Network heterogeneity and cascading failures ¿ an evaluation for the case of bgp vulnerability

C Doerr, P Smith, D Hutchison

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

Abstract

Large-scale outages of computer networks, particularly the Internet, can have a significant impact on their users and society in general. There have been a number of theoretical studies of complex network structures that suggest that heterogeneous networks, in terms of node connectivity and load, are more vulnerable to cascading failures than those which are more homogeneous. In this paper, we describe early research into an investigation of whether this thesis holds true for vulnerabilities in the Internet¿s inter-domain routing protocol ¿ BGP ¿ in light of different network structures. Specifically, we are investigating the effects of BGP routers creating blackholes ¿ observed phenomena in the Internet in recent years. We describe our evaluation setup, which includes a bespoke topology generator that can fluidly create any topology configuration from the current scale-free AS-level to the investigated homogeneous graphs. We find that network homogeneity as suggested by theory does not protect the overall network from failures in practice, but instead may even be harmful to network operations.
Original languageEnglish
Title of host publicationLecture Notes in Computer Science
Editors s.n.
Place of Publications.l.
PublisherSpringer
Pages207-212
Number of pages6
ISBN (Print)978-3-642-10865-5
Publication statusPublished - 2009
Event4th IFIP TC 6 International Workshop, IWSOS 2009, Zurich, Switzerland. - s.l.
Duration: 9 Dec 200911 Dec 2009

Publication series

Name
PublisherSpringer
Name
Volume5918

Conference

Conference4th IFIP TC 6 International Workshop, IWSOS 2009, Zurich, Switzerland.
Period9/12/0911/12/09

Keywords

  • conference contrib. refereed
  • Conf.proc. > 3 pag

Fingerprint

Dive into the research topics of 'Network heterogeneity and cascading failures ¿ an evaluation for the case of bgp vulnerability'. Together they form a unique fingerprint.

Cite this