY 22879
- Price includes VAT (Japan)
- Softcover Book
- JPY 28599
- Price includes VAT (Japan)
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
The bird internet routing daemon.https://bird.network.cz/
Cloudlabhttps://www.cloudlab.us/
The deter project.https://deter-project.org/
Nist bgp secure routing extension (bgp / srx) prototypehttps://www.nist.gov/services-resources/software/bgp-secure-routing-extension-bgp-srx-prototype
Planetlabhttps://planetlab.cs.princeton.edu/
Quagga routing suite.https://www.nongnu.org/quagga/
Xsede.https://www.xsede.org/
Boneh, D., Gentry, C., Lynn, B., Shacham, H.: Aggregate and verifiably encrypted signatures from bilinear maps. In: Proceedings of EUROCRYPT 2003, pp. 416–432 (2003)
Chen, K., Choffnes, D.R., Potharaju, R., Chen, Y., Bustamante, F.E., Pei, D., Zhao, Y.: Where the sidewalk ends: extending the internet as graph using traceroutes from p2p users. In: Proceedings of the 5th International Conference on Emerging Networking Experiments and Technologies, pp. 217–228 (2009)
Fogel, A., Fung, S., Pedrosa, L., Walraed-Sullivan, M., Govindan, R., Mahajan, R., Millstein, T.: A general approach to network configuration analysis. In: Proceedings of NSDI 2015, pp. 469–483. USENIX Association (2015)
Griffin, T., Huston, G.: Bgp wedgies. RFC 4264 (2005).https://rfc-editor.org/rfc/rfc4264.txt, published: RFC 4264
Junjie, O., Yanai, N., Takemura, T., Okada, M., Okamura, S., Cruz, J.P.: APVAS: reducing memory size of as\(\_\)path validation by using aggregate signatures (2020). CoRRabs/2008.13346,https://arxiv.org/abs/2008.13346
Lepinski, M., Sriram, K.: BGPsec Protocol Specification (2017).https://doi.org/10.17487/RFC8205,https://rfc-editor.org/rfc/rfc8205.txt, published: RFC 8205
Mahajan, R., Wetherall, D., Anderson, T.: Understanding BGP misconfiguration. In: Proceedings of SIGCOMM 2002, pp. 3–16. ACM (2002)
Mao, Z.M., Rexford, J., Wang, J., Katz, R.H.: Towards an accurate as-level traceroute tool. In: Proceedings of the 2003 conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, pp. 365–378 (2003)
McPherson, D.R., Gill, V.: BGP MULTI\(\_\)EXIT\(\_\)DISC (MED) Considerations. RFC 4451 (2006).https://www.rfc-editor.org/rfc/rfc4451.txt, published: RFC 4451
Merkel, D.: Docker: lightweight linux containers for consistent development and deployment. Linux J.2014(239), 2 (2014)
Mitseva, A., Panchenko, A., Engel, T.: The state of affairs in BGP security: a survey of attacks and defenses. Comput. Commun.124(2018), 45–60 (2018)
Peterson, L., Bavier, A., Fiuczynski, M.E., Muir, S.: Experiences building planetlab. In: Proceedings of the 7th Symposium on Operating Systems Design and Implementation, pp. 351–366 (2006)
Rekhter, Y., Hares, S., Li, T.: A Border Gateway Protocol 4 (BGP-4) (2006).https://doi.org/10.17487/RFC4271,https://rfc-editor.org/rfc/rfc4271.txt, published: RFC 4271
Sambasivan, R.R., Tran-Lam, D., Akella, A., Steenkiste, P.: Bootstrapping evolvability for inter-domain routing with d-bgp. In: Proceedings of SIGCOMM 2017, pp. 474–487. ACM (2017)
Schlinker, B., Arnold, T., Cunha, I., Katz-Bassett, E.: Peering: virtualizing BGP at the edge for research. In: Proceedings of CoNEXT 2019, pp. 51–67. ACM (2019)
Siaterlis, C., Genge, B., Hohenadel, M.: Epic: a testbed for scientifically rigorous cyber-physical security experimentation. IEEE Trans. Emerg. Topics Comput.1(2), 319–330 (2013)
Staff, R.N.: Ripe atlas: a global internet measurement network. Internet Protoc. J.18(3), 1–4 (2015)
To, M.A., Cano, M., Biba, P.: Dockemu–a network emulation tool. In: 2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops, pp. 593–598. IEEE (2015)
Vervier, P., Thonnard, O., Dacier, M.: Mind your blocks: on the steal thiness of malicious BGP hijacks. In: Proceedings of NDSS 2015. Internet Society (2015)
Acknowledgments
This research was supported in part by the Japan Society for the Promotion of Science KAKENHI Numbers 18K18049, and Innovation Platform for Society 5.0 at MEXT.
Author information
Authors and Affiliations
Osaka University, Suita, Japan
Naoki Umeda, Naoto Yanai, Tatsuya Takemura & Jason Paul Cruz
University of Nagasaki, Sasebo, Japan
Masayuki Okada
National Institute of Technology, Nara College, Nara, Japan
Shingo Okamura
- Naoki Umeda
You can also search for this author inPubMed Google Scholar
- Naoto Yanai
You can also search for this author inPubMed Google Scholar
- Tatsuya Takemura
You can also search for this author inPubMed Google Scholar
- Masayuki Okada
You can also search for this author inPubMed Google Scholar
- Jason Paul Cruz
You can also search for this author inPubMed Google Scholar
- Shingo Okamura
You can also search for this author inPubMed Google Scholar
Corresponding author
Correspondence toNaoki Umeda.
Editor information
Editors and Affiliations
Department of Information and Communication Engineering, Fukuoka Institute of Technology, Fukuoka, Japan
Leonard Barolli
Department of Computer Science, Ryerson University, Toronto, ON, Canada
Isaac Woungang
Faculty of Business Administration, Rissho University, Tokyo, Japan
Tomoya Enokido
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Umeda, N., Yanai, N., Takemura, T., Okada, M., Cruz, J.P., Okamura, S. (2021). SQUAB: A Virtualized Infrastructure for Experiments on BGP and its Extensions. In: Barolli, L., Woungang, I., Enokido, T. (eds) Advanced Information Networking and Applications. AINA 2021. Lecture Notes in Networks and Systems, vol 225. Springer, Cham. https://doi.org/10.1007/978-3-030-75100-5_52
Download citation
Published:
Publisher Name:Springer, Cham
Print ISBN:978-3-030-75099-2
Online ISBN:978-3-030-75100-5
eBook Packages:Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)
Share this paper
Anyone you share the following link with will be able to read this content:
Sorry, a shareable link is not currently available for this article.
Provided by the Springer Nature SharedIt content-sharing initiative