Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Dan Pei is active.

Publication


Featured researches published by Dan Pei.


acm special interest group on data communication | 2002

Observation and analysis of BGP behavior under stress

Lan Wang; Xiaoliang Zhao; Dan Pei; Randy Bush; Daniel Massey; Allison Mankin; S. Felix Wu; Lixia Zhang

Despite BGPs critical importance as the de-facto Internet inter-domain routing protocol, there is little understanding of how BGP actually performs under stressful conditions when dependable routing is most needed. In this paper, we examine BGPs behavior during one stressful period, the Code Red/Nimda attack on September 18, 2001. The attack was correlated with a 30-fold increase in the BGP update messages at a monitoring point which peers with a number of Internet service providers. Our examination of BGPs behavior during the event concludes that BGP exhibited no significant abnormality, and that over 40% of the observed updates can be attributed to the monitoring artifact in current BGP measurement settings. Our analysis, however, does reveal several weak points in both the protocol and its implementation, such as BGPs sensitivity to the transport session reliability, its inability to avoid the global propagation of small local changes, and its certain implementation features whose otherwise benign effects only get amplified under stressful conditions. We also identify areas for improvement in the current network measurement and monitoring effort.


acm special interest group on data communication | 2001

An analysis of BGP multiple origin AS (MOAS) conflicts

Xiaoliang Zhao; Dan Pei; Lan Wang; Daniel Massey; Allison Mankin; S. Felix Wu; Lixia Zhang

This paper presents a detailed study of BGP Multiple Origin AS (MOAS) conflicts observed in the Internet. A MOAS conflict occurs when a particular prefix appears to originate from more than one AS. We analyzed data from archived BGP routing tables over 1279 days. Most of the conflicts were short-lived, lasting only a small number of days. The potential causes for the MOAS conflicts and impact on BGP fault-tolerance are discussed in detail.


international conference on computer communications | 2002

Improving BGP convergence through consistency assertions

Dan Pei; Xiaoliang Zhao; Lan Wang; Daniel Massey; Allison Mankin; Shen Su; Lixia Zhang

This paper presents a new mechanism for improving the convergence properties of path vector routing algorithms, such as BGP. Using a routes path information, we develop two consistency assertions for path vector routing algorithms that are used to compare similar routes and identify infeasible routes. To apply these assertions in BGP, mechanisms to signal failure/policy withdrawal, and traffic engineering are provided. Our approach was implemented and deployed in a BGP testbed and evaluated using simulation. By identifying and ignoring the infeasible routes, we achieved substantial reduction in both BGP convergence time and the total number of intermediate route changes.


dependable systems and networks | 2002

Detection of invalid routing announcement in the Internet

Xiaoliang Zhao; Dan Pei; Lan Wang; Daniel Massey; Allison Mankin; Shyhtsun Felix Wu; Lixia Zhang

Network measurement has shown that a specific IP address prefix may be announced by more than one autonomous system (AS), a phenomenon commonly referred to as Multiple Origin AS, or MOAS. MOAS can be due to either operational need to support multi-homing, or false route announcements due to configuration or implementation errors, or even by intentional attacks. Packets following such bogus routes will be either dropped or in the case of an intentional attack, delivered to a machine of the attackers choosing. The paper presents a protocol enhancement to BGP which enables BGP to detect bogus route announcements from false origins. Rather than imposing cryptography-based authentication and encryption to secure routing message exchanges, our solution makes use of the rich connectivity among ASs that exists in the Internet. Simulation results show that this simple solution can effectively detect false routing announcements even in the presence of multiple compromised routers, become more robust in larger topologies, and can substantially reduce the impact of false routing announcements even with a partial deployment.


dependable systems and networks | 2003

A study of packet delivery performance during routing convergence

Dan Pei; Lan Wang; Daniel Massey; Shyhtsun Felix Wu; Lixia Zhang

Internet measurements have shown that network failures happen frequently, and that existing routing protocols can take multiple seconds, or even minutes, to converge after a failure. During these routing convergence periods, some packets may already be en-route to their destinations and new packets may be sent. These in-flight packets can encounter routing loops, delays, and losses. However, little is known about how many packets are delivered (or not delivered) during routing convergence periods. In this paper, we study the impact of topological connectivity and routing protocol designs on the packet delivery during routing convergence. We examine three distributed routing protocols: RIP, Distributed Bellman Ford and BGP through protocol analysis and simulation experiments. Our study shows that the packet delivery ratio improves as the network connectivity becomes richer. However differences in routing protocol designs impact their ability to fully utilize the topological redundancy in face of component failures. Two factors in routing protocol design, keeping alternate path information at each router and quickly propagating new reachability information, appear to have the most impact on the packet delivery behavior during convergence.


IEEE Network | 2004

A framework for resilient Internet routing protocols

Dan Pei; Lixia Zhang; Daniel Massey

At a fundamental level, all Internet-based applications rely on a dependable packet delivery service provided by the Internet routing infrastructure. However, the Internet is a large-scale complex loosely coupled distributed system made of many imperfect components. Faults of varying-scale and severity occur from time to time. In this paper we survey the research efforts over the years aimed at enhancing the dependability of the routing infrastructure. To provide a comprehensive overview of the various efforts, we first introduce a threat model based on known threats, then sketch out a defense framework, and put each of the existing efforts at appropriate places in the framework based on the faults and attacks against which it can defend. Our analysis shows that although individual defense mechanisms may effectively guard against specific faults, no single fence can counter all faults. Thus, a resilient Internet routing infrastructure calls for integrating techniques from cryptographic protection mechanisms, statistical anomaly detection, protocol syntax checking, and protocol semantics checking to build a multifence defense system.


distributed systems operations and management | 2003

Visual-Based Anomaly Detection for BGP Origin AS Change (OASC) Events

Soon-Tee Teoh; Kwan-Liu Ma; S. Felix Wu; Daniel Massey; Xiaoliang Zhao; Dan Pei; Lan Wang; Lixia Zhang; Randy Bush

To complement machine intelligence in anomaly event analysis and correlation, in this paper, we investigate the possibility of a human-interactive visual-based anomaly detection system for faults and security attacks related to the BGP (Border Gateway Protocol) routing protocol. In particular, we have built and tested a program, based on fairly simple information visualization techniques, to navigate interactively real-life BGP OASC (Origin AS Change) events. Our initial experience demonstrates that the integration of mechanical analysis and human intelligence can effectively improve the performance of anomaly detection and alert correlation. Furthermore, while a traditional representation of OASC events provides either little or no valuable information, our program can accurately identify, correlate previously unknown BGP/OASC problems, and provide network operators with a valuable high-level abstraction about the dynamics of BGP.


global communications conference | 2003

Detection of invalid routing announcements in RIP protocol

Dan Pei; Daniel Massey; Lixia Zhang

Traditional routing protocol designs have focused solely on the functionality of the protocols and implicitly assume that all routing update messages received by a router carry valid information. However operational experience suggests that hardware faults, software implementation bugs, operator misconfigurations, let alone malicious attacks can all lead to invalid routing protocol announcements. Although several recent efforts have developed cryptography-based authentication for routing protocols, such enhancements alone are rendered ineffective in the face of faults caused by misconfigurations or hardware/software errors. In this paper we develop a simple routing update validation algorithm for the RIP protocol, RIP with triangle theorem checking and probing (RIP-TP). In RIP-TP routers utilize a triangle theorem to identify suspicious new routing announcements, and then use probing messages to verify the correctness of the announcements. We have evaluated the effectiveness of RIP-TP through simulation using various faulty node behaviors, link failure dynamics and network sizes. The results show that, with an overhead as low as about one probing message per received update message in the worst case, RIP-TP can effectively detect 95% or more invalid routing announcements.


acm special interest group on data communication | 2003

A study on the routing convergence of Latin American networks

Xiaoliang Zhao; Daniel Massey; Dan Pei; Lixia Zhang

BGP is known to suffer from slow routing convergence after network connectivity changes. In this paper we identify the impact of network connectivity on the routing convergence delay and discuss its implication for networks in the Latin American region. BGP routing table snapshots showed that some networks in Latin American region are directly attached to large Internet service providers, while others attached to regional services providers. Our study shows that, when an edge network loses some of its connectivities, its attachment point to the Internet has great impacts on the BGP convergence delay. Our analysis shows that proximity to large Internet service providers improves the convergence time. We confirm our analysis through both simulation experiments and BGP routing log analysis for specific Latin American destinations.


DISCEX | 2003

An analysis BGP multiple origin AS(MOAS) conflicts

Xiaoliang Zhao; Mohit Lad; Dan Pei; Liqiang Wang; Daniel Massey; Allison Mankin; Shyhtsun Felix Wu; Lcs L. Zhang

Collaboration


Dive into the Dan Pei's collaboration.

Top Co-Authors

Avatar

Daniel Massey

Colorado State University

View shared research outputs
Top Co-Authors

Avatar

Lixia Zhang

University of California

View shared research outputs
Top Co-Authors

Avatar

Xiaoliang Zhao

University of Southern California

View shared research outputs
Top Co-Authors

Avatar

Allison Mankin

Information Sciences Institute

View shared research outputs
Top Co-Authors

Avatar

Lan Wang

University of Memphis

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

S. Felix Wu

University of California

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Kwan-Liu Ma

University of California

View shared research outputs
Top Co-Authors

Avatar

Soon-Tee Teoh

University of California

View shared research outputs
Researchain Logo
Decentralizing Knowledge